<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155912#M26618</link>
    <description>&lt;P&gt;We upgraded one of our customers some time ago from R80.30 to R81.10 and experienced a lot of problems – and still have some serious ones to solve.&lt;/P&gt;&lt;P&gt;One of the problems is that automatic NAT for outgoing connections from virtual systems does not work anymore. Instead of the real IP addresses of the VS the Internal Communication Network addresses (aka "funny IPs") are used. Thus, no communication for VSes is possible without manual NAT rules.&lt;/P&gt;&lt;P&gt;We have a network design where several different VSes (VPN FW, LAN FW, DMZ FW and Webserver FW) are connected via a virtual switch to the same external network (means: Internet).&lt;/P&gt;&lt;P&gt;With R80.30 each of this VSes reached Internet with its real IP without implementing manual NAT rules. That does not work anymore with R81.10. TAC told us that we have to apply manual NAT rules as described in&amp;nbsp;&lt;A title="NAT is not applied to traffic generated by a Virtual System itself in VSX Cluster" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk119304" target="_self"&gt;sk119304&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;The same happens for internal connections connections to DNS and NTP servers etc.&lt;/P&gt;&lt;P&gt;My question is: Why did Check Point break automatic NAT in R81.10 making this version technical inferior to R80.30 regarding this point? What about usability when you have to apply manual NAT rules for any interface with traffic originating from a VS?&lt;/P&gt;&lt;P&gt;In my opinion that is not the maturity you would expect from enterprise grade software. It seems to be half-ready, banana software – ripes at the customer.&lt;/P&gt;</description>
    <pubDate>Mon, 29 Aug 2022 17:30:01 GMT</pubDate>
    <dc:creator>Oliver_Fink</dc:creator>
    <dc:date>2022-08-29T17:30:01Z</dc:date>
    <item>
      <title>Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155912#M26618</link>
      <description>&lt;P&gt;We upgraded one of our customers some time ago from R80.30 to R81.10 and experienced a lot of problems – and still have some serious ones to solve.&lt;/P&gt;&lt;P&gt;One of the problems is that automatic NAT for outgoing connections from virtual systems does not work anymore. Instead of the real IP addresses of the VS the Internal Communication Network addresses (aka "funny IPs") are used. Thus, no communication for VSes is possible without manual NAT rules.&lt;/P&gt;&lt;P&gt;We have a network design where several different VSes (VPN FW, LAN FW, DMZ FW and Webserver FW) are connected via a virtual switch to the same external network (means: Internet).&lt;/P&gt;&lt;P&gt;With R80.30 each of this VSes reached Internet with its real IP without implementing manual NAT rules. That does not work anymore with R81.10. TAC told us that we have to apply manual NAT rules as described in&amp;nbsp;&lt;A title="NAT is not applied to traffic generated by a Virtual System itself in VSX Cluster" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk119304" target="_self"&gt;sk119304&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;The same happens for internal connections connections to DNS and NTP servers etc.&lt;/P&gt;&lt;P&gt;My question is: Why did Check Point break automatic NAT in R81.10 making this version technical inferior to R80.30 regarding this point? What about usability when you have to apply manual NAT rules for any interface with traffic originating from a VS?&lt;/P&gt;&lt;P&gt;In my opinion that is not the maturity you would expect from enterprise grade software. It seems to be half-ready, banana software – ripes at the customer.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 17:30:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155912#M26618</guid>
      <dc:creator>Oliver_Fink</dc:creator>
      <dc:date>2022-08-29T17:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155914#M26620</link>
      <description>&lt;P&gt;That SK suggests (by versions listed) this isn’t new behavior with R81.10…&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 18:25:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155914#M26620</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-08-29T18:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155930#M26627</link>
      <description>&lt;P&gt;Similarly&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101448" target="_self"&gt;&lt;SPAN&gt;sk101448&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;describes some related scenarios, do either of those apply to your case?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 01:37:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155930#M26627</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-08-30T01:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155935#M26628</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2525"&gt;@Oliver_Fink&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;I have VSX system in my lab with R81.10 JHF 66 and NAT is working with automatic rules.&lt;/P&gt;
&lt;P&gt;I will contact you offline to get more info about your case and will try to assist.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 05:23:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155935#M26628</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2022-08-30T05:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155960#M26638</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2525"&gt;@Oliver_Fink&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have created a manual NO-NAT rule you must exclude from that the "funny ips" range.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Kostas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 09:53:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155960#M26638</guid>
