<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN Connection with NAT in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148849#M23831</link>
    <description>&lt;P&gt;&lt;SPAN&gt;have you defined the source and destination networks (VPN Domain) in your&amp;nbsp;VPN:Community_to_company_x ?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 17 May 2022 20:00:24 GMT</pubDate>
    <dc:creator>nasa</dc:creator>
    <dc:date>2022-05-17T20:00:24Z</dc:date>
    <item>
      <title>Site to Site VPN Connection with NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148836#M23829</link>
      <description>&lt;P&gt;Hello everybody!&lt;BR /&gt;Sorry if I posted in the wrong place, if I did, can you move my topic to the correct place?&lt;BR /&gt;I have a 3600 checkpoint with R81.10 take 335 standalone deployment.&lt;BR /&gt;I'm closing a Site to Site VPN with a company.&lt;BR /&gt;All networks that I have local were already being used on the company network that I want to close VPN.&lt;BR /&gt;So it was necessary to do a NAT, but I never did a NAT this way.&lt;BR /&gt;I tried to read the documentation but I couldn't find where I'm wrong.&lt;/P&gt;&lt;P&gt;The topology is as follows.&lt;/P&gt;&lt;P&gt;My business:&lt;BR /&gt;192.168.25.32/29&lt;/P&gt;&lt;P&gt;Company X:&lt;BR /&gt;Host IP: 10.1.3.115&lt;BR /&gt;Host IP: 10.1.3.116&lt;BR /&gt;Host IP: 172.22.99.99&lt;/P&gt;&lt;P&gt;I created the NAT rule&lt;/P&gt;&lt;P&gt;Original source: 192.168.100.48 a specific host to test the connection.&lt;BR /&gt;Original destination: 10.1.3.115&lt;BR /&gt;Original services: any&lt;BR /&gt;Translated Source: 192.168.25.33&lt;BR /&gt;Translated Destionation: Original&lt;BR /&gt;Translated Services: Original&lt;/P&gt;&lt;P&gt;I created the network rule.&lt;/P&gt;&lt;P&gt;Source: 10.1.3.115, 10.1.3.116, 172.22.99.99, 192.168.100.48 and 192.168.25.33&lt;BR /&gt;Destination: 10.1.3.115, 10.1.3.116, 172.22.99.99, 192.168.100.48 and 192.168.25.33&lt;BR /&gt;VPN:Community_to_company_x&lt;BR /&gt;Services &amp;amp; applications: any&lt;BR /&gt;Action: Accept&lt;BR /&gt;Track: Log&lt;/P&gt;&lt;P&gt;The client informs that the traffic arrives at his firewall, but it arrives with my company's public IP, the right thing would be to arrive with the NAT IP 192.168.25.33, so the firewall drops the packets&lt;BR /&gt;&lt;BR /&gt;Sorry for my english, I'm using google translator&lt;BR /&gt;&lt;BR /&gt;Message in log: Connection terminated before the Security Gateway was able to make a decision: Insufficient data passed.&lt;BR /&gt;To learn more see sk113479.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;If you can answer this conversation with a print of how to configure it, I would greatly appreciate it&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 912px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16596iA8162E1816800C59/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 17:03:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148836#M23829</guid>
      <dc:creator>BrunoMarques21</dc:creator>
      <dc:date>2022-05-17T17:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN Connection with NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148844#M23830</link>
      <description>&lt;P&gt;First thing that came to my mind is make sure inside VPN community that nat is not disabled, its option somewhere on the bottom left, under advanced I believe.&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 18:22:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148844#M23830</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-05-17T18:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN Connection with NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148849#M23831</link>
      <description>&lt;P&gt;&lt;SPAN&gt;have you defined the source and destination networks (VPN Domain) in your&amp;nbsp;VPN:Community_to_company_x ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 20:00:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148849#M23831</guid>
      <dc:creator>nasa</dc:creator>
      <dc:date>2022-05-17T20:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN Connection with NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148870#M23832</link>
      <description>&lt;P&gt;I would suggest to involve TAC to resolve this...&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2022 07:35:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148870#M23832</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-05-18T07:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN Connection with NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148905#M23837</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I use to go through the following step in situations like yours. First check on your logs if the traffic from&amp;nbsp;&lt;SPAN&gt;192.168.100.48 to destination&amp;nbsp;10.1.3.115 is being NATed correctly, maybe a higher NAT rule is causing some problem.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If NAT is OK, make sure that you have real IP's and NATed IP's in your local encryption domain, you should have both. If you have it in this way you can go to the third step.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Go to sk108600:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;First check scenario 3, the external interfaces of the Gateway are included implicitly on the encryption. So you have to exclude your external IP address manually editing the crypt.def file according to the sk.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If that don't work you can also try the scenario 1, where you will define your local encryption domain for that peer manually editing the user.def.FW1, i've had cases like yours that were solved with this change and not with the previous.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2022 13:05:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Connection-with-NAT/m-p/148905#M23837</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2022-05-18T13:05:51Z</dc:date>
    </item>
  </channel>
</rss>

