<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Troubles with dropped connections (hide nat) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93517#M7250</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/49500"&gt;@Graham&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the confirmation. Can you please do a tcpdump on source,&amp;nbsp;&lt;SPAN&gt;while trying to access the resources.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;++ Try below command and you will find out if your traffic is getting NAT or not++&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tcpdump -Peni any host (Source IP)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Aug 2020 20:51:56 GMT</pubDate>
    <dc:creator>amdhim0004</dc:creator>
    <dc:date>2020-08-05T20:51:56Z</dc:date>
    <item>
      <title>Troubles with dropped connections (hide nat)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/92915#M7177</link>
      <description>&lt;P&gt;We have a partner MPLS connection that I am having issues with. Since they are quite a bit larger in size convincing them the issues lies with them is a challenge.&lt;/P&gt;&lt;P&gt;Interestingly they have decided to use public IPs on a dedicated internal network; Again I have no control in that.&lt;BR /&gt;There is a shared network space 64.164.0.96/28 used for connectivity. Their requirements dictate that all our connections should originate from 64.164.0.103.&amp;nbsp;&amp;nbsp;I have setup hide NAT, proxy arp, static routes and disabled address spoofing on outgoing the interface to achieve this.&lt;/P&gt;&lt;P&gt;All resources we need access to are in 64.128.0.0/24, 64.131.0.108/30 or 64.144.0.144/30, hence the reason for static routes.&lt;BR /&gt;For testing I have ANY/ANY rules to eliminate ACLs as an issue.&amp;nbsp;&amp;nbsp;I am successfully able to connect to basic web pages, but anything that requires token based authentication fails.&amp;nbsp;&amp;nbsp;Working with TAC we have discovered that the connection dies at phase 2, however I am not sure where to take from there.&lt;/P&gt;&lt;P&gt;fw ctl zdebug + drop results in no drops when we grep based on distention IP.&lt;BR /&gt;tcpdump shows network flow, but at some point the connection drops.&lt;/P&gt;&lt;P&gt;My only idea at this point to overide the interfaces topology, but I am not sure which would apply.&lt;BR /&gt;I am thinking I might set it to undefined since the routes are static and selecting DMZ network as well.&lt;/P&gt;&lt;P&gt;I would welcome any idea and I willing to try anything at this point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 18:10:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/92915#M7177</guid>
      <dc:creator>Graham</dc:creator>
      <dc:date>2020-07-30T18:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: Troubles with dropped connections (hide nat)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93105#M7206</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/49500"&gt;@Graham&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One question.&lt;/P&gt;&lt;P&gt;Your interface IP and your NAT IP towards your destination are different right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Aug 2020 20:47:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93105#M7206</guid>
      <dc:creator>amdhim0004</dc:creator>
      <dc:date>2020-08-02T20:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: Troubles with dropped connections (hide nat)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93177#M7220</link>
      <description>&lt;P&gt;So basic connectivity with ping/ICMP and http web traffic works?&amp;nbsp; How about https traffic to the partner's websites, and do you have HTTPS/TLS inspection enabled on your firewall?&lt;/P&gt;
&lt;P&gt;Can you be more specific about what "token-based authentication" exactly is?&amp;nbsp; It sounds like that specific traffic is not getting NATTed to the proper address, thus causing Phase 2 to fail when your firewall tries to negotiate a new IPSec tunnel for that traffic with the original or otherwise wrong source address/subnet.&amp;nbsp; That or there is some kind of routing issue on your end or theirs involving this specific traffic; either of these situations would of course not show any drops occurring.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 15:48:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93177#M7220</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-08-03T15:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: Troubles with dropped connections (hide nat)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93336#M7242</link>
      <description>&lt;P&gt;Yes correct the interface IP is .98 and the NAT IP is .103.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 19:09:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93336#M7242</guid>
