<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Understanding about NAT and VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201425#M37897</link>
    <description>&lt;P&gt;If you are translating the remote addresses &lt;STRONG&gt;and&lt;/STRONG&gt; if you need to be able to initiate connections out to the peer, you should have both the real addresses and the translated addresses in the peer object's encryption domain.&lt;/P&gt;
&lt;P&gt;The encryption domain is checked at two times: once to determine if the connection should be flagged for encryption in a given VPN community, and once to determine the actual negotiation to send to the peer. NAT happens between these two checks. A connection from a device in your environment to one of the translated addresses needs the translated address in the encryption domain for the traffic to be caught by the VPN community. After it is caught by the community, the address is translated so it now looks like your internal device is talking to their real address. When it is time to negotiate the VPN, it check the destination address, the VPN community's tunnel management setting, and the objects in the remote gateway's encryption domain to pick the identifier information to propose.&lt;/P&gt;
&lt;P&gt;If you don't initiate connections to them, then you should only need their real addresses in the encryption domain.&lt;/P&gt;</description>
    <pubDate>Sat, 23 Dec 2023 20:50:54 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2023-12-23T20:50:54Z</dc:date>
    <item>
      <title>Understanding about NAT and VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201387#M37884</link>
      <description>&lt;P&gt;Guys,&lt;/P&gt;&lt;P&gt;I have a complicated situation and I needed to understand the concept. I will try to explain the scenario in the best way I can. So here it is....&lt;/P&gt;&lt;P&gt;We have a VPN between our org and the customer. Our side is checkpoint (vsx) and other end is Cisco ASA.&lt;/P&gt;&lt;P&gt;Taking the customer as source, we are hiding the customer original IP addresses and translating them to addresses routable in our network. So from my understanding and from customer point of view they are simply communicating based on original IP addresses and any translations that are happening are at our end.&lt;/P&gt;&lt;P&gt;So the question is whether we should have the NAT subnets in the customer encryption domain that we have mapped with the other end gateway or not. I just need to understand when the traffic hits with the original IPs and gets decrypted is it post that the translations happen or it happens while decryption process and enters our environment with the translated IP address?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Dec 2023 13:00:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201387#M37884</guid>
      <dc:creator>anaiyar</dc:creator>
      <dc:date>2023-12-22T13:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding about NAT and VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201414#M37895</link>
      <description>&lt;P&gt;Since you are doing the NAT on your end, I don't believe it is strictly required to do so.&lt;/P&gt;</description>
      <pubDate>Sat, 23 Dec 2023 00:57:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201414#M37895</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-12-23T00:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding about NAT and VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201425#M37897</link>
      <description>&lt;P&gt;If you are translating the remote addresses &lt;STRONG&gt;and&lt;/STRONG&gt; if you need to be able to initiate connections out to the peer, you should have both the real addresses and the translated addresses in the peer object's encryption domain.&lt;/P&gt;
&lt;P&gt;The encryption domain is checked at two times: once to determine if the connection should be flagged for encryption in a given VPN community, and once to determine the actual negotiation to send to the peer. NAT happens between these two checks. A connection from a device in your environment to one of the translated addresses needs the translated address in the encryption domain for the traffic to be caught by the VPN community. After it is caught by the community, the address is translated so it now looks like your internal device is talking to their real address. When it is time to negotiate the VPN, it check the destination address, the VPN community's tunnel management setting, and the objects in the remote gateway's encryption domain to pick the identifier information to propose.&lt;/P&gt;
&lt;P&gt;If you don't initiate connections to them, then you should only need their real addresses in the encryption domain.&lt;/P&gt;</description>
      <pubDate>Sat, 23 Dec 2023 20:50:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201425#M37897</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-12-23T20:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding about NAT and VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201442#M37900</link>
      <description>&lt;P&gt;On Cisco you can setup the VPN tunnel as "initiator" or "responder" or "both". Depends what is config on their end and if there will be usecase when Cisco is responder (Check Point will be source of VPN communication).&lt;/P&gt;
&lt;P&gt;If Cisco is only initiator, then you dont need to have NAT internal IPs in encryption domain.&lt;/P&gt;
&lt;P&gt;If Check Point will be initiator, then NAT internal IPs must be part of local encryption domain AND ALSO on Cisco side as part of remote encryption domain (to match traffic selectors to be 1:1). Cisco has to be also configured not only as Initiator, but also responder (or both).&lt;/P&gt;
&lt;P&gt;It is very important to have identical traffic selectors (encryption domains) on both ends.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Dec 2023 07:54:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201442#M37900</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2023-12-24T07:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding about NAT and VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201450#M37902</link>
      <description>&lt;P&gt;This is just me, but I would always include both original AND natted IPs in the enc domain. That seems to work fine and its worth saying that TAC most likely would suggest you do the same. As&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;said, in your case it might not be necessarily needed, but I find it works best if both are.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 24 Dec 2023 12:49:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-about-NAT-and-VPN/m-p/201450#M37902</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-24T12:49:04Z</dc:date>
    </item>
  </channel>
</rss>

