<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with VPN traffic and Nated IPs in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151614#M24879</link>
    <description>&lt;P&gt;Ok, so just to make sure...tunnel does show as UP on the other side as well? If so, but you dont see traffic, then I would try do basic vpn debug and see what we get:&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;generate traffic&lt;/P&gt;
&lt;P&gt;then run vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Review ike.elg and vpnd.elg* files from $FWDIR/log dir&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jun 2022 14:33:29 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2022-06-23T14:33:29Z</dc:date>
    <item>
      <title>Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151595#M24872</link>
      <description>&lt;P&gt;Hello&amp;nbsp;colleagues&lt;/P&gt;&lt;P&gt;I set up a site-to-site vpn in my lab environment, this vpn worked perfectly, pinging side to side both ways. Then I tried to NAT the encryption domains of both sites and I couldn't get the traffic to tunnel.&lt;/P&gt;&lt;P&gt;As you can see in the image below (FW monitor) it is Natting and it takes it out through the public (eth0). But if I run a wireshark on the host pc, I see that the traffic is coming from those IPs napped but not tunneled&lt;/P&gt;&lt;P&gt;In the logs I see that the NAT is working fine, but then the traffic does not go through the tunnel (attached image)&lt;/P&gt;&lt;P&gt;I have a mgmt running 81.10 with both members of the vpn ( a cluster running 81.10 and a standalone running 80.40).&lt;/P&gt;&lt;P&gt;Anyone know what can it be?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 13:05:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151595#M24872</guid>
      <dc:creator>BrunoCiongoli</dc:creator>
      <dc:date>2022-06-23T13:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151602#M24873</link>
      <description>&lt;P&gt;Hey Bruno,&lt;/P&gt;
&lt;P&gt;What is the other side of the vpn tunnel? Based on the pictures you attached, it appears nat does take place properly in the logs.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 13:46:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151602#M24873</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-06-23T13:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151605#M24874</link>
      <description>&lt;P&gt;What precise configuration did you do for the NAT?&lt;BR /&gt;Did you include the NAT addresses in the encryption domain?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 13:58:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151605#M24874</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-06-23T13:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151608#M24875</link>
      <description>&lt;P&gt;Hi Andy,&lt;/P&gt;&lt;P&gt;Both sides are checkpoint VMs. One side is the cluster i mentioned and the other side is the Standalone,&amp;nbsp;both devices are in my lab environment&lt;/P&gt;&lt;P&gt;Thanks, Bruno&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 14:04:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151608#M24875</guid>
      <dc:creator>BrunoCiongoli</dc:creator>
      <dc:date>2022-06-23T14:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151610#M24876</link>
      <description>&lt;P&gt;Hello PhoneBoy,&lt;/P&gt;&lt;P&gt;To better explanation, In one side, I have a cluster with a LAN (192.168.1.0/24), Inside this LAN I have a kali linux machine with the IP 192.168.1.100. In the other side I have a standalone FW with the same LAN (192.168.1.0/24) and inside this LAN a windows machine with the IP 192.168.1.100. I configure that the encryption domain for the cluster is 172.16.100.0/24 and the encryption domain for the standalone is 172.16.200.0/24&amp;nbsp;(a bit confusing, my apologies).&lt;/P&gt;&lt;P&gt;On the NAT table i said that if the cluster LAN want to go to the standalone LAN,&amp;nbsp;go with the IP 172.16.100.X(Attached image). And if the Standalone LAN want to go to the cluster LAN, go with the IP 172.16.200.X&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope I have explained myself as well as possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 14:18:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151610#M24876</guid>
      <dc:creator>BrunoCiongoli</dc:creator>
      <dc:date>2022-06-23T14:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151611#M24877</link>
      <description>&lt;P&gt;Ok, so when you check the logs for the other side of the tunnel, do you see natted IP come in?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 14:21:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151611#M24877</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-06-23T14:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151613#M24878</link>
      <description>&lt;P&gt;No, in the other side of the tunnel i don´t see anything, because the traffic never enters the tunnel.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 14:29:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151613#M24878</guid>
      <dc:creator>BrunoCiongoli</dc:creator>
      <dc:date>2022-06-23T14:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151614#M24879</link>
