<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Force SG do NAT-T in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Force-SG-do-NAT-T/m-p/25907#M2032</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In releases prior to R80.10, you could only do this when:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The gateway is configured as having a dynamic address&lt;/LI&gt;&lt;LI&gt;Certificate authentication is used&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;However, this limitation was removed in R80.10 and it can be forced as described in the R80.10 VPN docs:&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SitetoSiteVPN_AdminGuide/html_frameset.htm" title="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SitetoSiteVPN_AdminGuide/html_frameset.htm"&gt;Site to Site VPN R80.10 Administration Guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Jan 2018 22:16:15 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-01-29T22:16:15Z</dc:date>
    <item>
      <title>Force SG do NAT-T</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Force-SG-do-NAT-T/m-p/25906#M2031</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi CheckMates,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I'm Installed Security Gateway behind device which that Device do DNAT Public IP to Provita IP of Security Gateway. I'd like do Security Gateway forces to me Iniciate Nat-t. How can I do it on Check Point.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Morato&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 21:50:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Force-SG-do-NAT-T/m-p/25906#M2031</guid>
      <dc:creator>Rafael_Morato</dc:creator>
      <dc:date>2018-01-29T21:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Force SG do NAT-T</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Force-SG-do-NAT-T/m-p/25907#M2032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In releases prior to R80.10, you could only do this when:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The gateway is configured as having a dynamic address&lt;/LI&gt;&lt;LI&gt;Certificate authentication is used&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;However, this limitation was removed in R80.10 and it can be forced as described in the R80.10 VPN docs:&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SitetoSiteVPN_AdminGuide/html_frameset.htm" title="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SitetoSiteVPN_AdminGuide/html_frameset.htm"&gt;Site to Site VPN R80.10 Administration Guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 22:16:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Force-SG-do-NAT-T/m-p/25907#M2032</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-29T22:16:15Z</dc:date>
    </item>
  </channel>
</rss>

