<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT thru VPN IPsec in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/NAT-thru-VPN-IPsec/m-p/16150#M2709</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/65533"&gt;Thomas &lt;/A&gt;wrote "&lt;SPAN style="color: #800080;"&gt;&lt;EM&gt;I saw the option in the VPN Communities the option "Disable NAT inside the VPN communitie", what is it doing?&lt;/EM&gt;&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Star Community Properties &amp;gt; Advanced VPN Properties&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Disable NAT inside the VPN community&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if NAT is configured it is possible to disable NAT inside the VPN community. If NAT is disabled, when a host behind a community member opens a connection with another host behind a community member, the original IP addresses are used. Other connections use the translated address.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; This option for disabling NAT applies to hide NAT only, not static NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Nov 2018 14:36:24 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2018-11-13T14:36:24Z</dc:date>
    <item>
      <title>NAT thru VPN IPsec</title>
      <link>https://community.checkpoint.com/t5/General-Topics/NAT-thru-VPN-IPsec/m-p/16149#M2708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I come back with my NAT story...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please watch the diagram attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74172_VPN.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My site (green) is connected to my customer (violet) thru a VPN IPsec.&lt;/P&gt;&lt;P&gt;My Encryption Domain is my public range (1.1.1.0/28) and the remote Encryption Domain is 9.9.9.0/24.&lt;/P&gt;&lt;P&gt;My Peer is 1.1.1.1 and the remote peer is 20.20.20.20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN are mounted between a CheckPoint and an ASA Cisco 5555.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The CheckPoint is carrying the virtual IP (1.1.1.4) for the NAT of SRV001 with an ARP Proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My customer thru the VPN has to communicate with SRV001 via the NATed IP 1.1.1.4.&lt;/P&gt;&lt;P&gt;Then the check has to NAT it to 192.168.1.100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other sense, SRV001 has to communicate with SRV_CUSTOMERS (9.9.9.8, 9.9.9.9)&lt;/P&gt;&lt;P&gt;When SRV001 initiate the communication, the CheckPoint has to NAT is IP from 192.168.1.100 to 1.1.1.4 and then to send it thru the VPN.&lt;/P&gt;&lt;P&gt;On the other case SRV001 no need to be NATed for corporate communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now, my VPN Tunnel is UP.&lt;/P&gt;&lt;P&gt;When I am pinging the 9.9.9.8 or 9.9.9.9 with the CheckPoint it's working going thru the VPN Tunnel.&lt;/P&gt;&lt;P&gt;When I am pinging the 9.9.9.8 or 9.9.9.9 from SRV001, I saw with TCPDUMP that the firwall on the customer interface make the NAT and replace the 192.168.1.100 with the 1.1.1.4 but the trafic is not going thru the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to force to send the NATed packet thru the VPN?&lt;/P&gt;&lt;P&gt;Support NAT-Traversal is enabled.&lt;/P&gt;&lt;P&gt;I saw the option in the VPN Communities the option "Disable NAT inside the VPN communitie", what is it doing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 14:22:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/NAT-thru-VPN-IPsec/m-p/16149#M2708</guid>
      <dc:creator>Thomas_B</dc:creator>
      <dc:date>2018-11-13T14:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT thru VPN IPsec</title>
      <link>https://community.checkpoint.com/t5/General-Topics/NAT-thru-VPN-IPsec/m-p/16150#M2709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/65533"&gt;Thomas &lt;/A&gt;wrote "&lt;SPAN style="color: #800080;"&gt;&lt;EM&gt;I saw the option in the VPN Communities the option "Disable NAT inside the VPN communitie", what is it doing?&lt;/EM&gt;&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Star Community Properties &amp;gt; Advanced VPN Properties&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Disable NAT inside the VPN community&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if NAT is configured it is possible to disable NAT inside the VPN community. If NAT is disabled, when a host behind a community member opens a connection with another host behind a community member, the original IP addresses are used. Other connections use the translated address.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; This option for disabling NAT applies to hide NAT only, not static NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 14:36:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/NAT-thru-VPN-IPsec/m-p/16150#M2709</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-11-13T14:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: NAT thru VPN IPsec</title>
      <link>https://community.checkpoint.com/t5/General-Topics/NAT-thru-VPN-IPsec/m-p/65444#M13363</link>
      <description>&lt;P&gt;I'm not sure about this, but I would try to modify your local encryption domain to match your local network (192.168.1.0/24). Or at least add the original SRV001 IP address (192.168.1.100) to the encryption domain.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 11:35:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/NAT-thru-VPN-IPsec/m-p/65444#M13363</guid>
      <dc:creator>Enrique</dc:creator>
      <dc:date>2019-10-21T11:35:25Z</dc:date>
    </item>
  </channel>
</rss>

