<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISP Redundacy Load Sharing - NAT in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/256912#M50357</link>
    <description>&lt;P&gt;With Quantum SD-WAN You can achieve all that in a much simpler way including using SNAT pool per ISP with load sharing per traffic (user/src/dst/updatable obj, application, etc)&lt;BR /&gt;Also Quantum SD-WAN will still accelerate those connections, in oppose to ISP Redundancy Load sharing that uses slow path AFAIK.&lt;/P&gt;</description>
    <pubDate>Tue, 09 Sep 2025 16:27:35 GMT</pubDate>
    <dc:creator>AmirArama</dc:creator>
    <dc:date>2025-09-09T16:27:35Z</dc:date>
    <item>
      <title>ISP Redundacy Load Sharing - NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/254646#M49862</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;I am configuring a Check Point firewall with two internet links in Load Sharing mode using ISP Redundancy.&lt;/SPAN&gt; &lt;SPAN class=""&gt;The NAT is set up on the internal network objects using the "Hide Behind Gateway"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I have the following questions:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;How does NAT function in Load Sharing mode?&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN class=""&gt;Does the firewall apply Hide NAT based on the active ISP interface for each connection?&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN class=""&gt;Are static NAT rules ignored in this mode?&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Is it possible to use a SNAT Pool with ISP Redundancy in Load Sharing mode?&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN class=""&gt;Can I configure a pool of public IPs for outgoing connections, ensuring that traffic is NATed to the appropriate public IP based on the active ISP link?&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Wed, 06 Aug 2025 13:37:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/254646#M49862</guid>
      <dc:creator>Campinho</dc:creator>
      <dc:date>2025-08-06T13:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISP Redundacy Load Sharing - NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/254853#M49894</link>
      <description>&lt;P&gt;This is what AI Copilot has to say for the matter:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV class="ai-chatbot-conversation-assistant-text css-1m564fq"&gt;
&lt;P&gt;Here are detailed answers to your questions about NAT and ISP Redundancy in Load Sharing mode on Check Point firewalls:&lt;/P&gt;
&lt;HR /&gt;
&lt;H3&gt;1.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;How does NAT function in Load Sharing mode?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Hide NAT&lt;/STRONG&gt;: When using ISP Redundancy in Load Sharing mode, outgoing traffic is distributed between the ISP links according to the configured weights. Hide NAT is typically set to "Hide behind Gateway," which means the source address of outgoing packets is translated to the address of the interface through which the packet leaves the Security Gateway.&lt;/LI&gt;
&lt;LI&gt;This ensures that return packets are routed back through the correct ISP link, as the NATed source matches the egress interface.&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H3&gt;2.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Does the firewall apply Hide NAT based on the active ISP interface for each connection?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Yes.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;The firewall applies Hide NAT based on the interface used for each connection. Each outgoing connection is NATed to the IP address of the interface it uses to exit the gateway. This is essential for correct routing of return traffic.&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H3&gt;3.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Are static NAT rules ignored in this mode?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;No, static NAT rules are not ignored.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Static NAT is still supported and required for incoming connections (e.g., for servers accessible from the Internet). For each server, you typically assign a public IP from each ISP and configure static NAT rules accordingly.&lt;/LI&gt;
&lt;LI&gt;For outgoing connections, Hide NAT is most commonly used, but static NAT can be applied if specifically configured.&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H3&gt;4.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Is it possible to use a SNAT Pool with ISP Redundancy in Load Sharing mode?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Not natively in the same way as some other vendors.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;By default, Check Point's "Hide behind Gateway" will use the interface IP for NAT. However, you can achieve a similar effect (using a pool of public IPs) by using manual NAT rules and dynamic objects, but this requires advanced configuration and scripting.&lt;/LI&gt;
&lt;LI&gt;See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk174197" target="_blank" rel="noopener"&gt;SK174197&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for an example of using dynamic objects and scripts to switch Hide NAT pools during failover (primarily documented for Primary/Backup mode, but similar logic can be adapted).&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H3&gt;5.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Can I configure a pool of public IPs for outgoing connections, ensuring that traffic is NATed to the appropriate public IP based on the active ISP link?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;By default, no.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Outgoing connections are NATed to the interface IP of the egress ISP link.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;You can manually configure NAT rules to use specific public IPs (from a pool) for different internal networks or hosts. This can be done using manual NAT rules and dynamic objects, but it is not as seamless as "SNAT Pool" features in some other firewalls.&lt;/LI&gt;
