<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS NAT issue (DNS Doctoring) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93892#M7301</link>
    <description>&lt;P&gt;Attached diagram.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
    <pubDate>Wed, 12 Aug 2020 05:47:18 GMT</pubDate>
    <dc:creator>Mahesh_Patil</dc:creator>
    <dc:date>2020-08-12T05:47:18Z</dc:date>
    <item>
      <title>DNS NAT issue (DNS Doctoring)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93800#M7290</link>
      <description>&lt;P&gt;We have enabled DNS NAT with help of&amp;nbsp;&lt;SPAN&gt;sk34295.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;After enabling DNS NAT, firewall doing DNS NAT for all communications.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We do't want DNS NAT for all communications. example&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;source interface having 5 subnets&amp;nbsp; and out of which required DNS NAT for four subnets and for one subnet we do not want DNS NAT.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Also in four subnets two subnets should having one IP address and another two subets should have another IP address of destination server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Above scenario is not working. DNS NAT check 1st NAT rule and do the DNS NAT.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As per my observation, as per SK DNS NAT do not check source IP address while doing DNS NAT.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can some one help me on this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 05:17:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93800#M7290</guid>
      <dc:creator>Mahesh_Patil</dc:creator>
      <dc:date>2020-08-11T05:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT issue (DNS Doctoring)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93824#M7294</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/18353"&gt;@Mahesh_Patil&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you set fw_dns_xlation to true, it is globally valid for the DNS service.&lt;/P&gt;
&lt;P&gt;The feature has a global on/off switch, in the $FWDIR/conf/objects_5_0.C file on Security Management Server / Domain Management Server, called fw_dns_xlation (by default set to &lt;EM&gt;false&lt;/EM&gt;). When its value is set to &lt;EM&gt;true&lt;/EM&gt;, the regular NAT rulebase is used to determine how to change the DNS packets.&lt;/P&gt;
&lt;P&gt;The regular NAT rules used to translate the internal servers will suffice. There is no need to define special NAT rules in addition to the regular ones defined.&lt;/P&gt;
&lt;P&gt;I would use a manual Hide NAT rule for the outgoing DNS traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 08:29:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93824#M7294</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-08-11T08:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT issue (DNS Doctoring)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93835#M7295</link>
      <description>&lt;P&gt;Yes. But requirement is more. Let me give you example : -&lt;/P&gt;&lt;P&gt;Source subnet 172.16.1.0/24, 172.16.2.0/24, 172.16.3.0/24, 172.16.4.0/24 and 172.16.5.0/24 and destination real IP is 10.0.0.1&lt;/P&gt;&lt;P&gt;1. Now 172.16.1.0/24 and 172.16.2.0/24 should access 192.168.1.1 (NAT with 10.0.0.1)&lt;/P&gt;&lt;P&gt;2. Now 172.16.3.0/24 and 172.16.4.0/24 should access 192.168.2.2 (NAT with 10.0.0.1)&lt;/P&gt;&lt;P&gt;3. Now 172.16.5.0/24 should access to 10.0.0.1 (without NAT)&lt;/P&gt;&lt;P&gt;We required NAT DNS for point number 1 and 2.&amp;nbsp; We do not required DNS NAT for point number 3.&lt;/P&gt;&lt;P&gt;Now 1st problem DNS NAT do NAT of all DNS request which is impacting to point number 3 connectivity.&lt;/P&gt;&lt;P&gt;2nd problem is in NAT order 1st NAT is 192.168.1.1 with 10.0.0.1. DNS NAT do not check source IP while doing&amp;nbsp; DNS NAT due to which point number two connectivity get impacted as DNS NAT resolved/give IP address 192.168.1.1 in place of 192.168.2.2 in DNS query.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How we can achieve this scenario.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 09:15:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93835#M7295</guid>
      <dc:creator>Mahesh_Patil</dc:creator>
      <dc:date>2020-08-11T09:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT issue (DNS Doctoring)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93854#M7296</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/18353"&gt;@Mahesh_Patil&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;maybee a little network diagram with a sample should help.&lt;/P&gt;
&lt;P&gt;"DNS NAT" does no NAT on the packets itselfs. "DNS NAT" replaces IP-addresses in a DNS-response, which are initiated from a client to a DNS server.&lt;/P&gt;
&lt;P&gt;This traffic has to traverse the gateway, meaning the gateway has to see the request and the response of the DNS-query.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The "DNS NAT" changes traffic only regarding UDP/53, nothing else. As you describe and I understand you can now see NAT on all connections ?&lt;/P&gt;
&lt;P&gt;Have a look at the limitations 2. and 3. from sk34295, it's important. The source object of your NAT rules for "DNS NAT" is regardless and you have to define different NAT-types (static or manual) for your specific object types (network or host).&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 13:49:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93854#M7296</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-08-11T13:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT issue (DNS Doctoring)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93892#M7301</link>
      <description>&lt;P&gt;Attached diagram.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 05:47:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93892#M7301</guid>
      <dc:creator>Mahesh_Patil</dc:creator>
      <dc:date>2020-08-12T05:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT issue (DNS Doctoring)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93992#M7303</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/18353"&gt;@Mahesh_Patil&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;snip from the limitations:&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;DNS traffic (DNS Requests) will be translated based on the Destination address in the NAT rules &lt;STRONG&gt;without considering the Source of the traffic&lt;/STRONG&gt;&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 08:34:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93992#M7303</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-08-13T08:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT issue (DNS Doctoring)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93997#M7304</link>
      <description>&lt;P&gt;Yes. As per my understanding due to check only destination address for DNS NAT point number two and three scenario not working.&lt;/P&gt;&lt;P&gt;For point number two and three when DNS request coming from source,&amp;nbsp; firewall do DNS NAT on 1st NAT statement. and due to receive wrong IP in DNS query by source, source unable to connect to destination.&lt;/P&gt;&lt;P&gt;Can we have solution on this? Or need to do development on this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 09:20:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/93997#M7304</guid>
      <dc:creator>Mahesh_Patil</dc:creator>
      <dc:date>2020-08-13T09:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: DNS NAT issue (DNS Doctoring)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/94142#M7316</link>
      <description>&lt;P&gt;Basically, if the traffic is subject to NAT at all (by destination only), it is subject to DNS NAT if you have it enabled.&lt;BR /&gt;In which case, it sounds like this is operating as designed and what you’re wanting to do would be an RFE.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 18:56:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-NAT-issue-DNS-Doctoring/m-p/94142#M7316</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-08-14T18:56:14Z</dc:date>
    </item>
  </channel>
</rss>

