<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with IPSEC tunnel and source NAT in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-IPSEC-tunnel-and-source-NAT/m-p/26861#M2096</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kenny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the delay in answering you. Thanks for the information and links.&lt;/P&gt;&lt;P&gt;The other partner shut down his side of the tunnel last Friday and we're waiting for them to do more tests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try to keep you informed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 Feb 2018 13:35:06 GMT</pubDate>
    <dc:creator>SRE_Tuenti</dc:creator>
    <dc:date>2018-02-05T13:35:06Z</dc:date>
    <item>
      <title>Problem with IPSEC tunnel and source NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-IPSEC-tunnel-and-source-NAT/m-p/26859#M2094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;We have a problem with an appliance running R77.40, IPSEC and source NAT.&lt;/P&gt;&lt;P&gt;Scenario:&lt;/P&gt;&lt;P&gt;- A Star IPSEC VPN with two Gateways (let's call our site Alice and the opposite side Bob)&lt;/P&gt;&lt;P&gt;- Our (Alice) R77.30 with public IP, oposite side (Bob) Cisco ASA with public IP, so no NAT-T. Let's say 8.8.8.8 Alice&amp;nbsp;and 4.4.4.4 the Bob.&lt;/P&gt;&lt;P&gt;- both sites have internal private IPs. Let's say 10.10.10.0/24 in Alice&amp;nbsp;and 192.168.1.0/24 in the Bob.&lt;/P&gt;&lt;P&gt;To avoid overlaping problems in the future we agreed in using a small range of public IP in each side with NAT. Let's say 192.0.2.0/28 in Alice&amp;nbsp;and 13.13.13.0/28 in the Bob, so we need to apply NAT&lt;/P&gt;&lt;P&gt;- Both public ranges and Alice&amp;nbsp;IP range are included in the encryption domains&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from the opposite side to one of our hosts success:&lt;/P&gt;&lt;P&gt;- I (Alice) have a Policy: Source: Bob_enc_domain (their publi) Destination: (Alice encryption domain, public and private IPs), VPN: the Community Service: Any Action: accept&lt;/P&gt;&lt;P&gt;- And the NAT: Original source: Public IP 1 of&amp;nbsp;Bob, Original destination: Public IP 1 of Alice. Service 443. Translated source: internal IP of Alice FW (CheckPoint), Translated destination: internal private IP of Alice. service: original&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BUT (This is the problem):&lt;/P&gt;&lt;P&gt;Traffic form Alice&amp;nbsp;side to Bob doesn't work.&lt;/P&gt;&lt;P&gt;I tried many scenarios. The current one:&lt;/P&gt;&lt;P&gt;- Traffic originated from Alice internal machine, Source IP, internal (included in Alice encryption domain), Destination IP, Bob public IP (included in Bob encryption domain)&lt;/P&gt;&lt;P&gt;- Firewall rules (tried many): source: Alice internal private IP, destination: Bob Encription domain, VPN: Community. sevice any.&lt;/P&gt;&lt;P&gt;- NAT rules (33): Original source: Alice internal private IP, Original destination: Bob public IP, Service 10001 Translated source: Public IP 1 of Alice Translated destination: Original translated service:Original&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This fails with an error:&amp;nbsp;Packet is dropped because there is no valid SA - please refer to solution sk19423 in SecureKnowledge Database for more information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the same dialog I see:&lt;/P&gt;&lt;P&gt;NAT Rule number: 33&lt;/P&gt;&lt;P&gt;NAT additional Rule... 1&lt;/P&gt;&lt;P&gt;But no Xlated address appear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Acording to what I've read, this should work, but it don't.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anybody give me some hints?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 09:53:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-IPSEC-tunnel-and-source-NAT/m-p/26859#M2094</guid>
      <dc:creator>SRE_Tuenti</dc:creator>
      <dc:date>2018-02-01T09:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with IPSEC tunnel and source NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-IPSEC-tunnel-and-source-NAT/m-p/26860#M2095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello SRE,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assumpt you are using the nat scenario for client to server traffic (specific servers only).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you made a debug to see which networks are being negotiated? You can follow this SK in case you didn't &lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk63560" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk63560"&gt;How to run complete VPN debug on Security Gateway to troubleshoot VPN issues?&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you already include your local network (10.10.10.0/24) and your nated network (192.0.2.0/28) on your local encription domain, then you have to do the same for remote peer encryption domain, this way you are telling the gateway that nated range of Bob belongs to the VPN along with its local network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since your error is &lt;STRONG&gt;no valid SA&lt;/STRONG&gt; it seems the tunnel is not establishing when you initiate the traffic. You can verify the following SK: &lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600"&gt;VPN Site-to-Site with 3rd party&lt;/A&gt; on Scenario 1 and manually negotiate the nated networks with the peer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 19:22:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-IPSEC-tunnel-and-source-NAT/m-p/26860#M2095</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2018-02-01T19:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with IPSEC tunnel and source NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-IPSEC-tunnel-and-source-NAT/m-p/26861#M2096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kenny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the delay in answering you. Thanks for the information and links.&lt;/P&gt;&lt;P&gt;The other partner shut down his side of the tunnel last Friday and we're waiting for them to do more tests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try to keep you informed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2018 13:35:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-IPSEC-tunnel-and-source-NAT/m-p/26861#M2096</guid>
      <dc:creator>SRE_Tuenti</dc:creator>
      <dc:date>2018-02-05T13:35:06Z</dc:date>
    </item>
  </channel>
</rss>

