<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT based on source address and destination address and destination port in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-based-on-source-address-and-destination-address-and/m-p/58988#M4461</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I wanted to run this by the board here, and maybe help others looking for a similar answer.&lt;/P&gt;&lt;P&gt;I have a firewall migration where the existing NAT is set up to translate traffic from different sources destined to the the same public IP (not the interface IP), and different ports.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The use cases are as follows:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Incoming packet from src:3.3.3.3 dst:2.2.2.1 port:4567, translate to src:3.3.3.3 dst:10.2.2.1 port:4567&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:4.4.4.4 dst:2.2.2.1 port:5678, translate to src:4.4.4.4 dst: 10.4.4.1 port:5678&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:4.4.4.5 dst:2.2.2.1 port:5678, translate to src:4.4.4.5 dst: 10.4.4.1 port:5678&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:4.4.4.4 dst:2.2.2.1 port:6789, translate to src:4.4.4.4 dst: 10.4.4.1 port:6789&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:4.4.4.5 dst:2.2.2.1 port:6789, translate to src:4.4.4.5 dst: 10.4.4.1 port:6789&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:5.5.5.5 dst:2.2.2.1 port:7890, translate to src:5.5.5.5 dst: 10.5.5.1 port:7890&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Lines 2,3,4,5 represent a group of source hosts that connect to multiple destination ports.&lt;/P&gt;&lt;P&gt;Field Abreviations:&amp;nbsp;Orignal Source(OSrc), Original Destination(ODst), Orignal Service(OSrv), Translated Source(TSrc), Translated Destination(TDst), Translated Service(TSrv)&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe that I need to configure manual rules for each of these as follows, and also configure a proxy arp entry for 2.2.2.1:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;OSrc:3.3.3.3 ODst:2.2.2.1 OSrv:4567 TSrc:Original TDst:10.2.2.1 TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:10.2.2.1 ODst:3.3.3.3 OSrv:Any TSrc:2.2.2.1 TDst:Original TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:(4.4.4.4-4.4.4.5) ODst:2.2.2.1 OSrv:5678 TSrc:Original TDst:10.4.4.1 TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:(4.4.4.4-4.4.4.5) ODst:2.2.2.1 OSrv:6789 TSrc:Original TDst:10.4.4.1 TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:10.4.4.1 ODst:(4.4.4.4-4.4.4.5) OSrv:Any TSrc:2.2.2.1 TDst:Original TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:5.5.5.5 ODst:2.2.2.1 OSrv:7890 TSrc:Original TDst:10.5.5.1 TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:10.5.5.1 ODst:5.5.5.5 OSrv:Any TSrc:2.2.2.1 TDst:Original TSrv:Original&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;With lines 3 and 4, since the return traffic will be the same, there is only line 5 that is needed, but this is because I am assuming that the use of Any for the original port for the return traffic is correct.&lt;/P&gt;&lt;P&gt;Does this look correct, or is there a better way to do this without manual NAT?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Leon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 25 Jul 2019 19:44:05 GMT</pubDate>
    <dc:creator>Leon_Jaimes1</dc:creator>
    <dc:date>2019-07-25T19:44:05Z</dc:date>
    <item>
      <title>NAT based on source address and destination address and destination port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-based-on-source-address-and-destination-address-and/m-p/58988#M4461</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I wanted to run this by the board here, and maybe help others looking for a similar answer.&lt;/P&gt;&lt;P&gt;I have a firewall migration where the existing NAT is set up to translate traffic from different sources destined to the the same public IP (not the interface IP), and different ports.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The use cases are as follows:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Incoming packet from src:3.3.3.3 dst:2.2.2.1 port:4567, translate to src:3.3.3.3 dst:10.2.2.1 port:4567&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:4.4.4.4 dst:2.2.2.1 port:5678, translate to src:4.4.4.4 dst: 10.4.4.1 port:5678&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:4.4.4.5 dst:2.2.2.1 port:5678, translate to src:4.4.4.5 dst: 10.4.4.1 port:5678&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:4.4.4.4 dst:2.2.2.1 port:6789, translate to src:4.4.4.4 dst: 10.4.4.1 port:6789&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:4.4.4.5 dst:2.2.2.1 port:6789, translate to src:4.4.4.5 dst: 10.4.4.1 port:6789&lt;/LI&gt;&lt;LI&gt;Incoming packet from src:5.5.5.5 dst:2.2.2.1 port:7890, translate to src:5.5.5.5 dst: 10.5.5.1 port:7890&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Lines 2,3,4,5 represent a group of source hosts that connect to multiple destination ports.