<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150346#M24400</link>
    <description>&lt;P&gt;the line on state "Detect" shouldn't be happening.&lt;/P&gt;&lt;P&gt;Because I just send request to public IP, then NAT it to the reverse proxy&lt;BR /&gt;But, as we can see, I send request to internal server but I don’t know how.&lt;/P&gt;&lt;P&gt;My original request is ok, but I don’t connect to the server&amp;nbsp; sftp. I have a timeout&lt;/P&gt;&lt;P&gt;&lt;EM&gt;PS2: the Public IP you use is the same with the one on the GW - facing Internet - or is a different IP ?&lt;BR /&gt;&lt;/EM&gt;It's two different IP &lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Jun 2022 13:45:59 GMT</pubDate>
    <dc:creator>benlef</dc:creator>
    <dc:date>2022-06-07T13:45:59Z</dc:date>
    <item>
      <title>NAT issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150156#M24356</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I have an issue with NAT to access to interne service from internet.&lt;/P&gt;&lt;P&gt;I have a server wich run sftp service, it's in the subnet A&lt;/P&gt;&lt;P&gt;I have also a reverseProxy wich is in an other subnet B.&lt;/P&gt;&lt;P&gt;So when query arrive from internet on public ip address, Checkpoint NAT it to the reversproxy, and the reverse proxy forward to the internal server.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But, It doesn't work.&lt;BR /&gt;when I check the log, I see pass log from external ip address to my public ip address, it's good for me.&lt;/P&gt;&lt;P&gt;But, I also see a query from external ip address to my serveur sftp (internal) while I just tap public ip address :22, with state "Detect"&lt;/P&gt;&lt;P&gt;I put a pic, bbox.fr(62.....) it's from internet, Ip_nat_176 it's my public ip and sftp_10 it's internal serveur&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Have you any ideas to help me ?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 15:22:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150156#M24356</guid>
      <dc:creator>benlef</dc:creator>
      <dc:date>2022-06-03T15:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150162#M24357</link>
      <description>&lt;P&gt;Can you put a screenshot of the actual nat rule in place?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 17:20:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150162#M24357</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-06-03T17:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150167#M24358</link>
      <description>&lt;P&gt;What is the content of the Information field of the logs allowing direct connectivity?&lt;/P&gt;
&lt;P&gt;It is difficult to tell based on the information you have provided, but I wander if these logs are expected if "X-Forwarded for" is enabled in this policy layer.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 18:42:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150167#M24358</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-06-03T18:42:15Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150292#M24359</link>
      <description>&lt;P&gt;Yes of course&lt;/P&gt;&lt;P&gt;the "Kemp" object is reverse proxy&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 07:36:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150292#M24359</guid>
      <dc:creator>benlef</dc:creator>
      <dc:date>2022-06-07T07:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150301#M24384</link>
      <description>&lt;P&gt;I send you the sreenshots&lt;/P&gt;&lt;P&gt;About X-forwarded , can you tell me if you talk to me about this parameter on screenshot "x-for" please&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 08:41:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150301#M24384</guid>
      <dc:creator>benlef</dc:creator>
      <dc:date>2022-06-07T08:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150317#M24388</link>
      <description>&lt;P&gt;So, I still don't see the problem you are talking about.&lt;/P&gt;&lt;P&gt;The logs show properly what is happening, no errors or smth like that.&lt;/P&gt;&lt;P&gt;The Detect that you see, it comes from IPS, and if it was blocking it, you would see it as Prevent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also the NAT rule is correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you say that with that rule, the SSH session doesn't work or what? What is the error you see.&lt;/P&gt;&lt;P&gt;Had you run some captures on either sides ?&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;PS:&amp;nbsp; the&amp;nbsp;&lt;SPAN&gt;"X-Forwarded for" is about&amp;nbsp; HTTP/S headers, doesn't apply to SSH or SFTP traffic.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;PS2: the Public IP you use is the same with the one on the GW - facing Internet - or is a different IP ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 11:54:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150317#M24388</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-06-07T11:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150346#M24400</link>
      <description>&lt;P&gt;the line on state "Detect" shouldn't be happening.&lt;/P&gt;&lt;P&gt;Because I just send request to public IP, then NAT it to the reverse proxy&lt;BR /&gt;But, as we can see, I send request to internal server but I don’t know how.&lt;/P&gt;&lt;P&gt;My original request is ok, but I don’t connect to the server&amp;nbsp; sftp. I have a timeout&lt;/P&gt;&lt;P&gt;&lt;EM&gt;PS2: the Public IP you use is the same with the one on the GW - facing Internet - or is a different IP ?&lt;BR /&gt;&lt;/EM&gt;It's two different IP &lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 13:45:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150346#M24400</guid>
      <dc:creator>benlef</dc:creator>
      <dc:date>2022-06-07T13:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150366#M24407</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;the line on state "Detect" shouldn't be happening.&lt;/SPAN&gt;" - Initially I was thinking that is because of IPS, and that will happen on every traffic depending on your IPS rules. And like I said, it's a Detect (so it's catching things but allowing them) not a Prevent&amp;nbsp;(this it will catch things and DENY them)&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in your case, the DETECT is coming from Firewall Blade and it's an Address Spooofing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So please check and see that the IP's are set correctly on the interfaces, and you have proper Spoofing set....&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Is Internal Destination IP (10.xxxx) part of bond1.912 ?!?!?!?!?!&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16847i1363CAEBA27014EF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Capture.JPG" alt="Capture.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 16:27:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-issue/m-p/150366#M24407</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-06-07T16:27:56Z</dc:date>
    </item>
  </channel>
</rss>

