<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: S2S IPSEC VPN using NAT in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183265#M33666</link>
    <description>&lt;P&gt;This is definitely required for Domain-Based VPNs.&lt;BR /&gt;For Route-Based VPNs, I don't believe it is required.&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jun 2023 18:02:25 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-06-05T18:02:25Z</dc:date>
    <item>
      <title>S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183145#M33630</link>
      <description>&lt;P&gt;Hello, world.&lt;/P&gt;
&lt;P&gt;I currently have an IPsec VPN in the process of deployment, but we have a question.&lt;/P&gt;
&lt;P&gt;The intention is that once the tunnel is built, the remote peer will reach our server, pointing to a NAT IP.&lt;/P&gt;
&lt;P&gt;Real SRV IP: 10.7.5.10&lt;BR /&gt;IP NAT: 192.168.50.10&lt;BR /&gt;Service: 443&lt;/P&gt;
&lt;P&gt;Destination Segment: 172.16.20.0/24&lt;/P&gt;
&lt;P&gt;Could you comment me, what would be the correct NAT structure that we should create in the SmartConsole, please.&lt;/P&gt;
&lt;P&gt;In addition to that, if I work with a NAT IP on my side, is it necessary that the NAT IP is "put" in my VPN DOMAIN!&lt;BR /&gt;Or in the VPN DOMAIN, is it enough that my Real IP of the server is there?&lt;/P&gt;
&lt;P&gt;Thank you for your comments.&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jun 2023 21:35:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183145#M33630</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2023-06-03T21:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183150#M33631</link>
      <description>&lt;P&gt;I believe you may need to add both the real subnet (10.7.5.x) and the NAT subnet (192.168.50.10) to the local encryption domain.&lt;BR /&gt;The remote vpn domain (172.16.20.x) would be assigned to the remote VPN device object; both the local and remote GWs would be configured in a VPN community and this community would be assigned to the firewall ruleset.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your outbound rule would contain the real IP as the source.&lt;BR /&gt;The remote end would have our source as the NAT IP.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;If you do a fw ctl chain, you will see the inbound and outbound chains. I believe when leaving the firewall it goes through the firewall ruleset, then NAT and then through the tunnel.&lt;/P&gt;
&lt;P&gt;Been a while since I did any tunnels with NAT so you will need to check it.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 13:44:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183150#M33631</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2023-06-04T13:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183152#M33632</link>
      <description>&lt;P&gt;Hey bro. I think what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5933"&gt;@genisis__&lt;/a&gt;&amp;nbsp;said makes sense.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 16:53:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183152#M33632</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-06-04T16:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183156#M33633</link>
      <description>&lt;P&gt;Also bro, make sure below option inside VPN community is NOT checked.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21258i0F4259C710722765/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 16:57:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183156#M33633</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-06-04T16:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183157#M33634</link>
      <description>&lt;P&gt;I did not mention that as this is enabled by default, but yes this is required.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 18:02:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183157#M33634</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2023-06-04T18:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183158#M33635</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, I understand that the security policy, at the moment of creating it, in the ORIGIN field, must go my REAL IP, correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the VPN DOMAIN, from my side (CP), I must enter both the REAL IP and the NAT IP ????&lt;/P&gt;
&lt;P&gt;If this is not clear &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If I do this, to enter both IPs, both the real IP and the NAT IP, it does not generate any conflict?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this case, I should create a DNAT, right, based on my scenario, of course, in which I want them to reach me, pointing to a fake IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 18:53:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183158#M33635</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2023-06-04T18:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183159#M33636</link>
      <description>&lt;P&gt;Based on my experience and what TAC suggested before, I would say yes, both real and natted IP in the enc domain.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 18:54:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183159#M33636</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-06-04T18:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183165#M33638</link>
      <description>&lt;P&gt;So, I understand that the security policy, at the moment of creating it, in the ORIGIN field, must go my REAL IP, correct?&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;- I believe so, assuming the local GW is the initiator.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;In the VPN DOMAIN, from my side (CP), I must enter both the REAL IP and the NAT IP ????&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT color="#0000FF"&gt;- Yes I believe so, because you are ensuring both subnets are tagged to the local gateway for VPN decisions, you can of course test this as well.&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;If I do this, to enter both IPs, both the real IP and the NAT IP, it does not generate any conflict?&lt;/P&gt;
&lt;P&gt;-&lt;EM&gt;&lt;FONT color="#0000FF"&gt; Not in the scenario we are talking about.&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;In this case, I should create a DNAT, right, based on my scenario, of course, in which I want them to reach me, pointing to a fake IP.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT color="#0000FF"&gt;- No DNAT required as the destination IP is the 172.16.x address, which is not in your VPN domain (This should be added to the VPN Domain of the remote gateway object).&amp;nbsp; &amp;nbsp;If you had to target a DNAT, I would say try to get the remote end to deal with this, it would make your side less complicated.&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 20:07:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183165#M33638</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2023-06-04T20:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183233#M33658</link>
      <description>&lt;P&gt;Your local encryption domain must include the client's real IPs.&lt;BR /&gt;This is because the local encryption domain is used to determine what IPs are "interesting" to the remote end of the VPN tunnel (and thus be encrypted).&lt;BR /&gt;The way the remote VPN gateway sees the traffic (i.e. the result of NAT) must also be included in the encryption domain as this is what the IPsec SAs will be negotiated using.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 15:55:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183233#M33658</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-05T15:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183234#M33659</link>
      <description>&lt;P&gt;I don't think I've ever added a clients real IP into our local VPN domain, I've always added that to a VPN domain which is then assigned to the remote VPN device's object hence the local gateway knows its not part of its own domain, but it is part of VPN domain for a remote gateway.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 15:58:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183234#M33659</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2023-06-05T15:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPSEC VPN using NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183265#M33666</link>
      <description>&lt;P&gt;This is definitely required for Domain-Based VPNs.&lt;BR /&gt;For Route-Based VPNs, I don't believe it is required.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 18:02:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-IPSEC-VPN-using-NAT/m-p/183265#M33666</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-05T18:02:25Z</dc:date>
    </item>
  </channel>
</rss>