      <dc:creator>KostasGR</dc:creator>
      <dc:date>2022-08-30T09:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155963#M26639</link>
      <description>&lt;P&gt;I know that the SK suggests that this is not new behaviour. But I can assure that it worked for years without manual NAT rules – with R80.30 and even with R77.30. And it stopped suddenly working after upgrading to R81.10.&lt;/P&gt;&lt;P&gt;Such I have to create manual NAT rules for every node's funny IP on every interface it communicates to (DNS, Identity Collector, Identity Sharing, Cloud Services, etc.). The customer wants to go from 2 cluster nodes to 4 or more nodes in the future. This would result in more NAT rules. Maybe I can workaround that with using funny IP network NAT rules instead of host rules for each node.&lt;/P&gt;&lt;P&gt;But I would expect that the VS sends traffic with its own real IP address and is able to communicate with "the world" – as it did before. Everything else is fiddling, not enterprise grade behaviour.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 10:07:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155963#M26639</guid>
      <dc:creator>Oliver_Fink</dc:creator>
      <dc:date>2022-08-30T10:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155965#M26640</link>
      <description>&lt;P&gt;Thanks Chris.&lt;/P&gt;&lt;P&gt;That was a valuable hint. The VS I have in mind does not have any manual NAT rules. But the table.def file consists and has the content of:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;no_hide_services_ports = { &amp;lt;4500,17&amp;gt;, &amp;lt;500, 17&amp;gt;, &amp;lt;259, 17&amp;gt;, &amp;lt;1701, 17&amp;gt;, &amp;lt;5500, 17&amp;gt;, &amp;lt;22, 6&amp;gt;&lt;BR /&gt;, &amp;lt;80, 6&amp;gt;, &amp;lt;444, 6&amp;gt;, &amp;lt;53, 17&amp;gt; };&lt;/P&gt;&lt;P&gt;I will test if HTTPS works without NAT rules and HTTP does not. That would confirm that it is table.def causing the issue.&lt;/P&gt;&lt;P&gt;I will come back with my results.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 10:18:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155965#M26640</guid>
      <dc:creator>Oliver_Fink</dc:creator>
      <dc:date>2022-08-30T10:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155966#M26641</link>
      <description>&lt;P&gt;Thank you, Kosta.&lt;/P&gt;&lt;P&gt;Yes, I really wondered why that is not mentioned in the solution part of&amp;nbsp;&lt;SPAN&gt;sk119304.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 10:23:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155966#M26641</guid>
      <dc:creator>Oliver_Fink</dc:creator>
      <dc:date>2022-08-30T10:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155971#M26645</link>
      <description>&lt;P&gt;Contratulations,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;.&amp;nbsp;What TAC did not find in several weeks of debugging – you discovered it in seconds!&lt;/P&gt;&lt;P&gt;If I remove the manual NAT rules, HTTP connections stop working and HTTPS still does. That seems to be a clear sign for me, that table.def configuration is the cause of the problem.&lt;/P&gt;&lt;P&gt;Now I wonder what changed with the interpretation of table.def between R80.30 and R81.10…&lt;/P&gt;&lt;P&gt;And I need a maintenance window at the customer to test what falls apart if I delete the last 4 entries from&amp;nbsp;no_hide_services_ports.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 10:40:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155971#M26645</guid>
      <dc:creator>Oliver_Fink</dc:creator>
      <dc:date>2022-08-30T10:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155986#M26658</link>
      <description>&lt;P&gt;Pleased to hear that you have a way forward now. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 12:57:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/155986#M26658</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-08-30T12:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/156002#M26663</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;Regarding broken clusternode traffic, we saw it all break in r8040 and still is in r8110&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167453&amp;amp;partition=Advanced&amp;amp;product=ClusterXL" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167453&amp;amp;partition=Advanced&amp;amp;product=ClusterXL&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;passive node sends traffic out through sync to active.&amp;nbsp;&lt;BR /&gt;active is supossed to NAT all traffic but we see that it mostly doesnt. We are on 8110 take 55 and are aware of the kernel parameters possible to tweak this behaviour. Not a good solution.&lt;/P&gt;&lt;P&gt;/Henrik&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 14:47:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/156002#M26663</guid>
      <dc:creator>Henrik_Noerr1</dc:creator>
      <dc:date>2022-08-30T14:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Why did Check Point break automatic NAT for outgoing connections from VSes in VSX R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/156003#M26664</link>
      <description>&lt;P&gt;Furthermore passive node is not included in implied rules for the active node and is hence dropped if you do not make specific rules for all implied traffic&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 14:48:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-did-Check-Point-break-automatic-NAT-for-outgoing-connections/m-p/156003#M26664</guid>
      <dc:creator>Henrik_Noerr1</dc:creator>
      <dc:date>2022-08-30T14:48:55Z</dc:date>
    </item>
  </channel>
</rss>