&lt;/P&gt;&lt;P&gt;Field Abreviations:&amp;nbsp;Orignal Source(OSrc), Original Destination(ODst), Orignal Service(OSrv), Translated Source(TSrc), Translated Destination(TDst), Translated Service(TSrv)&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe that I need to configure manual rules for each of these as follows, and also configure a proxy arp entry for 2.2.2.1:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;OSrc:3.3.3.3 ODst:2.2.2.1 OSrv:4567 TSrc:Original TDst:10.2.2.1 TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:10.2.2.1 ODst:3.3.3.3 OSrv:Any TSrc:2.2.2.1 TDst:Original TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:(4.4.4.4-4.4.4.5) ODst:2.2.2.1 OSrv:5678 TSrc:Original TDst:10.4.4.1 TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:(4.4.4.4-4.4.4.5) ODst:2.2.2.1 OSrv:6789 TSrc:Original TDst:10.4.4.1 TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:10.4.4.1 ODst:(4.4.4.4-4.4.4.5) OSrv:Any TSrc:2.2.2.1 TDst:Original TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:5.5.5.5 ODst:2.2.2.1 OSrv:7890 TSrc:Original TDst:10.5.5.1 TSrv:Original&lt;/LI&gt;&lt;LI&gt;OSrc:10.5.5.1 ODst:5.5.5.5 OSrv:Any TSrc:2.2.2.1 TDst:Original TSrv:Original&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;With lines 3 and 4, since the return traffic will be the same, there is only line 5 that is needed, but this is because I am assuming that the use of Any for the original port for the return traffic is correct.&lt;/P&gt;&lt;P&gt;Does this look correct, or is there a better way to do this without manual NAT?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Leon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 19:44:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-based-on-source-address-and-destination-address-and/m-p/58988#M4461</guid>
      <dc:creator>Leon_Jaimes1</dc:creator>
      <dc:date>2019-07-25T19:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: NAT based on source address and destination address and destination port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-based-on-source-address-and-destination-address-and/m-p/58990#M4462</link>
      <description>Because port factors in, manual rules are what you have to use.&lt;BR /&gt;Curious why you're using two rules for these different use cases.&lt;BR /&gt;Is it because the traffic could be initiated from either end?</description>
      <pubDate>Fri, 26 Jul 2019 00:21:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-based-on-source-address-and-destination-address-and/m-p/58990#M4462</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-26T00:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: NAT based on source address and destination address and destination port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-based-on-source-address-and-destination-address-and/m-p/59004#M4465</link>
      <description>&lt;P&gt;On the two rules, I might be misunderstanding the Manual NAT. &amp;nbsp;I thought it needed the rule to match the reverse traffic. &amp;nbsp;Or is that incorrect and the return traffic matches the rule that was used by the initiating traffic?&lt;/P&gt;&lt;P&gt;[edit] - The traffic may need to be initiated from either side as well, I will double check on that.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2019 03:36:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-based-on-source-address-and-destination-address-and/m-p/59004#M4465</guid>
      <dc:creator>Leon_Jaimes1</dc:creator>
      <dc:date>2019-07-26T03:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: NAT based on source address and destination address and destination port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-based-on-source-address-and-destination-address-and/m-p/59040#M4467</link>
      <description>If it could be initiated from either side, then you need NAT rules for both directions.&lt;BR /&gt;Otherwise, you only need NAT rules in one direction, which will handle reply traffic.</description>
      <pubDate>Fri, 26 Jul 2019 17:41:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-based-on-source-address-and-destination-address-and/m-p/59040#M4467</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-26T17:41:52Z</dc:date>
    </item>
  </channel>
</rss>

