<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5056#M96</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Each VLAN is basically it's own interface as far as the Security Gateway is concerned.&lt;/P&gt;&lt;P&gt;Likewise, when you bond two or more physical interfaces together, the Security Gateway treats it like a single interface (unless it has VLANs, of course).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Aug 2017 14:32:48 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-08-09T14:32:48Z</dc:date>
    <item>
      <title>Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5049#M89</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everyone.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="" lang="en"&gt;&lt;SPAN title="Actualmente tenemos un aparato Check Point 4200 instalado y operativo en modo Standalone en nuestra empresa."&gt;We currently have a Check Point 4200 device installed and operating in Standalone mode in our company. &lt;/SPAN&gt;&lt;SPAN title="Con respecto al Security Management, tiene activado los Blades más usuales (Firewall, IPSec VPN, URL Filtering, etc.) con políticas básicas de conexión a internet para la red interna, acceso a los servidores desde Internet y la política de clean up. "&gt;With respect to Security Management, it has activated the most common Blades (Firewall, IPSec VPN, URL Filtering, etc.) with basic policies of internet connection for the internal network, access to the servers from the Internet and the clean up policy.&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN title="Con respecto al Security Gateway tiene configurado el puerto eth0 (LAN) con 10 VLANs (10 redes /24), el puerto eth1 para una VPN (una red /29) y el puerto eth2 para Internet (una red /30). "&gt;For the Security Gateway, the eth0 (LAN) port is configured with 10 VLANs (/24), the eth1 port for a VPN (/29) and the eth2 port for the Internet (a /30).&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN title="Bajo el mencionado escenario, debo configurar otro Check Point 4200 de manera a que opere en HA con el anterior."&gt;Under the above scenario, I must configure another Check Point 4200 so that it operates in HA with the previous one. &lt;/SPAN&gt;&lt;SPAN title="Mis preguntas son las siguientes: "&gt;These are my questions:&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN title="- ¿Cómo configuro la IP del cluster interno teniendo el puerto eth0 10 VLANs? "&gt;- How do I configure the IP of the internal cluster having the eth0 port 10 VLANs?&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN title="- El puerto eth1 será liberado y la VPN e Internet vendrán en VLANs distintas sobre el mismo cable, ¿la configuración es la misma que en el caso anterior? "&gt;- The eth1 port will be released and the VPN and Internet will be coming in different VLANs on the same cable, is the configuration the same as in the previous case?&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN title="- ¿Qué efecto tendría en las políticas aplicar el sk104699 para agregar el Check Point operativo a un clúster en Full HA? "&gt;- What effect would it have on policies to apply the sk104699 to add the operational Check Point to a cluster in Full HA?&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN title="Agradezco de antemano."&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="" lang="en"&gt;&lt;SPAN title="Agradezco de antemano."&gt;For the external network I planned to use the sk32073.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="" lang="en"&gt;&lt;SPAN title="Agradezco de antemano."&gt;Thank you in advance.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Aug 2017 20:29:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5049#M89</guid>
      <dc:creator>Cesar_Caballero</dc:creator>
      <dc:date>2017-08-07T20:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5050#M90</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basically in a cluster, the members should be on the same subnets.&lt;/P&gt;&lt;P&gt;When VLANs are involved, the VLAN configuration on both members should match (IPs on each VLAN should be on the same subnet).&lt;/P&gt;&lt;P&gt;If you're replacing eth1 with VLAN ports, that same logic applies.&lt;/P&gt;&lt;P&gt;The policy rules should be&amp;nbsp;more or less the same unless of course you're disabled some of the implied rules that allow modules to talk to one another.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Aug 2017 22:43:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5050#M90</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-07T22:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5051#M91</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="" lang="en"&gt;&lt;SPAN class=""&gt;So, considering that the internal IP of the cluster is on a different subnet, and after having both members configured with IPs on the same subnet of each VLAN, should routes be created from that subnet to the IP of the cluster?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Aug 2017 13:01:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5051#M91</guid>