      <dc:creator>Graham</dc:creator>
      <dc:date>2020-08-04T19:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: Troubles with dropped connections (hide nat)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93517#M7250</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/49500"&gt;@Graham&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the confirmation. Can you please do a tcpdump on source,&amp;nbsp;&lt;SPAN&gt;while trying to access the resources.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;++ Try below command and you will find out if your traffic is getting NAT or not++&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tcpdump -Peni any host (Source IP)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 20:51:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93517#M7250</guid>
      <dc:creator>amdhim0004</dc:creator>
      <dc:date>2020-08-05T20:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: Troubles with dropped connections (hide nat)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93518#M7251</link>
      <description>&lt;P&gt;For some reason CheckMates woould allow me to post an update, so trying under a different name.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Yes HTTPS traffic functions as expected.&amp;nbsp; HTTPS inspection is not enabled, mostly since I haven't been able to get it to work/no time.&lt;BR /&gt;By token based I mean an Entrust certificate stored on USB hardware that authenticates to Cisco AnyConnect server, sorry that is as much of that end that I know.&lt;/P&gt;&lt;P&gt;Would there be any value in testing network topology overrides on the Gateway object?&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/49568"&gt;@amdhim0004&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;[Expert@***:0]# tcpdump -Penni any host 64.128.0.143&lt;BR /&gt;tcpdump: WARNING: Promiscuous mode not supported on the "any" device&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on any, link-type LINUX_SLL (Linux cooked), capture size 96 bytes&lt;BR /&gt;14:26:57.708981 eth4[in ]: 10.1.0.245.64023 &amp;gt; 64.128.0.143.500: isakmp: phase 1 I #34[]&lt;BR /&gt;14:26:57.711276 eth7[out]: arp who-has 64.128.0.143 tell 64.164.0.98&lt;BR /&gt;14:26:57.711757 eth7[in ]: arp reply 64.128.0.143 is-at cc:46:d6:d8:25:1e&lt;BR /&gt;14:26:57.711770 eth7[out]: 64.164.0.103.43338 &amp;gt; 64.128.0.143.500: isakmp: phase 1 ? #34[]&lt;BR /&gt;14:26:57.770970 eth7[in ]: 64.128.0.143.500 &amp;gt; 64.164.0.103.43338: isakmp: phase 1 R #34[]&lt;BR /&gt;14:26:57.771243 eth4[out]: 64.128.0.143.500 &amp;gt; 10.1.0.245.64023: isakmp: phase 1 R #34[]&lt;BR /&gt;14:26:57.779685 eth4[in ]: 10.1.0.245.64023 &amp;gt; 64.128.0.143.500: isakmp: phase 1 I #34[]&lt;BR /&gt;14:26:57.780063 eth7[out]: 64.164.0.103.43338 &amp;gt; 64.128.0.143.500: isakmp: phase 1 ? #34[]&lt;BR /&gt;14:26:57.869412 eth7[in ]: 64.128.0.143.500 &amp;gt; 64.164.0.103.43338: isakmp: phase 1 R #34[]&lt;BR /&gt;14:26:57.869729 eth4[out]: 64.128.0.143.500 &amp;gt; 10.1.0.245.64023: isakmp: phase 1 R #34[]&lt;BR /&gt;14:26:57.902029 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;BR /&gt;14:26:57.902129 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;BR /&gt;14:26:57.903039 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;BR /&gt;14:26:57.903107 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;BR /&gt;14:26:58.051808 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.052060 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.052306 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.052370 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.052823 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.052881 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.053309 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.053366 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.054052 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.054100 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.054556 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.054598 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.062050 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:58.062085 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.903695 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;BR /&gt;14:26:59.903749 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;BR /&gt;14:26:59.903789 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;BR /&gt;14:26:59.903820 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;BR /&gt;14:26:59.961990 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.962049 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.962489 