<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT issue over VPN in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/NAT-issue-over-VPN/m-p/67513#M13807</link>
    <description>Many thanks Tim, it worked.</description>
    <pubDate>Fri, 15 Nov 2019 10:09:13 GMT</pubDate>
    <dc:creator>ashish_verma</dc:creator>
    <dc:date>2019-11-15T10:09:13Z</dc:date>
    <item>
      <title>NAT issue over VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/NAT-issue-over-VPN/m-p/67077#M13766</link>
      <description>&lt;P&gt;Hello Mates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;We are getting this issue in which the tracker is showing 2 logs for the same traffic (same source and destination port numbers) one is getting encrypted (and accepted) and with the same time stamp another one which is getting dropped at the external interface with reason of address-spoofing. Below are the details:&lt;/P&gt;&lt;P&gt;The source is 10.1.4.0/24 and is directly connected to CP firewall. The source is getting natted to IP 194.168.1.153 (subnet 194.168.1.x is not configured on any of the interface of this firewall. The VPN is configured with interoperable object and the tunnel are up. When initiating the traffic with source 10.1.4.233, in the tracker we can see the source is getting natted to 194.168.1.153 and also the traffic is getting encrypted. Just after this log ( with the same timestamp) another drop log is there with source 10.1.4.233, same source port and destination and getting reason is address-spoofing on eth2.530(external interface). On putting tcpdump on eth2.530 we are not getting any hit.&amp;nbsp;&lt;/P&gt;&lt;P&gt;On "fw monitor -p all", I can see the traffic (Syn) is passing through the firewall after getting translated, also receiving the reply back (Syn/Ack) to 194.168.1.153 but only i (Pre-inbound) after that no IoO. We have done manual hide nat configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if any further info required. Thanks in advance.&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Nov 2019 13:43:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/NAT-issue-over-VPN/m-p/67077#M13766</guid>
      <dc:creator>ashish_verma</dc:creator>
      <dc:date>2019-11-11T13:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue over VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/NAT-issue-over-VPN/m-p/67080#M13768</link>
      <description>&lt;P&gt;The second log is an anti-spoofing drop based on the destination IP address which you have not revealed in your post.&amp;nbsp; What is the destination IP address and is it defined in the topology of an internal interface of your firewall?&amp;nbsp; It should not be.&amp;nbsp; You probably have the entire RFC1918 range defined as your internal firewall topology, yet the destination IP address for this VPN-bound packet is part of RFC1918 as well.&amp;nbsp; If you'd rather not adjust the firewall's internal topology (which is always a bit nerve-racking as you may suddenly run afoul of antispoofing in ways you aren't expecting), on the topology screen of the External eth2.530 interface populate the "Don't check packets from" option to set an antispoofing exception for this specific VPN traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2019 14:18:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/NAT-issue-over-VPN/m-p/67080#M13768</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-11-11T14:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue over VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/NAT-issue-over-VPN/m-p/67086#M13769</link>
      <description>Thanks Tim for quick reply. The destination is 172.21.15.153. On anti-spoofing "Don't check packets from:" is not selected but the flow works for all the other destinations as many VPNs are configured on this firewall. However I will check by excluding this particular IP address from the spoofing.</description>
      <pubDate>Mon, 11 Nov 2019 14:52:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/NAT-issue-over-VPN/m-p/67086#M13769</guid>
      <dc:creator>ashish_verma</dc:creator>
      <dc:date>2019-11-11T14:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue over VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/NAT-issue-over-VPN/m-p/67513#M13807</link>
      <description>Many thanks Tim, it worked.</description>
      <pubDate>Fri, 15 Nov 2019 10:09:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/NAT-issue-over-VPN/m-p/67513#M13807</guid>
      <dc:creator>ashish_verma</dc:creator>
      <dc:date>2019-11-15T10:09:13Z</dc:date>
    </item>
  </channel>
</rss>

