<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNAT inside Domain based VPN in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177375#M29571</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sk116097 tells us if we need to dnat inside a vpn we must use route based and not domain&amp;nbsp;based, I am wondering if that is really&amp;nbsp;true or if there is a workaround&amp;nbsp;to achieve this?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;My setup is identical&amp;nbsp;to the one pictured in the sk, I have added both the pre and post NAT address to the satellite&amp;nbsp;encryption domain, the interesting&amp;nbsp;thing is, my logs say the traffic&amp;nbsp;is encrypted and the destination&amp;nbsp;IP is natted which makes me hopefull, however the traffic&amp;nbsp;doesn't&amp;nbsp;actually make it through the tunnel. The remote end doesn't&amp;nbsp;see it using a packet capture&amp;nbsp;and the local checkpoint gateway only shows little "i" in fwmonitor.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I am doing the same traffic in reverse,&amp;nbsp; in that case hide natting the source IP through the tunnel and that does work fine which I suspect means my setup is correct and it just wont work -&amp;nbsp; But I really hope there is some other solution than a vti.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Flow #1 - doesnt work&lt;BR /&gt;pre nat - src: 10.0.0.100 dst: 10.0.0.10 &lt;BR /&gt;post nat - src: 10.0.0.100 dst: 30.0.0.1(s)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Flow #2 - does work&lt;BR /&gt;pre nat - src: 30.0.0.1 dst: 10.0.0.100&lt;BR /&gt;post nat - src: 10.0.0.10(H) dst: 10.0.0.10&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;gateway a encryption domain: local-10.0.0.100/32 remote-30.0.0.1/32,10.0.0.10/32&lt;BR /&gt;gateway b encryption domain: local-30.0.0.1/32 remote-10.0.0.100/32&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tried adding&amp;nbsp;10.0.0.10/32 to gateway b local domain but it didn't make a difference&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Apr 2023 12:01:23 GMT</pubDate>
    <dc:creator>Ryan_Ryan</dc:creator>
    <dc:date>2023-04-05T12:01:23Z</dc:date>
    <item>
      <title>DNAT inside Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177375#M29571</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sk116097 tells us if we need to dnat inside a vpn we must use route based and not domain&amp;nbsp;based, I am wondering if that is really&amp;nbsp;true or if there is a workaround&amp;nbsp;to achieve this?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;My setup is identical&amp;nbsp;to the one pictured in the sk, I have added both the pre and post NAT address to the satellite&amp;nbsp;encryption domain, the interesting&amp;nbsp;thing is, my logs say the traffic&amp;nbsp;is encrypted and the destination&amp;nbsp;IP is natted which makes me hopefull, however the traffic&amp;nbsp;doesn't&amp;nbsp;actually make it through the tunnel. The remote end doesn't&amp;nbsp;see it using a packet capture&amp;nbsp;and the local checkpoint gateway only shows little "i" in fwmonitor.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I am doing the same traffic in reverse,&amp;nbsp; in that case hide natting the source IP through the tunnel and that does work fine which I suspect means my setup is correct and it just wont work -&amp;nbsp; But I really hope there is some other solution than a vti.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Flow #1 - doesnt work&lt;BR /&gt;pre nat - src: 10.0.0.100 dst: 10.0.0.10 &lt;BR /&gt;post nat - src: 10.0.0.100 dst: 30.0.0.1(s)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Flow #2 - does work&lt;BR /&gt;pre nat - src: 30.0.0.1 dst: 10.0.0.100&lt;BR /&gt;post nat - src: 10.0.0.10(H) dst: 10.0.0.10&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;gateway a encryption domain: local-10.0.0.100/32 remote-30.0.0.1/32,10.0.0.10/32&lt;BR /&gt;gateway b encryption domain: local-30.0.0.1/32 remote-10.0.0.100/32&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tried adding&amp;nbsp;10.0.0.10/32 to gateway b local domain but it didn't make a difference&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2023 12:01:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177375#M29571</guid>
      <dc:creator>Ryan_Ryan</dc:creator>
      <dc:date>2023-04-05T12:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: DNAT inside Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177523#M29593</link>
      <description>&lt;P&gt;It’s actually in the SK itself: “&lt;SPAN&gt;In order to trigger an encryption decision in domain-based VPN, the source and destination must be included in the respective encryption domains and only in them.”&lt;BR /&gt;That suggests you should be able to add the DNAT IP into the Encryption Domain for the remote end.&lt;BR /&gt;I assume the remote end would need to make a similar configuration change.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Otherwise, this seems like it’s operating as designed.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2023 09:26:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177523#M29593</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-06T09:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: DNAT inside Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177622#M29606</link>
      <description>&lt;P&gt;thanks, I was struggling to read that SK, it was written rather oddly, I am not sure what they mean by "and only in them" essentially I did try that already, on the vpn peer I included the post and pre nat IP and the same on the Checkpoint, the peer is a Cisco so I could tell easily that there were no hits on the SA with the NAt IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am wondering if they mean that I should not have the real IP in the encryption domain, only the NAT IP? the real IP is part of a subnet so bit harder to exclude that to test it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2023 23:36:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177622#M29606</guid>
      <dc:creator>Ryan_Ryan</dc:creator>
      <dc:date>2023-04-06T23:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: DNAT inside Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177707#M29633</link>
      <description>&lt;P&gt;Did you make the same change on the local definition of the remote encryption domain?&lt;BR /&gt;You should not need to exclude the "real" IP, only add the NAT one.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Apr 2023 02:07:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177707#M29633</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-08T02:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: DNAT inside Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177716#M29634</link>
      <description>&lt;P&gt;yes I did, the NAT Ip (&lt;SPAN&gt;10.0.0.10&lt;/SPAN&gt;) was added to the remote gateways local side, I also have the real IP. It did establish an SA but no packets matching.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Apr 2023 05:00:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177716#M29634</guid>
      <dc:creator>Ryan_Ryan</dc:creator>
      <dc:date>2023-04-08T05:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: DNAT inside Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177717#M29635</link>
      <description>&lt;P&gt;Packets routed via a Domain-Based VPN bypass the functions that perform DNAT.&lt;BR /&gt;Which means your only option to make this work is a route-based VPN.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Apr 2023 05:17:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177717#M29635</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-08T05:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: DNAT inside Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177805#M29639</link>
      <description>&lt;P&gt;ok thank you that settles it then!&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2023 22:58:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/DNAT-inside-Domain-based-VPN/m-p/177805#M29639</guid>
      <dc:creator>Ryan_Ryan</dc:creator>
      <dc:date>2023-04-10T22:58:42Z</dc:date>
    </item>
  </channel>
</rss>

