<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic access to azure web server via office CP and s2s VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/access-to-azure-web-server-via-office-CP-and-s2s-VPN/m-p/240999#M46744</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;customer has a S2S VPN from the office Check Point to Azure.&lt;/P&gt;&lt;P&gt;They are able access all their servers hosted in Azure via the VPN.&lt;/P&gt;&lt;P&gt;Now they want to access an Azure web server from the Internet but via the office CP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have implemented the following:&lt;/P&gt;&lt;P&gt;1. Added a rule allowing Internet access to the web server public IP (https)&lt;/P&gt;&lt;P&gt;2. Added a source and destination NAT rule&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; where&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; original source - Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; original destination - 196.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; translated source - 172.30.x.x&amp;nbsp; (internal IP)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; translated destination - 192.168.x.x&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Added the public IP to the Azure VPN domain&lt;/P&gt;&lt;P&gt;4. Internal IP included the CP gateway VPN domain&lt;/P&gt;&lt;P&gt;5. Changed VPN routing to "To center or through the center&amp;nbsp; to other satellites, to Internet and other VPN targets"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Logs show the traffic being "Encrypted in the community" and the relevant NAT rule applied.&lt;/P&gt;&lt;P&gt;However we can't access the web site.&lt;/P&gt;&lt;P&gt;tcpdump and fw monitor do not capture anything for the translated source or translated destination IPs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suspect that the traffic does not traverse the VPN, maybe because not being translated?&lt;/P&gt;&lt;P&gt;fw monitor does show this for my IP, from what I understand the NAT should have taken place before the "Post-Outbound VM"&lt;/P&gt;&lt;P&gt;[vs_0][ppak_0] eth1:Oe[44]: 41.160.x.x -&amp;gt; 196.x.x.x (TCP) len=52 id=51573&lt;BR /&gt;TCP: 56844 -&amp;gt; 80 .S.... seq=106564e8 ack=0000000&lt;/P&gt;&lt;P&gt;Am I missing any configs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2025 09:02:11 GMT</pubDate>
    <dc:creator>Mark_Edwards</dc:creator>
    <dc:date>2025-02-12T09:02:11Z</dc:date>
    <item>
      <title>access to azure web server via office CP and s2s VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/access-to-azure-web-server-via-office-CP-and-s2s-VPN/m-p/240999#M46744</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;customer has a S2S VPN from the office Check Point to Azure.&lt;/P&gt;&lt;P&gt;They are able access all their servers hosted in Azure via the VPN.&lt;/P&gt;&lt;P&gt;Now they want to access an Azure web server from the Internet but via the office CP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have implemented the following:&lt;/P&gt;&lt;P&gt;1. Added a rule allowing Internet access to the web server public IP (https)&lt;/P&gt;&lt;P&gt;2. Added a source and destination NAT rule&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; where&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; original source - Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; original destination - 196.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; translated source - 172.30.x.x&amp;nbsp; (internal IP)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; translated destination - 192.168.x.x&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Added the public IP to the Azure VPN domain&lt;/P&gt;&lt;P&gt;4. Internal IP included the CP gateway VPN domain&lt;/P&gt;&lt;P&gt;5. Changed VPN routing to "To center or through the center&amp;nbsp; to other satellites, to Internet and other VPN targets"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Logs show the traffic being "Encrypted in the community" and the relevant NAT rule applied.&lt;/P&gt;&lt;P&gt;However we can't access the web site.&lt;/P&gt;&lt;P&gt;tcpdump and fw monitor do not capture anything for the translated source or translated destination IPs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suspect that the traffic does not traverse the VPN, maybe because not being translated?&lt;/P&gt;&lt;P&gt;fw monitor does show this for my IP, from what I understand the NAT should have taken place before the "Post-Outbound VM"&lt;/P&gt;&lt;P&gt;[vs_0][ppak_0] eth1:Oe[44]: 41.160.x.x -&amp;gt; 196.x.x.x (TCP) len=52 id=51573&lt;BR /&gt;TCP: 56844 -&amp;gt; 80 .S.... seq=106564e8 ack=0000000&lt;/P&gt;&lt;P&gt;Am I missing any configs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 09:02:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/access-to-azure-web-server-via-office-CP-and-s2s-VPN/m-p/240999#M46744</guid>
      <dc:creator>Mark_Edwards</dc:creator>
      <dc:date>2025-02-12T09:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: access to azure web server via office CP and s2s VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/access-to-azure-web-server-via-office-CP-and-s2s-VPN/m-p/241252#M46800</link>
      <description>&lt;P&gt;Why route traffic for a cloud-hosted resource through an on-premise gateway?&lt;/P&gt;
&lt;P&gt;Only traffic that originates from the encryption domain BEFORE NAT will be encrypted.&lt;BR /&gt;The only way I could see this working is with a route-based VPN where your local encryption domain is NULL.&lt;BR /&gt;If you're using a Domain-Based VPN, this is not likely to ever work.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2025 21:55:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/access-to-azure-web-server-via-office-CP-and-s2s-VPN/m-p/241252#M46800</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-14T21:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: access to azure web server via office CP and s2s VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/access-to-azure-web-server-via-office-CP-and-s2s-VPN/m-p/241926#M46988</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;They don't have any security in Azure apart from security groups.&lt;/P&gt;&lt;P&gt;We managed to get it working by adding the on-premise public IP to the Azure encryption domain, unchecking disable NAT in the VPN community and adding manual NAT rules.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 11:10:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/access-to-azure-web-server-via-office-CP-and-s2s-VPN/m-p/241926#M46988</guid>
      <dc:creator>Mark_Edwards</dc:creator>
      <dc:date>2025-02-21T11:10:08Z</dc:date>
    </item>
  </channel>
</rss>

