<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN established, but failed to forward traffic via VPN with source and destination NAT. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239522#M46474</link>
    <description>&lt;P&gt;NAT via VPNs adds complexity. &amp;nbsp;Are you sure you REALLY need it? &amp;nbsp;(sometimes you do, but be certain that you do).&lt;/P&gt;
&lt;P&gt;The VPN domain group for your gateway should include the IP (or subnet) for "&lt;SPAN&gt;our public IP_2" [the post-translation address] as well as your internal Private &amp;nbsp;IP. &amp;nbsp;The VPN domain group for the peer gateway should include the IP (or subnet) for "External party's private IP".&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The access rule should reflect only your internal private IP and the external party private IP; NOT the NAT translations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Be sure your IPsec SA is indeed established to include the translated source IP. &amp;nbsp;Use "vpn tu tlist" on the gateway to see the VPNs and the traffic selectors ("My TS" for your side, and "Peer TS" for the remote side) .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check the VPN community Advanced properties and be sure "Disable NAT..." is unchecked.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You may also need to verify how your gateway is applying NAT. &amp;nbsp;Visit "Global Properties" - NAT - be sure "translate destination on client side" is selected for both Automatic and Manual NAT.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Install policy and test it again. &amp;nbsp;That should get you going.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Like I said... it's complex. &amp;nbsp;Are you CERTAIN &amp;nbsp;that you REALLY need it?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jan 2025 02:00:24 GMT</pubDate>
    <dc:creator>Duane_Toler</dc:creator>
    <dc:date>2025-01-24T02:00:24Z</dc:date>
    <item>
      <title>VPN established, but failed to forward traffic via VPN with source and destination NAT.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239101#M46392</link>
      <description>&lt;P&gt;Recently we are migrating the internet VPN tunnel from CP1430 to CP6600 due to EoL.&amp;nbsp;&lt;SPAN class=""&gt;Firewall log is attached, showing the source and destination NAT is done. The connection was encrypted.&amp;nbsp; But it failed to connect to the destination. Opened the TAC SR, but still not able to fix the problem. May I have a help from anyone...?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;===========================================&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT:&lt;BR /&gt;Original Source:&lt;/STRONG&gt; internal private IP&lt;BR /&gt;&lt;STRONG&gt;Original Destination:&lt;/STRONG&gt; our public IP_1&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Translated Source:&lt;/STRONG&gt; our public IP_2&lt;BR /&gt;&lt;STRONG&gt;Translated Destination:&lt;/STRONG&gt; External party's private IP&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;*public IP_1 and public IP_2 are different subnet&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Encryption Domain:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Center Gateways (Our side):&lt;/STRONG&gt;&amp;nbsp;public IP_2&lt;BR /&gt;&lt;STRONG&gt;Satellite Gateways (External party):&amp;nbsp;&lt;/STRONG&gt;our public IP_1 &amp;amp;&amp;nbsp;External party's private IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Ran the fw monitor, see the traffic from internal to the public IP_1. But are unable to see the traffic after the translation.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;gt; fw monitor -e "accept host(&lt;FONT color="#FF0000"&gt;our public IP_1&lt;/FONT&gt;) or host(&lt;FONT color="#FF0000"&gt;our public IP_2&lt;/FONT&gt;);" -m iO&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;[vs_0][fw_0] eth1:i[44]: &lt;FONT color="#FF0000"&gt;internal private IP&lt;/FONT&gt; -&amp;gt; &lt;FONT color="#FF0000"&gt;public IP_1&lt;/FONT&gt; (TCP) len=60 id=48107&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;TCP: 19189 -&amp;gt; 28161 .S.... seq=2cf0285d ack=00000000&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;[vs_0][fw_2] eth1:i[44]: &lt;FONT color="#FF0000"&gt;internal private IP&lt;/FONT&gt; -&amp;gt; &lt;FONT color="#FF0000"&gt;public IP_1&lt;/FONT&gt; (TCP) len=60 id=48274&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;TCP: 19475 -&amp;gt; 28161 .S.... seq=2d2bb491 ack=00000000&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;[vs_0][fw_1] eth1:i[44]: &lt;FONT color="#FF0000"&gt;internal private IP&lt;/FONT&gt; -&amp;gt; &lt;FONT color="#FF0000"&gt;public IP_1&lt;/FONT&gt; (TCP) len=60 id=17132&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;TCP: 46560 -&amp;gt; 28161 .S.... seq=49f63204 ack=00000000&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;[vs_0][fw_1] eth1:i[44]: &lt;FONT color="#FF0000"&gt;internal private IP&lt;/FONT&gt; -&amp;gt; &lt;FONT color="#FF0000"&gt;public IP_1&lt;/FONT&gt; (TCP) len=60 id=30396&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;TCP: 46562 -&amp;gt; 28161 .S.... seq=ec481354 ack=00000000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Troubleshoot I did:&lt;/STRONG&gt;&lt;BR /&gt;1. Removed&amp;nbsp;public IP_1 or&amp;nbsp;External party's private IP from the encryption domain, but still got the issue.&lt;BR /&gt;2. Moved public IP_1 from&amp;nbsp;Satellite Gateways's encryption domain to&amp;nbsp;Center Gateways's encryption domain, but not working.&lt;BR /&gt;3 Added a static route that pointing public IP_1 to the internet gateway address, failed to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2025 23:41:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239101#M46392</guid>
