<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static NATs for overlapping subnets in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/160781#M26862</link>
    <description>&lt;P&gt;Are you aware of the fact that all these posts are from soon 4 years ago ?&lt;/P&gt;</description>
    <pubDate>Mon, 31 Oct 2022 07:57:34 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2022-10-31T07:57:34Z</dc:date>
    <item>
      <title>Static NATs for overlapping subnets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25500#M5160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When organizations merge, there are often requirements for connecting the networks of the different businesses when they still have overlapping RFC1918 IP space.&amp;nbsp; Is there a way on a single Check Point firewall/cluster to provide the NAT for both directions between organizations when the address space overlaps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteA/Server 1 = 10.1.1.1 static NAT to 172.16.1.1&lt;/P&gt;&lt;P&gt;SiteB/Server 1 = 10.1.1.1 static NAT to 172.17.1.1&lt;/P&gt;&lt;P&gt;Assumptions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;All servers at SiteA are statically source NAT'd to something in 172.16.1.0/24&lt;/LI&gt;&lt;LI&gt;All servers at SiteB are statically source NAT'd to something in 172.17.1.0/24&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can a single firewall handle the NATs in both directions if SiteA/Server1 had to communicate with SiteB/Server 1?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In theory, A1 would send a request from 10.1.1.1 -&amp;gt; 172.17.1.1.&amp;nbsp; The FW would NAT the source to 172.16.1.1 and the destination to 10.1.1.1.&amp;nbsp; B1 would receive the packet and reply 10.1.1.1 -&amp;gt; 172.16.1.1.&amp;nbsp; The FW would NAT the source to 172.17.1.1 and the destination to 10.1.1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I realize this would cause trouble for Anti-spoofing, but would it work?.&amp;nbsp; Are the manual NAT rules flexible enough to handle this scenario?&amp;nbsp;&amp;nbsp;Is the real killer going to be routing since the 10.1.1.x network exists on both sides?&amp;nbsp; If only the FW could NAT/route based on traffic direction and/or interface zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for mulling this over with me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 21:34:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25500#M5160</guid>
      <dc:creator>phlrnnr</dc:creator>
      <dc:date>2019-01-18T21:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: Static NATs for overlapping subnets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25501#M5161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You answered yourself - can you really have routing to 10.1.1.1 on "both" sides? Not really. You would need two routers/firewalls with intermediate network that can hide two identical networks to allow this. We have it deployed between lab that fully replicates production and real production.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In nutshell, you can't really send the same IP address in two different directions &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 22:26:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25501#M5161</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2019-01-18T22:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: Static NATs for overlapping subnets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25502#M5162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for clarifying what I was already thinking.&amp;nbsp; My brain started going down this road after reading &lt;A href="https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/13774-3.html"&gt;this document that shows how this can be done on a Cisco router&lt;/A&gt;&amp;nbsp;(See the second example that does NOT use DNS, but static NATs).&amp;nbsp; I was hoping we may be able to get away with doing something similar on the Checkpoint.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2019 15:13:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25502#M5162</guid>
      <dc:creator>phlrnnr</dc:creator>
      <dc:date>2019-01-21T15:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: Static NATs for overlapping subnets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25503#M5163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Indeed, we have implemented this Cisco solution in our network too where Cisco router adjusts DNS replies. It really depends on requirements and expected volumes of overlap. There are some tricks you could do but all depends on actual requirements. Cisco is certainly step ahead here&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2019 18:21:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25503#M5163</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2019-01-21T18:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: Static NATs for overlapping subnets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25504#M5164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In these type of cases you could think outside the box and setup a VS on the same FW, Problem here is that you will need to rebuild the gateway/cluster. But it will give you the advantage that you will have 2 gateways each to handle a side of the network. The&amp;nbsp;appliance licenses comes with a license for 1 VS by default.&lt;/P&gt;&lt;P&gt;We did this lately for a customer that has a cluster where we needed to split the traffic from internal with only IPS checks an external with all NGTP checks. We achieved it by running the VS as the internal gateway on GW2 and the actual GW1 as the external gateway. giving it a load sharing option at the same time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;is on&lt;/P&gt;&lt;P&gt;In your case you could set it up so the connection between the actual GW and the VS is used to communicate with the 172 addresses only, so NAT is done on the side the conflicting network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2019 21:26:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25504#M5164</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-01-21T21:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Static NATs for overlapping subnets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25505#M5165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only issue with 2 gateways (we have that for lab environment connecting back to prod with same IPs) you won't be able to use same DNS, it will be fairly static environment. I somewhat like Cisco DNS reply adjustments better&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 06:02:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/25505#M5165</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2019-01-22T06:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: Static NATs for overlapping subnets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/160691#M26855</link>
      <description>&lt;P&gt;Phil we are trying to solve this same issue. Have you looked at this link?&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Advanced-NAT-Settings.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Advanced-NAT-Settings.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 16:24:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/160691#M26855</guid>
      <dc:creator>Dre187</dc:creator>
      <dc:date>2022-10-28T16:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: Static NATs for overlapping subnets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/160781#M26862</link>
      <description>&lt;P&gt;Are you aware of the fact that all these posts are from soon 4 years ago ?&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 07:57:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Static-NATs-for-overlapping-subnets/m-p/160781#M26862</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-10-31T07:57:34Z</dc:date>
    </item>
  </channel>
</rss>

