<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS NAT - sk34295 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206031#M38913</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Network diagram is very easy.&lt;/P&gt;&lt;P&gt;There is an internal network that goes to internet vi a checkpoint firewall&lt;/P&gt;&lt;P&gt;This network has an internal DNS server and serveral other servers that go to internet by a NAT address configured on the checkpoint.&lt;/P&gt;&lt;P&gt;Customer also has some users on the internet that resolve on this internal DNS, for the internal hosts.&lt;/P&gt;&lt;P&gt;We used this sk but the dns lookup still returns the internal addresses.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Wed, 14 Feb 2024 09:08:28 GMT</pubDate>
    <dc:creator>CarlosDias</dc:creator>
    <dc:date>2024-02-14T09:08:28Z</dc:date>
    <item>
      <title>DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/205771#M38876</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I need the feature DNS NAT described on sk34295.&lt;/P&gt;&lt;P&gt;Configured it, but seems not to work.&lt;/P&gt;&lt;P&gt;I am running R81.10&lt;/P&gt;&lt;P&gt;How can I debug the cause?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2024 14:21:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/205771#M38876</guid>
      <dc:creator>CarlosDias</dc:creator>
      <dc:date>2024-02-12T14:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/205774#M38877</link>
      <description>&lt;P&gt;Latest version listed there is R81. You may want to confirm with TAC if same is applicable in R81.10&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2024 14:46:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/205774#M38877</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-02-12T14:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/205985#M38878</link>
      <description>&lt;P&gt;No reason it shouldn't work in R81.10.&lt;BR /&gt;We need to find out more about the configuration you've attempted with a simple network diagram.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 18:27:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/205985#M38878</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-02-13T18:27:20Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206031#M38913</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Network diagram is very easy.&lt;/P&gt;&lt;P&gt;There is an internal network that goes to internet vi a checkpoint firewall&lt;/P&gt;&lt;P&gt;This network has an internal DNS server and serveral other servers that go to internet by a NAT address configured on the checkpoint.&lt;/P&gt;&lt;P&gt;Customer also has some users on the internet that resolve on this internal DNS, for the internal hosts.&lt;/P&gt;&lt;P&gt;We used this sk but the dns lookup still returns the internal addresses.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 09:08:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206031#M38913</guid>
      <dc:creator>CarlosDias</dc:creator>
      <dc:date>2024-02-14T09:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206033#M38914</link>
      <description>&lt;P&gt;In your described scenario, you do not need&amp;nbsp;&lt;SPAN&gt;sk34295. You need your internal DNS server to be available on internet, which means simple host or port address translation rule, depending on whether or not you have a spare IP address. Then, your your users should define that external IP address as their primary DNS server.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 09:15:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206033#M38914</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-02-14T09:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206037#M38917</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The internal DNS is available from internet. It has a NAT address on the FW and the external users use this address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But that is not the question.&lt;/P&gt;&lt;P&gt;This DNS also resolves internal servers for internal addresses. This servers also have a NAT address on the FW.&lt;/P&gt;&lt;P&gt;The problem is that external users when resolving the names of this servers, receive the internal address which is useless.&lt;/P&gt;&lt;P&gt;What we need it that checkpoint understands that it must translate the response to the NAT addresses, so that external users could access this internal servers.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 09:43:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206037#M38917</guid>
      <dc:creator>CarlosDias</dc:creator>
      <dc:date>2024-02-14T09:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206063#M38923</link>
      <description>&lt;P&gt;You may want to open TAC case for this.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 12:19:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206063#M38923</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-02-14T12:19:28Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206122#M38934</link>
      <description>&lt;P&gt;The way I am reading this, and the way NAT rules are typically configured, the fw is looking for a public IP DNS response to translate to the internal IP address (original IP). You may be able to make this work with a "dummy" NAT rule configured in the other direction, but I am not saying that is a great idea.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;the NAT DNS payload requires static NAT rules in which the DNS response that needs to be translated is set as the original destination, and the requested translation for it is the translated destination.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 18:50:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206122#M38934</guid>
      <dc:creator>Lloyd_Braun</dc:creator>
      <dc:date>2024-02-14T18:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206133#M38937</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I already configured the static NAT rules as requested by the sk.&lt;/P&gt;&lt;P&gt;Does not work&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 20:24:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206133#M38937</guid>
      <dc:creator>CarlosDias</dc:creator>
      <dc:date>2024-02-14T20:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206200#M38953</link>
      <description>&lt;P&gt;The way I am reading that SK, it is describing a scenario where DNS resolves records to the public IP and the firewall changes DNS payload to the internal IP. So you have a different use case, wanting to NAT DNS payload from private to public IP. You could put a test DNS record in with the public IP to see if that DNS rewrite mechanism is working in the other direction. (rewriting original destination IP to xlate destination IP as opposed to xlated destination IP to original destination IP)&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2024 15:54:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206200#M38953</guid>
      <dc:creator>Lloyd_Braun</dc:creator>
      <dc:date>2024-02-15T15:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206203#M38954</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Well on the sk there is writen:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The regular NAT rules used to translate the internal servers will suffice. There is no need to define special NAT rules in addition to the regular ones defined.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So I imagined this sk assumes the DNS is internal, and ouside users authorized to resolved on this DNS internal server, should have the dns payload changed to the ips of the NAT rules,&lt;/P&gt;&lt;P&gt;But I may be wrong.&lt;/P&gt;&lt;P&gt;This is how other manufactures do !!!&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2024 16:05:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206203#M38954</guid>
      <dc:creator>CarlosDias</dc:creator>
      <dc:date>2024-02-15T16:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT - sk34295</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206249#M38963</link>
      <description>&lt;P&gt;All valid points...&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2024 23:21:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-sk34295/m-p/206249#M38963</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-02-15T23:21:46Z</dc:date>
    </item>
  </channel>
</rss>