      <dc:creator>Cesar_Caballero</dc:creator>
      <dc:date>2017-08-08T13:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5052#M92</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're talking about the rest of the networking around the cluster, yes, you will configure the routing so that routes point to the Cluster IP for the relevant interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Aug 2017 15:34:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5052#M92</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-08T15:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5053#M93</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm sorry &lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch Abernathy&lt;/A&gt;, I'm not getting the point. If I may, I want to show you the scenario I'm working on so that you could help me with some specific questions. The Standalone has it's eth1 port currently configured as follows:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/57847_Puertos CP DGM.png" style="width: 620px; height: 171px;" /&gt;&lt;/P&gt;&lt;P&gt;Considerenig that I want to use the 192.168.1.250 IP as the cluster's internal IP (because it is currently my default gateway), do I have to:&lt;/P&gt;&lt;P&gt;- set an IP for the eth1 port from the 192.168.1.0/24 subnet? For example 192.168.1.251 for the primary member and 192.168.1.251 for the secondary member.&lt;/P&gt;&lt;P&gt;- set an IP for the eth1.x VLAN from the 10.10.x.0/24 subnet? For example 10.10.x.251 for each VLAN of the primary member and 10.10.x.252 for each VLAN of the secondary member.&lt;/P&gt;&lt;P&gt;Furthermore, the Standalone has it's eth3 port currently configured as follows:&lt;/P&gt;&lt;P&gt;- eth3: Type Ethernet, IPv4 Address &lt;STRONG&gt;-Public IP-&lt;/STRONG&gt;, Subnet Mask 255.255.255.252, Link Status Up.&lt;/P&gt;&lt;P&gt;- eth3.100: Type VLAN, IPv4 Address 10.0.x.x, Subnet Mask 255.255.255.252, Link Status Up. (There's a VPN over this VLAN).&lt;/P&gt;&lt;P&gt;- eth3.200: Type VLAN, IPv4 Address 10.x.x.x, Subnet Mask 255.255.255.252, Link Status Up. (There's an IPSec VPN over this VLAN that must not be routed to the internet).&lt;/P&gt;&lt;P&gt;Considering that I want to use the &lt;STRONG&gt;-Public IP-&lt;/STRONG&gt; as the cluster's external IP, how do I set the eth3 port, eth3.100 and eth3.200 VLANs for both members?&lt;/P&gt;&lt;P&gt;&amp;nbsp;Thank you in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Aug 2017 22:02:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5053#M93</guid>
      <dc:creator>Cesar_Caballero</dc:creator>
      <dc:date>2017-08-08T22:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5054#M94</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;More details are good &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The primary and secondary members need to have unique IP addresses configured per subnet.&lt;/P&gt;&lt;P&gt;Which means, for eth1.x VLAN you'll have 10.10.x.251 on your primary and 10.10.x.252 on your secondary.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The cluster IP for that subnet will be a third IP (maybe 10.10.x.253?) which you will configure in the cluster object in SmartConsole.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you need three IPs per subnet for the cluster alone and a /30 only allows for two IPs, you will need bigger subnets for the eth3 VLANs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For eth3 (non-VLAN) where the public IP currently resides, you will need to create a &lt;STRONG&gt;different&lt;/STRONG&gt; private subnet as described in&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;sk32073.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;This subnet will be used for the cluster on that interface.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;The public IP address will be configured in the cluster object in SmartConsole.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Aug 2017 22:41:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5054#M94</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-08T22:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5055#M95</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It helps a lot! Don't know why, but I thought I could only have one cluster IP per interface (I used to consider ethx with it's VLANs as one interface). Now I know that it is possible to set each VLAN to it's own cluster IP just like any other interface. Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 13:08:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5055#M95</guid>
      <dc:creator>Cesar_Caballero</dc:creator>
