<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable NAT-T for a single Site to Site VPN. in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Disable-NAT-T-for-a-single-Site-to-Site-VPN/m-p/210495#M34852</link>
    <description>&lt;P&gt;Drop UDP 4500 from the other peer IP. Only allow ESP and ike500.&lt;/P&gt;
&lt;P&gt;NAT-t is most of the time started by the other side. In older versions Check Point only accepts and do not send.&lt;/P&gt;
&lt;P&gt;Newer version depends on config (is global setting)&lt;/P&gt;
&lt;P&gt;You can only as far as I know disable it on global level.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Apr 2024 20:35:12 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2024-04-04T20:35:12Z</dc:date>
    <item>
      <title>Disable NAT-T for a single Site to Site VPN.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-NAT-T-for-a-single-Site-to-Site-VPN/m-p/210483#M34846</link>
      <description>&lt;P&gt;Hello, I need to disable NAT-T for a single S2S VPN, because if I disable it on the gateway object, the mobile blade does not work and remote users are affected. That means:&lt;/P&gt;&lt;P&gt;NAT-T enabled: Remote Users OK. - S2S VPN fails.&lt;/P&gt;&lt;P&gt;NAT-T disabled: Remote Users fail. - S2S VPN OK.&lt;/P&gt;&lt;P&gt;The VPN community settings does not allow to disable it for that particular community.&lt;/P&gt;&lt;P&gt;Is there something I'm missing? Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 19:19:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-NAT-T-for-a-single-Site-to-Site-VPN/m-p/210483#M34846</guid>
      <dc:creator>hcampuzano</dc:creator>
      <dc:date>2024-04-04T19:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: Disable NAT-T for a single Site to Site VPN.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-NAT-T-for-a-single-Site-to-Site-VPN/m-p/210495#M34852</link>
      <description>&lt;P&gt;Drop UDP 4500 from the other peer IP. Only allow ESP and ike500.&lt;/P&gt;
&lt;P&gt;NAT-t is most of the time started by the other side. In older versions Check Point only accepts and do not send.&lt;/P&gt;
&lt;P&gt;Newer version depends on config (is global setting)&lt;/P&gt;
&lt;P&gt;You can only as far as I know disable it on global level.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 20:35:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-NAT-T-for-a-single-Site-to-Site-VPN/m-p/210495#M34852</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-04-04T20:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Disable NAT-T for a single Site to Site VPN.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-NAT-T-for-a-single-Site-to-Site-VPN/m-p/210501#M34855</link>
      <description>&lt;P&gt;You can't modify how NAT-T behaves at the VPN Community level, but you can do it at the object level and all this would apply for your gateways, externally managed gateways, and interoperable devices.&amp;nbsp; So what you could try is modifying these GUIdbedit properties on the object representing the peer gateway on the other side of the tunnel, or you may be able to adjust these on your own gateway object without breaking RAS VPN, the last one in the list in particular.&amp;nbsp; &amp;nbsp;The default values for R81.20 are shown:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;force_nat_t&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;boolean&amp;nbsp; false&amp;nbsp; "force the GW to use NAT traversal (port 4500)"&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;ike_support_nat_t&lt;/STRONG&gt;&amp;nbsp; boolean&amp;nbsp; true "Support NAT Traversal (port 4500)"&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;offer_nat_t_initiator&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;boolean&amp;nbsp; false&amp;nbsp; "Send NAT-T VID (for Initiator GW)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;offer_nat_t_responder_for_known_gw&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;boolean&amp;nbsp; true&amp;nbsp; "Accept NAT_T connections from known GWs and send NAT-T vendor id (for Responder GW)"&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 04 Apr 2024 21:17:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-NAT-T-for-a-single-Site-to-Site-VPN/m-p/210501#M34855</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-04-04T21:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: Disable NAT-T for a single Site to Site VPN.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-NAT-T-for-a-single-Site-to-Site-VPN/m-p/211366#M35059</link>
      <description>&lt;P&gt;I think is allowed by implicit rules... if so, fw accel dos rule is needed, or also a fake nat rule it should work&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 08:38:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-NAT-T-for-a-single-Site-to-Site-VPN/m-p/211366#M35059</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2024-04-16T08:38:01Z</dc:date>
    </item>
  </channel>
</rss>

