<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Validate the Manual NAT and access control policy rules in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237365#M46076</link>
    <description>&lt;P&gt;Would indeed also recommend to make the rule more specific with a port like for example tcp443&lt;/P&gt;
&lt;P&gt;Also make sure if needed proxy arp is in place for the public IP. Firewall needs to know the public IP belongs to him.&lt;/P&gt;
&lt;P&gt;Unless the public IP is in the topology itself of the firewall (configured direct on a interface)&lt;/P&gt;
&lt;P&gt;Best way to test if arp works correct is to see traffic logs, if you see traffic towards the public IP you know arp works.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 01 Jan 2025 10:06:01 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2025-01-01T10:06:01Z</dc:date>
    <item>
      <title>Validate the Manual NAT and access control policy rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237358#M46074</link>
      <description>&lt;P&gt;Hello Checkmates,&lt;/P&gt;&lt;P&gt;I want your expert experience to validate the below Manual NAT and access control policy format.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want internet users can access our internal server with the public IP_A, Is the below format valid? I am using the same public IP for others servers with different services ports, that's why i am using Manual NAT.&lt;/P&gt;&lt;TABLE width="567"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="567"&gt;Manual NAT and Access control policy rule matching&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;TD&gt;NAT rule&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;Original source&lt;/TD&gt;&lt;TD&gt;original Destination&lt;/TD&gt;&lt;TD&gt;Translated destination&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;AAAirport&amp;nbsp;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;any&amp;nbsp;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Public IP_A&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Private IP_A&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Access control policy&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Name&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;Source&lt;/TD&gt;&lt;TD&gt;Destination&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Access_AAAirport&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Any&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Public IP_A&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Wed, 01 Jan 2025 07:01:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237358#M46074</guid>
      <dc:creator>yeruel</dc:creator>
      <dc:date>2025-01-01T07:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Validate the Manual NAT and access control policy rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237362#M46075</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;If I were you I would differentiate the NAT rules per service port. This allow you to handle the rules furthermore separately.&lt;/P&gt;
&lt;P&gt;I usually follow this attitude.&lt;/P&gt;
&lt;P&gt;But should work what you asked.&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2025 08:55:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237362#M46075</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2025-01-01T08:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: Validate the Manual NAT and access control policy rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237365#M46076</link>
      <description>&lt;P&gt;Would indeed also recommend to make the rule more specific with a port like for example tcp443&lt;/P&gt;
&lt;P&gt;Also make sure if needed proxy arp is in place for the public IP. Firewall needs to know the public IP belongs to him.&lt;/P&gt;
&lt;P&gt;Unless the public IP is in the topology itself of the firewall (configured direct on a interface)&lt;/P&gt;
&lt;P&gt;Best way to test if arp works correct is to see traffic logs, if you see traffic towards the public IP you know arp works.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2025 10:06:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237365#M46076</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-01-01T10:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Validate the Manual NAT and access control policy rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237366#M46077</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/28415"&gt;@AkosBakos&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand, I did different rule1 , rule2 , rule 3 to map the same public IP with private ip differently according to the services port. the above one is just for rule1, I did the same for others rules. So the above NAT rule and access rules format is valid. Right?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2025 10:07:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237366#M46077</guid>
      <dc:creator>yeruel</dc:creator>
      <dc:date>2025-01-01T10:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Validate the Manual NAT and access control policy rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237367#M46078</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I seems, only one Public_IP relevant here, so proxy ARP is not relevant (yet)&lt;/P&gt;
&lt;P&gt;Yes, access rules are recommended to separate too.&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2025 10:11:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237367#M46078</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2025-01-01T10:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: Validate the Manual NAT and access control policy rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237369#M46079</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/104175"&gt;@yeruel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suggest you&amp;nbsp;one-to-one correspondence. One NAT rule belogs to one Access rule. This is the best way.&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2025 10:31:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237369#M46079</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2025-01-01T10:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: Validate the Manual NAT and access control policy rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237370#M46080</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/28415"&gt;@AkosBakos&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. for access rules, destination will be public IP_A?&lt;/P&gt;&lt;P&gt;2. If we have more than one public IP for example&lt;/P&gt;&lt;P&gt;213.66.95.13---External gateway interface&lt;BR /&gt;213.66.95.10---will be used for Hide NAT IP address&lt;BR /&gt;213.66.95.11, 12 will be used to publish servers for accessing from internet.&lt;BR /&gt;&lt;BR /&gt;213.66.95.10,11,12 are added in the ARP gaia portal.&lt;/P&gt;&lt;P&gt;ARP 213.66.95.10, 213.66.95.11, and also 213.66.95.12 in the arp with real ip address 213.66.95.13 and outside interface.&lt;/P&gt;&lt;P&gt;Any advice please?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2025 10:35:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237370#M46080</guid>
      <dc:creator>yeruel</dc:creator>
      <dc:date>2025-01-01T10:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: Validate the Manual NAT and access control policy rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237371#M46081</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/104175"&gt;@yeruel&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"213.66.95.10,11,12 are added in the ARP gaia portal" -&amp;gt; don't forget to add to all members this enties (both cluster members)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The guide is here:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk30197" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk30197&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;---I deleted my sentence, my wording was misleadning---&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Akos&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2025 14:10:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237371#M46081</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2025-01-01T14:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: Validate the Manual NAT and access control policy rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237372#M46082</link>
      <description>&lt;P&gt;As long as you see the traffic in the logs (allowed or blocked) you know config is correct on arp level.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1. for access rules, destination will be public IP_A? - correct&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2025 12:19:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Validate-the-Manual-NAT-and-access-control-policy-rules/m-p/237372#M46082</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-01-01T12:19:50Z</dc:date>
    </item>
  </channel>
</rss>