      <dc:date>2017-08-09T13:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5056#M96</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Each VLAN is basically it's own interface as far as the Security Gateway is concerned.&lt;/P&gt;&lt;P&gt;Likewise, when you bond two or more physical interfaces together, the Security Gateway treats it like a single interface (unless it has VLANs, of course).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 14:32:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5056#M96</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-09T14:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5057#M97</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch Abernathy&lt;/A&gt;‌.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="" lang="en"&gt;&lt;SPAN class=""&gt;Since the last time we talked, I tried to apply what you had taught me.&lt;/SPAN&gt; But a&lt;SPAN class=""&gt;fter configuring the ports and VLANs, upon reaching step 6 of the sk104699 procedure, to configure a Standalone machine to become a part of a Full HA cluster, the SmartDashboard crashes and throws me the &lt;A href="https://www.dropbox.com/s/yfyld3bj6cqv7ds/FwPolicy.exe_990180413_1502488738.zip?dl=0"&gt;attached error&lt;/A&gt;. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="" lang="en"&gt;&lt;SPAN class=""&gt;Thanks in advance.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Aug 2017 16:04:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5057#M97</guid>
      <dc:creator>Cesar_Caballero</dc:creator>
      <dc:date>2017-08-14T16:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5058#M98</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If SmartDashboard is crashing, I would engage with the Check Point TAC.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Aug 2017 16:12:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5058#M98</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-14T16:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5059#M99</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I managed to find the error and fix it. Now, on my test lab, I have configured each cluster member as follows:&lt;/P&gt;&lt;P&gt;- Cluster member 1:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="57941" alt="" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/57941_Check Point 1.PNG" style="width: 620px; height: 212px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="57942" alt="" class="image-2 jive-image j-img-original" src="/legacyfs/online/checkpoint/57942_Check Point 1 Rutas.PNG" style="width: 620px; height: 140px;" /&gt;&lt;/P&gt;&lt;P&gt;Cluster member 2:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="57943" alt="" class="image-3 jive-image j-img-original" src="/legacyfs/online/checkpoint/57943_Check Point 2.PNG" style="width: 620px; height: 212px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="57944" alt="" class="image-4 jive-image j-img-original" src="/legacyfs/online/checkpoint/57944_Check Point 2 Rutas.PNG" style="width: 620px; height: 140px;" /&gt;&lt;/P&gt;&lt;P&gt;And the cluster is up and running with current configuration:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="57945" alt="" class="image-5 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/57945_Topologia.PNG" style="width: 620px; height: 360px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="57946" alt="" class="image-6 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/57946_Politicas.PNG" style="width: 620px; height: 361px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="57947" alt="" class="image-7 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/57947_NAT.PNG" style="width: 620px; height: 358px;" /&gt;&lt;/P&gt;&lt;P&gt;But there's a problem, I can't acces the internet. It's there something wrong with my configuration? I've checked SmartView Tracker for droped packages, but every single connection is accepted as line 2 policy states.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Aug 2017 20:29:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5059#M99</guid>
      <dc:creator>Cesar_Caballero</dc:creator>
      <dc:date>2017-08-14T20:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone to Full HA Member (VLANs, Cluster on different subnets, VPN, etc involved)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5060#M100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can see in the NAT rulebase the little "S" on Rule 4.&lt;/P&gt;&lt;P&gt;That implies a Static NAT rule, which will not work since you only have one public IP.&lt;/P&gt;&lt;P&gt;You need to change this to a HIDE NAT, which can be done in the object.&lt;/P&gt;&lt;P&gt;You'll probably want to use the "Hide behind Gateway" option, shown here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/57948_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Aug 2017 23:53:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Standalone-to-Full-HA-Member-VLANs-Cluster-on-different-subnets/m-p/5060#M100</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-14T23:53:14Z</dc:date>
    </item>
  </channel>
</rss>