&lt;LI&gt;For advanced scenarios (e.g., using a pool of IPs per ISP and switching them during failover), you would need to use custom scripts and dynamic objects as described in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk174197" target="_blank" rel="noopener"&gt;SK174197&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H4&gt;&lt;STRONG&gt;References &amp;amp; Best Practices&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;For most deployments, "Hide behind Gateway" is sufficient and recommended for outgoing traffic.&lt;/LI&gt;
&lt;LI&gt;For incoming connections, assign a public IP per ISP and configure static NAT.&lt;/LI&gt;
&lt;LI&gt;For advanced NAT pool requirements, consult the following:
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk174197" target="_blank" rel="noopener"&gt;SK174197&lt;/A&gt;: How to configure Hide NAT for different IP Address Ranges to work with ISP Redundancy in the Primary/Backup mode&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk34812" target="_blank" rel="noopener"&gt;SK34812&lt;/A&gt;: ISP Redundancy configuration&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;STRONG&gt;Summary Table&lt;/STRONG&gt;&lt;/P&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Scenario&lt;/TH&gt;
&lt;TH&gt;Supported?&lt;/TH&gt;
&lt;TH&gt;Notes&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Hide NAT per ISP&lt;/TD&gt;
&lt;TD&gt;Yes&lt;/TD&gt;
&lt;TD&gt;NATs to interface IP of egress ISP&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Static NAT in Load Sharing&lt;/TD&gt;
&lt;TD&gt;Yes&lt;/TD&gt;
&lt;TD&gt;Required for incoming connections&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;SNAT Pool (native)&lt;/TD&gt;
&lt;TD&gt;No&lt;/TD&gt;
&lt;TD&gt;Workarounds possible with manual NAT and dynamic objects&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Pool of public IPs per ISP&lt;/TD&gt;
&lt;TD&gt;Possible (manual)&lt;/TD&gt;
&lt;TD&gt;Requires advanced configuration and scripting (see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk174197" target="_blank" rel="noopener"&gt;SK174197&lt;/A&gt;)&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;If you need step-by-step guidance for a specific advanced NAT pool scenario, let me know your exact requirements and I can provide more detailed instructions!&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="ai-chatbot-references css-g9n3fs"&gt;
&lt;DIV class="css-131f8vm"&gt;Learn more:&lt;/DIV&gt;
&lt;DIV class="css-zs1iv6"&gt;
&lt;OL class="css-3yupri"&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_NextGenSecurityGateway_Guide/Topics-FWG/ISP-Redundancy-on-Security-Gateway.htm" target="_blank" rel="noopener"&gt;R80.40 Next Generation Security Gateway Administration Guide - ISP-Redundancy-on-Security-Gateway&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R80.20SP/WebAdminGuides/EN/CP_R80.20SP_Maestro_NextGenSecurityGateway_Guide/Topics-Maestro-SecGW/ISP-Redundancy-on-Security-Gateway.htm" target="_blank" rel="noopener"&gt;R80.20SP Quantum Maestro Next Generation Security Gateway Administration Guide - ISP-Redundancy-on-Security-Gateway&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_NextGenSecurityGateway_Guide/Topics-FWG/ISP-Redundancy-on-Security-Gateway.htm" target="_blank" rel="noopener"&gt;R81 Quantum Security Gateway Guide - ISP-Redundancy-on-Security-Gateway&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Aug 2025 07:39:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/254853#M49894</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-08-11T07:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISP Redundacy Load Sharing - NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/254854#M49895</link>
      <description>&lt;P&gt;On top, I would also add&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk42636" target="_self"&gt;sk42636&lt;/A&gt; and all other SKs referenced there.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 07:40:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/254854#M49895</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-08-11T07:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISP Redundacy Load Sharing - NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/255376#M49965</link>
      <description>&lt;P&gt;Thank You&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;!&lt;BR /&gt;&lt;BR /&gt;I guess the best way is to implement SD-WAN in this case.&lt;BR /&gt;&lt;BR /&gt;My customer has too many diferent rules with DIfferent Source IPs and wants to use both ISP links.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 19:09:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/255376#M49965</guid>
      <dc:creator>Campinho</dc:creator>
      <dc:date>2025-08-18T19:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISP Redundacy Load Sharing - NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/255377#M49966</link>
      <description>&lt;P&gt;You got it, makes total sense.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 20:02:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/255377#M49966</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-18T20:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISP Redundacy Load Sharing - NAT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/256912#M50357</link>
      <description>&lt;P&gt;With Quantum SD-WAN You can achieve all that in a much simpler way including using SNAT pool per ISP with load sharing per traffic (user/src/dst/updatable obj, application, etc)&lt;BR /&gt;Also Quantum SD-WAN will still accelerate those connections, in oppose to ISP Redundancy Load sharing that uses slow path AFAIK.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2025 16:27:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-Redundacy-Load-Sharing-NAT/m-p/256912#M50357</guid>
      <dc:creator>AmirArama</dc:creator>
      <dc:date>2025-09-09T16:27:35Z</dc:date>
    </item>
  </channel>
</rss>

