<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Workaround for manual NAT when security zones are used? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9917#M87735</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, say the customer is using security zones in his policies and wants to perform static NAT in one direction or translate IP addresses for dynamic objects. Short of asking the customer to stop using security zones, is there anything else that can be done to accommodate the aforementioned requests?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Mar 2019 12:24:04 GMT</pubDate>
    <dc:creator>Nick_Doropoulos</dc:creator>
    <dc:date>2019-03-05T12:24:04Z</dc:date>
    <item>
      <title>Workaround for manual NAT when security zones are used?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9915#M87733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know that as of R80.10, security zones are not supported with manual NAT. Some of the reasons for creating manual NAT rules as per Check Point's documentation are the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL class="" style="color: #000000; background-color: #ffffff; margin-top: 3pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Rules that are restricted to specified destination IP addresses and to specified source IP addresses&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Translate both source and destination IP addresses in the same packet.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Static NAT in only one direction&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Translate services (destination ports)&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Rules that only use specified services (ports)&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Translate IP addresses for dynamic objects&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I was wondering therefore if there are still any workarounds to achieve the above when the customer is using security zones in their policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Many thanks in advance.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2019 08:39:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9915#M87733</guid>
      <dc:creator>Nick_Doropoulos</dc:creator>
      <dc:date>2019-03-05T08:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: Workaround for manual NAT when security zones are used?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9916#M87734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Nicholas,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not entirely sure what your question is? As you have already stated that you can't use Security Zones in the NAT policy and that manual NAT's are required for flexibility.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2019 11:57:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9916#M87734</guid>
      <dc:creator>Mark_Mitchell</dc:creator>
      <dc:date>2019-03-05T11:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: Workaround for manual NAT when security zones are used?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9917#M87735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, say the customer is using security zones in his policies and wants to perform static NAT in one direction or translate IP addresses for dynamic objects. Short of asking the customer to stop using security zones, is there anything else that can be done to accommodate the aforementioned requests?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2019 12:24:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9917#M87735</guid>
      <dc:creator>Nick_Doropoulos</dc:creator>
      <dc:date>2019-03-05T12:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Workaround for manual NAT when security zones are used?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9918#M87736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the setup of this customer a modular setup with multiple gateways, or is it actually a zone based policy because they are used to that and like it better?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2019 14:30:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9918#M87736</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-03-05T14:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Workaround for manual NAT when security zones are used?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9919#M87737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even with Security Zones in use, one must still define all networks behind each interface for purposes of antispoofing enforcement.&amp;nbsp; For any network that not "flat" (i.e. has additional routed networks beyond the VLAN the firewall is physically attached to) this will typically be represented as a specific group.&amp;nbsp; Those same interface antispoofing groups could be used in manual NAT rules to approximate the effect of Security Zones, but if groups containing a large number of objects are placed into both the source and destination of a manual NAT rule, that can expand out to a very large number of individual NAT rules so watch out. Representing the Internet here can be a bit tricky too, essentially you have to use a group with exclusion in the destination, which can also cause some unexpectedly large expansions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example: a group with 100 networks is added to the source of a manual NAT rule, and another group with 100 networks is added to the destination.&amp;nbsp; During policy compilation that will expand out to 10,000 individual NAT rules.&amp;nbsp; In the old days that value could get high enough to cause a policy compilation failure.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2019 14:38:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Workaround-for-manual-NAT-when-security-zones-are-used/m-p/9919#M87737</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-03-05T14:38:12Z</dc:date>
    </item>
  </channel>
</rss>