      <dc:creator>Roy_Tam</dc:creator>
      <dc:date>2025-01-20T23:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN established, but failed to forward traffic via VPN with source and destination NAT.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239460#M46444</link>
      <description>&lt;P&gt;You should look at all the chains in fw monitor, not just i and O.&lt;BR /&gt;You might also want to see if the traffic is getting dropped using something like:&amp;nbsp;fw ctl zdebug + drop | grep '1.2.3.4'&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 13:20:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239460#M46444</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-23T13:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN established, but failed to forward traffic via VPN with source and destination NAT.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239522#M46474</link>
      <description>&lt;P&gt;NAT via VPNs adds complexity. &amp;nbsp;Are you sure you REALLY need it? &amp;nbsp;(sometimes you do, but be certain that you do).&lt;/P&gt;
&lt;P&gt;The VPN domain group for your gateway should include the IP (or subnet) for "&lt;SPAN&gt;our public IP_2" [the post-translation address] as well as your internal Private &amp;nbsp;IP. &amp;nbsp;The VPN domain group for the peer gateway should include the IP (or subnet) for "External party's private IP".&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The access rule should reflect only your internal private IP and the external party private IP; NOT the NAT translations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Be sure your IPsec SA is indeed established to include the translated source IP. &amp;nbsp;Use "vpn tu tlist" on the gateway to see the VPNs and the traffic selectors ("My TS" for your side, and "Peer TS" for the remote side) .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check the VPN community Advanced properties and be sure "Disable NAT..." is unchecked.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You may also need to verify how your gateway is applying NAT. &amp;nbsp;Visit "Global Properties" - NAT - be sure "translate destination on client side" is selected for both Automatic and Manual NAT.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Install policy and test it again. &amp;nbsp;That should get you going.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Like I said... it's complex. &amp;nbsp;Are you CERTAIN &amp;nbsp;that you REALLY need it?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 02:00:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239522#M46474</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-01-24T02:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN established, but failed to forward traffic via VPN with source and destination NAT.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239523#M46475</link>
      <description>&lt;P&gt;Hi Duane, thanks for your reply. Yes, the NAT is required.... as the destination is the private address, we do not expect to be advertised within our internal network due to the IP conflict...&lt;/P&gt;&lt;P&gt;I will review your instruction on my firewall.&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":folded_hands:"&gt;🙏&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 02:10:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239523#M46475</guid>
      <dc:creator>Roy_Tam</dc:creator>
      <dc:date>2025-01-24T02:10:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN established, but failed to forward traffic via VPN with source and destination NAT.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239525#M46476</link>
      <description>&lt;P&gt;Ok sounds good. &amp;nbsp;Then you need it. &amp;nbsp;Just had to ask. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;BR /&gt;If you have an overlap/conflict situation then there's a&lt;SPAN&gt;nother item to consider: &amp;nbsp;Is the remote end also doing a reverse NAT?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You also need to have a NAT rule for the reverse, if they ever initiate connections to you. &amp;nbsp; The two of you will share an "interim NAT" between the two VPN gateways.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You: &amp;nbsp;192.168.0.0/16&lt;/P&gt;
&lt;P&gt;(NAT for your side: 172.16.0.0/16;&lt;/P&gt;
&lt;P&gt;NAT for their side: 172.17.0.0/16)&lt;/P&gt;
&lt;P&gt;Them: 192.168.0.0/16 &amp;nbsp;[conflict with your network]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You'll never see/use their 192.168.0.0/16 in this case. &amp;nbsp;All of your connections to them must be sent to destination 172.17.0.0/16, and you will source NAT yourself to 172.16.0.0/16. &amp;nbsp;When they receive the packet, they will need to un-NAT connections with Source 172.16.0.0/16 and Destination 172.17.0.0/16, and translate the destination back to their 192.168.0.0/16, but NOT translate the source; they will only see you as 172.16.0.0/16.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that makes sense, and hopefully that's what you have configured.&lt;/P&gt;
&lt;P&gt;If you have DNS names involved... heh, good luck. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &amp;nbsp;DNS names also need to be re-written somewhere to resolve to the shared NAT space. This gets *really* complex (Do you use HOSTS files? Setup a fake authoritative DNS server? Conditional zone?).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 03:03:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-established-but-failed-to-forward-traffic-via-VPN-with/m-p/239525#M46476</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-01-24T03:03:33Z</dc:date>
    </item>
  </channel>
</rss>

