<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static NAT for an entire network object - why does this work? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/143014#M22166</link>
    <description>&lt;P&gt;Interestingly, if you specify a range instead of a network, then it gets translated like for like.&lt;/P&gt;</description>
    <pubDate>Fri, 04 Mar 2022 19:30:16 GMT</pubDate>
    <dc:creator>Ruan_Kotze</dc:creator>
    <dc:date>2022-03-04T19:30:16Z</dc:date>
    <item>
      <title>Static NAT for an entire network object - why does this work?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/142973#M22157</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I don't understand why/how the following scenario works.&lt;/P&gt;&lt;P&gt;SMS is R81.10, Gateway is R80.40&lt;/P&gt;&lt;P&gt;I can set a Static NAT IP for a network object and can successfully install policy.&lt;/P&gt;&lt;P&gt;eg. setting STATIC NAT IP 10.0.113.2 on the network A-INT_NET (192.168.11.0/24)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="static nat applied.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15598iD90D0B4E812BABA9/image-size/large?v=v2&amp;amp;px=999" role="button" title="static nat applied.jpeg" alt="static nat applied.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In NAT rulebase&amp;nbsp; - rule no 10 appears&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="nat rulebase.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15599i42FD8EEA6C030C17/image-size/large?v=v2&amp;amp;px=999" role="button" title="nat rulebase.jpg" alt="nat rulebase.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traffic to outside works for 2 hosts on that network. (I also have a second hide NAT that's made in pfsense above the lab environment)&lt;/P&gt;&lt;P&gt;Even weirder is that CKP logs shows succesful Source NAT, but not with .2 as in the rule, but with .204 which I don't even know where it appeared from. The Gateway's IP is 10.0.113.1&lt;/P&gt;&lt;P&gt;The virtual router above CKP lab doesn't have DHCP server active so that .204 IP couldn't have come from that.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log.jpeg" style="width: 755px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15600iFDE13F75CD6B7925/image-size/large?v=v2&amp;amp;px=999" role="button" title="log.jpeg" alt="log.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 10:43:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/142973#M22157</guid>
      <dc:creator>LucianLS</dc:creator>
      <dc:date>2022-03-04T10:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT for an entire network object - why does this work?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/143008#M22164</link>
      <description>&lt;P&gt;Setting a static NAT on a network object does work, but almost certainly not the way expected.&amp;nbsp; What you have done is NATed the entire&amp;nbsp;&lt;SPAN&gt;192.168.11.0/24 network to the entire 10.0.113.0/24 network.&amp;nbsp; So traffic coming from 192.168.11.111 will be NATted to 10.0.113.111, 192.168.11.17 will be NATted to 10.0.113.17, etc.&amp;nbsp; I think Cisco used to call this "LAN-to-LAN NATting", and this type of NAT operation just swaps out the network portion of the IP address (first three octets with a /24) and leaves the host portion (last octet) intact.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 17:50:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/143008#M22164</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-03-04T17:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT for an entire network object - why does this work?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/143010#M22165</link>
      <description>&lt;P&gt;I believe the IPs in translated subnet are chosen randomly, so say if source is x.x.x.222, then dst might be y.y.y.252.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 19:52:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/143010#M22165</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-04T19:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT for an entire network object - why does this work?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/143014#M22166</link>
      <description>&lt;P&gt;Interestingly, if you specify a range instead of a network, then it gets translated like for like.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 19:30:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/143014#M22166</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2022-03-04T19:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT for an entire network object - why does this work?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/143015#M22167</link>
      <description>&lt;P&gt;Thats right, exactly how it works on Cisco.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 19:43:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/143015#M22167</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-04T19:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT for an entire network object - why does this work?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/146899#M23387</link>
      <description>&lt;P&gt;I have been using static network to network NAT with VPNs for years, it works exactly as expected. For example: orig_src:10.23.0.0/16 xlate_src:192.168.0.0/16 will NAT the 3rd and 4th octet one to one. Where is this documented within Check Point's admin guides? Is there an sk?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 23:25:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Static-NAT-for-an-entire-network-object-why-does-this-work/m-p/146899#M23387</guid>
      <dc:creator>dagnabber</dc:creator>
      <dc:date>2022-04-22T23:25:17Z</dc:date>
    </item>
  </channel>
</rss>