      <description>&lt;P&gt;Ok, so just to make sure...tunnel does show as UP on the other side as well? If so, but you dont see traffic, then I would try do basic vpn debug and see what we get:&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;generate traffic&lt;/P&gt;
&lt;P&gt;then run vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Review ike.elg and vpnd.elg* files from $FWDIR/log dir&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 14:33:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151614#M24879</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-06-23T14:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151746#M24933</link>
      <description>&lt;P&gt;Hello Andy!&lt;/P&gt;&lt;P&gt;I´m sorry for the delay in the response. I attach a zip file with all the .elg files&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 20:36:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151746#M24933</guid>
      <dc:creator>BrunoCiongoli</dc:creator>
      <dc:date>2022-06-24T20:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151753#M24936</link>
      <description>&lt;P&gt;Hey &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/71461"&gt;@BrunoCiongoli&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are the 172.16.x.x addresses included in the VPN encryption domains?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 21:32:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151753#M24936</guid>
      <dc:creator>AaronCP</dc:creator>
      <dc:date>2022-06-24T21:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151755#M24938</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/71461"&gt;@BrunoCiongoli&lt;/a&gt; , are you managing both gateways from the same management server? If so and if your NAT policy is identical on both sides, shown NAT rules translate 192.168.1.0 to the same 172.16.100.0 network on both sides. If you have different NAT rules configured on each side, please show both.&lt;/P&gt;
&lt;P&gt;While the names of the networks look good, check each network object's actual network definitions to confirm that they are inline with the names.&lt;/P&gt;
&lt;P&gt;For encryption domains in each side, create an empty group and add to it local cluster/gateway and the 172.X.X.X.&lt;/P&gt;
&lt;P&gt;Install the policy.&lt;/P&gt;
&lt;P&gt;Drop existing tunnels using vpn tu command.&lt;/P&gt;
&lt;P&gt;Try pinging again.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 21:57:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151755#M24938</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-06-24T21:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151756#M24939</link>
      <description>&lt;P&gt;Hello Aaron&lt;/P&gt;&lt;P&gt;Yes, both 172.16.X.X are included in the VPN encryption domains&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 22:46:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151756#M24939</guid>
      <dc:creator>BrunoCiongoli</dc:creator>
      <dc:date>2022-06-24T22:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151757#M24940</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11879"&gt;@Vladimir&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I´m managing both gateways from the same SMS. I apologize, i forgot submit the another NAT rules table, it is different (attach here)&lt;/P&gt;&lt;P&gt;I checked each network object and everything´s fine.&lt;/P&gt;&lt;P&gt;I had created the group you mentioned but without the respective cluster/gateway. I added it, installed the policies, and it still doesn't work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to the fwmonitor and the log (attached images) the NAT is working correctly, but the traffic does not go through the tunnel&lt;/P&gt;&lt;P&gt;Thanks for your time and response!&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 22:58:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151757#M24940</guid>
      <dc:creator>BrunoCiongoli</dc:creator>
      <dc:date>2022-06-24T22:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151758#M24941</link>
      <description>&lt;P&gt;Are you using mesh or star community for this setup?&lt;/P&gt;
&lt;P&gt;I'd suggest checking that in Community | Tunnel Management | Advanced, Disabel NAT inside VPN community is not checked.&lt;/P&gt;
&lt;P&gt;If it is, uncheck it.&lt;/P&gt;
&lt;P&gt;...and, if it is not, changing Community | Tunnel Management | VPN Tunnel Sharing to One VPN per Gateway pair.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 23:33:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151758#M24941</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-06-24T23:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151759#M24942</link>
      <description>&lt;P&gt;I would also suggest installing ccc script on active cluster member and a single gateway to check VPN routing using VPN Troubleshooting | Show VPN routing option to see if 172.X.X.X is included on each side.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 23:44:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151759#M24942</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-06-24T23:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151780#M24965</link>