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.962530 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.962988 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.963032 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.963489 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.963524 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.963987 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.964023 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.964735 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.964766 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.972235 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:26:59.972271 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.904825 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;BR /&gt;14:27:03.904923 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;BR /&gt;14:27:03.905025 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;BR /&gt;14:27:03.905085 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;BR /&gt;14:27:03.963884 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.963951 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.964381 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.964438 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.965129 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.965164 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.965633 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.965673 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.966131 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.966166 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.966631 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.966661 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.974378 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:03.974422 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.904654 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;BR /&gt;14:27:11.904704 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;BR /&gt;14:27:11.904738 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;BR /&gt;14:27:11.904767 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;BR /&gt;14:27:11.964202 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.964272 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.964672 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.964713 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.965252 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.965290 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.965802 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.965836 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.966373 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.966412 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.966954 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.966985 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.974465 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:11.974498 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;BR /&gt;14:27:17.922435 eth4[in ]: 10.1.0.245.52704 &amp;gt; 64.128.0.143.443: S 299105415:299105415(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;14:27:17.923100 eth7[out]: 64.164.0.103.44131 &amp;gt; 64.128.0.143.443: S 299105415:299105415(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;14:27:17.979036 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: S 588342429:588342429(0) ack 299105416 win 3900 &amp;lt;mss 1300&amp;gt;&lt;BR /&gt;14:27:17.979052 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: S 588342429:588342429(0) ack 299105416 win 3900 &amp;lt;mss 1300&amp;gt;&lt;BR /&gt;14:27:17.979344 eth4[in ]: 10.1.0.245.52704 &amp;gt; 64.128.0.143.443: . ack 1 win 64240&lt;BR /&gt;14:27:17.979358 eth7[out]: 64.164.0.103.44131 &amp;gt; 64.128.0.143.443: . ack 1 win 64240&lt;BR /&gt;14:27:17.979563 eth4[in ]: 10.1.0.245.52704 &amp;gt; 64.128.0.143.443: P 1:209(208) ack 1 win 64240&lt;BR /&gt;14:27:17.979838 eth7[out]: 64.164.0.103.44131 &amp;gt; 64.128.0.143.443: P 1:209(208) ack 1 win 64240&lt;BR /&gt;14:27:18.035488 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: . ack 209 win 4108&lt;BR /&gt;14:27:18.035518 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: . ack 209 win 4108&lt;BR /&gt;14:27:18.110944 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: P 1:1301(1300) ack 209 win 4108&lt;BR /&gt;14:27:18.111255 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: P 1:1301(1300) ack 209 win 4108&lt;BR /&gt;14:27:18.112195 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: . 1301:2601(1300) ack 209 win 4108&lt;BR /&gt;14:27:18.112228 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: . 