<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nat inside VPN tunnel to Fortigate in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/262621#M51549</link>
    <description>&lt;P&gt;Yes i have seen that one but what interface should this translated IP being attached to ?&lt;/P&gt;</description>
    <pubDate>Wed, 12 Nov 2025 12:08:34 GMT</pubDate>
    <dc:creator>nooni</dc:creator>
    <dc:date>2025-11-12T12:08:34Z</dc:date>
    <item>
      <title>Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260324#M51047</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to do NAT translation inside the VPN tunnel and i cant wrap my head around this configuration.&lt;/P&gt;&lt;P&gt;The topology looks like this:&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31780i631779634CC93267/image-size/large?v=v2&amp;amp;px=999" role="button" title="vpn.png" alt="vpn.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the Encryption Domain on the Check Point i have 192.168.18.10 and 192.168.20.0/28&lt;/P&gt;&lt;P&gt;So server 192.168.18.10 should communicate with 10.10.13.1, which in turn is translated on the Fortigate side to 10.10.12.10.&lt;/P&gt;&lt;P&gt;First issue, Check Point will not route packet over VPN tunnel when i have 192.168.20.0/28 in the EncDom.&lt;/P&gt;&lt;P&gt;If i put 192.168.20.0/28, which i did for a test the phase2 fails, because of course this net is not on the other side really.&lt;/P&gt;&lt;P&gt;NAT is enabled in the community.&lt;/P&gt;&lt;P&gt;I need some suggestions on how to think here&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 13:07:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260324#M51047</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2025-10-20T13:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260330#M51049</link>
      <description>&lt;P&gt;I believe this is the NAT rule you are looking for if I am following you correctly.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN_NAT.png" style="width: 889px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31781iC000DC76F4D62DD6/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN_NAT.png" alt="VPN_NAT.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 13:50:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260330#M51049</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-10-20T13:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260331#M51050</link>
      <description>&lt;P&gt;I would like the 192.168.18.10 server communicate with IP address 192.168.20.1 and not directly with 10.10.13.1 therefore the NAT table looks a bit weird.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So SRC 192.168.18.10 sends traffic to IP 192.168.20.1 and then this traffic gets translated to 10.10.13.1 so i do not have to use 10.10.13.1 in my local network&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 14:44:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260331#M51050</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2025-10-20T14:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260339#M51051</link>
      <description>&lt;P&gt;The firewall needs to have a route for 192.168.20.1 somewhere if you want it to be a destination, so it would have to be in the encryption domain on the Fortigate side, but then you'd be doing the NAT translation on the Fortigate side.&lt;/P&gt;
&lt;P&gt;What problem are you trying to solve here?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 14:45:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260339#M51051</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-10-20T14:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260363#M51058</link>
      <description>&lt;P&gt;you need to change the source ip in the nat rule also as stated before.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the 192.168.20.1 is floating IP and should be attached to fw with proxy arp.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;both real local ip range + local NAT pool should be in local encr domain. You only need to add NAT pool of fortigate in remote peer enc domain, no need for you to know the real ip range there.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 16:42:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260363#M51058</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-10-20T16:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260372#M51059</link>
      <description>&lt;P&gt;I believe what Lesley suggested makes sense.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 18:22:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260372#M51059</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-20T18:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260426#M51071</link>
      <description>&lt;P&gt;Thanks, so 192.168.20.1 should be manually configured on each FW in the cluster, with the external as interface then ?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 07:43:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260426#M51071</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2025-10-21T07:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260439#M51073</link>
      <description>&lt;P&gt;No see it as floating IP, it does not have to be directly configured on the interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With proxy arp firewall will reply if traffic comes in with arp reply. Make the fw aware the floating IP belongs to the firewall. Just like you would do with public NAT if the IP range is routed to the fw and not directly configured on the interface.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 09:36:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260439#M51073</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-10-21T09:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260677#M51134</link>
      <description>&lt;P&gt;So i used the static nat function in the NAT object that should be sufficient.&lt;/P&gt;&lt;P&gt;So the manual NAT rule should look like this ?&lt;/P&gt;&lt;P&gt;Orig SRC 192.168.18.1 Orig DST 192.168.20.1 translated dst 10.10.13.1 ?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2025 08:25:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260677#M51134</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2025-10-23T08:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260682#M51136</link>
      <description>&lt;P&gt;That looks right.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2025 10:48:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/260682#M51136</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-23T10:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/262596#M51544</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Can you clarify a bit how the proxy arp should look like ?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 09:06:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/262596#M51544</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2025-11-12T09:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/262619#M51548</link>
      <description>&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk30197" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk30197&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 11:54:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/262619#M51548</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-12T11:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/262621#M51549</link>
      <description>&lt;P&gt;Yes i have seen that one but what interface should this translated IP being attached to ?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 12:08:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/262621#M51549</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2025-11-12T12:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: Nat inside VPN tunnel to Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/262622#M51550</link>
      <description>&lt;P&gt;Most likely external.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2025 12:09:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nat-inside-VPN-tunnel-to-Fortigate/m-p/262622#M51550</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-12T12:09:40Z</dc:date>
    </item>
  </channel>
</rss>