      <description>&lt;P&gt;Hello, insert in your enc domain preNAT and postNAT IPs&lt;/P&gt;&lt;P&gt;on remote side only the postNAT ip&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jun 2022 11:07:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151780#M24965</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2022-06-25T11:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151856#M25012</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11879"&gt;@Vladimir&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I´m using a Star community.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Disabel NAT inside VPN community is not (and was not) checked.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I changed the community option to "VPN Tunnel Sharing to One VPN per Gateway pair."&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I installed the ccc script on both ends (cluster and gateway). Please look the attached image for the VPN routing information.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As you can see, the 172.16.x.x is correctly listed in the encryption domain, but for some reason, all the other participating subnets are listed too. It´s like the vpn config is not recognizing the encryption domain object that I specified.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Active cluster member:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="VPN EC routing info active cluster member.png" style="width: 588px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17051i715256CF34735863/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN EC routing info active cluster member.png" alt="VPN EC routing info active cluster member.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Standalone GW:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="standalone VPN rputing.png" style="width: 373px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17052iEAD3611E06C5246C/image-size/large?v=v2&amp;amp;px=999" role="button" title="standalone VPN rputing.png" alt="standalone VPN rputing.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Both sides shows the same ED&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;On the other hand, I wonder why do I need to add the gateway´s local segments in the encryption domain. Probably I was not clear enought with my first post, but what i´m trying to test is to hide overlaping networks on VPN. For that I´m using the same LAN (192.168.1.0/24) IPs on both sides, so I´m not sure of what would be the behavior if the same IP address segment is set in both EDs.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks in advance for your time and help&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 15:03:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151856#M25012</guid>
      <dc:creator>BrunoCiongoli</dc:creator>
      <dc:date>2022-06-27T15:03:12Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151860#M25014</link>
      <description>&lt;P&gt;Adding gateways to the groups representing encryption domains was done to make use of per-gateway pair tunnel.&lt;/P&gt;
&lt;P&gt;You can try removing them from the groups, changing tunnel properties in community back to one per subnet pair and testing it again, checking with ccc how your EDs look like in desired configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 15:19:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151860#M25014</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-06-27T15:19:23Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151862#M25015</link>
      <description>&lt;P&gt;P.S. It does not look like sk116097 "Destination NAT traffic not encrypted when the original destination included in the NATting gateway encryption domain", so it should work in theory.&lt;/P&gt;
&lt;P&gt;I would also suggest changing the community topology to mesh, if it does not break the intended configuration, and give it another shot.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 15:35:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151862#M25015</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-06-27T15:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN traffic and Nated IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151869#M25016</link>
      <description>&lt;P&gt;And you can use "Set VPN domain for VPN communities" feature:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN-w_Collision_Domain_1.png" style="width: 751px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17053i22F45C29D06056D0/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN-w_Collision_Domain_1.png" alt="VPN-w_Collision_Domain_1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN-w_Collision_Domain_2.png" style="width: 619px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17054iFD524FF0F59DE7F8/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN-w_Collision_Domain_2.png" alt="VPN-w_Collision_Domain_2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN-w_Collision_Domain_3.png" style="width: 683px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17055iC816F9BECAAA5C18/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN-w_Collision_Domain_3.png" alt="VPN-w_Collision_Domain_3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;To see if it'll limit EDs to 172.16.X.0/24 networks, thus avoiding collision EDs preventing NAT for VPN.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 16:05:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Problem-with-VPN-traffic-and-Nated-IPs/m-p/151869#M25016</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-06-27T16:05:21Z</dc:date>
    </item>
  </channel>
</rss>