1301:2601(1300) ack 209 win 4108&lt;BR /&gt;14:27:18.112551 eth4[in ]: 10.1.0.245.52704 &amp;gt; 64.128.0.143.443: . ack 2601 win 65000&lt;BR /&gt;14:27:18.112566 eth7[out]: 64.164.0.103.44131 &amp;gt; 64.128.0.143.443: . ack 2601 win 65000&lt;BR /&gt;14:27:18.113074 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: P 2601:3652(1051) ack 209 win 4108&lt;BR /&gt;14:27:18.113472 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: P 2601:3652(1051) ack 209 win 4108&lt;BR /&gt;14:27:18.121801 eth4[in ]: 10.1.0.245.52704 &amp;gt; 64.128.0.143.443: P 209:407(198) ack 3652 win 63949&lt;BR /&gt;14:27:18.121975 eth7[out]: 64.164.0.103.44131 &amp;gt; 64.128.0.143.443: P 209:407(198) ack 3652 win 63949&lt;BR /&gt;14:27:18.177693 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: . ack 407 win 4306&lt;BR /&gt;14:27:18.177711 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: . ack 407 win 4306&lt;BR /&gt;14:27:18.179691 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: P 3652:3711(59) ack 407 win 4306&lt;BR /&gt;14:27:18.179749 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: P 3652:3711(59) ack 407 win 4306&lt;BR /&gt;14:27:18.180318 eth4[in ]: 10.1.0.245.52704 &amp;gt; 64.128.0.143.443: P 407:636(229) ack 3711 win 63890&lt;BR /&gt;14:27:18.180350 eth7[out]: 64.164.0.103.44131 &amp;gt; 64.128.0.143.443: P 407:636(229) ack 3711 win 63890&lt;BR /&gt;14:27:18.237658 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: . ack 636 win 4535&lt;BR /&gt;14:27:18.237675 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: . ack 636 win 4535&lt;BR /&gt;14:27:18.237907 eth7[in ]: 64.164.0.143.443 &amp;gt; 64.164.0.103.44131: P 3711:4068(357) ack 636 win 4535&lt;BR /&gt;14:27:18.237915 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: F 4068:4068(0) ack 636 win 4535&lt;BR /&gt;14:27:18.237924 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: P 3711:4068(357) ack 636 win 4535&lt;BR /&gt;14:27:18.237929 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: F 4068:4068(0) ack 636 win 4535&lt;BR /&gt;14:27:18.238375 eth4[in ]: 10.1.0.245.52704 &amp;gt; 64.128.0.143.443: . ack 4069 win 65000&lt;BR /&gt;14:27:18.238388 eth7[out]: 64.164.0.103.44131 &amp;gt; 64.128.0.143.443: . ack 4069 win 65000&lt;BR /&gt;14:27:18.251597 eth4[in ]: 10.1.0.245.52704 &amp;gt; 64.128.0.143.443: F 636:636(0) ack 4069 win 65000&lt;BR /&gt;14:27:18.251610 eth7[out]: 64.164.0.103.44131 &amp;gt; 64.128.0.143.443: F 636:636(0) ack 4069 win 65000&lt;BR /&gt;14:27:18.308407 eth7[in ]: 64.128.0.143.443 &amp;gt; 64.164.0.103.44131: . ack 637 win 4535&lt;BR /&gt;14:27:18.308424 eth4[out]: 64.128.0.143.443 &amp;gt; 10.1.0.245.52704: . ack 637 win 4535&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Graham&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 21:39:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93518#M7251</guid>
      <dc:creator>Graham1</dc:creator>
      <dc:date>2020-08-05T21:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: Troubles with dropped connections (hide nat)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93589#M7259</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/49500"&gt;@Graham&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the logs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please have a look at the below logs. Traffic from SRC-&lt;SPAN&gt;10.1.0.245 is coming from eth4 and going out from eth7 with NAT IP&amp;nbsp;64.164.0.103. But when we get the reply from&amp;nbsp;64.128.0.143 on eth7 traffic is going out from eth4 of the firewall it's not getting NAT to the internal range. (eth4[out]: 64.128.0.143.4500) this should be your internal IP.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;14:26:57.902029 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;14:26:57.902129 eth4[in ]: 10.1.0.245.64024 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others I #35[]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;14:26:57.903039 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;14:26:57.903107 eth7[out]: 64.164.0.103.26672 &amp;gt; 64.128.0.143.4500: NONESP-encap: isakmp: phase 2/others ? #35[]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;14:26:58.051808 eth7[in ]: 64.128.0.143.4500 &amp;gt; 64.164.0.103.26672: NONESP-encap: isakmp: phase 2/others R #35[]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;14:26:58.052060 eth4[out]: 64.128.0.143.4500 &amp;gt; 10.1.0.245.64024: NONESP-encap: isakmp: phase 2/others R #35[]&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 18:21:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Troubles-with-dropped-connections-hide-nat/m-p/93589#M7259</guid>
      <dc:creator>amdhim0004</dc:creator>
      <dc:date>2020-08-06T18:21:28Z</dc:date>
    </item>
  </channel>
</rss>

