<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question on IPSEC VPN in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248349#M41503</link>
    <description>&lt;P&gt;You got the answers from phoneboy and they are correct.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Wed, 07 May 2025 14:15:13 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-05-07T14:15:13Z</dc:date>
    <item>
      <title>Question on IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248315#M41495</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;I've been asked to provision the new IPSEC VPN tunnel between Checkpoint and the 3rd party device. I've got quick question and I'd like to seek your help.&lt;/P&gt;&lt;P&gt;Below is the traffic flow:-&lt;/P&gt;&lt;P&gt;3rd party (Source/Encryption domain: 10.40.1.0/24) -&amp;gt; Internet-facing Checkpoint FW (Hide NAT: 10.50.1.1/32) -&amp;gt; Internal Firewall -&amp;gt; Server (Destination: 10.60.1.1/32)&lt;/P&gt;&lt;P&gt;1. The checkpoint firewall haven't been configured with Main address/topology IP with the Public IP address. Hence I decided to use 'Statically NAT IP' under link selection with the public IP- 1.2.3.4 and configure the upstream Internet router with the Static NAT of 1.2.3.4 -&amp;gt; Eth1 (Internet-facing Interface) Cluster VIP. Will it work?&lt;/P&gt;&lt;P&gt;2. Should I need to explicitly allow the firewall rules between 1.2.3.4 -&amp;gt; 5.6.7.8 with IKE and ESP for the VPN to come up or will it be allowed via implied rules automatically?&lt;/P&gt;&lt;P&gt;3. The Destination is being Hide NAT'd with the source: 10.50.1.1/32 on the Checkpoint firewall. I believe this should be part of the encryption domain and not the original server-10.60.1.1/32?&lt;/P&gt;&lt;P&gt;4. Should I need to add a route on the Internet-facing Checkpoint firewall for the 3rd party subnet:10.40.1.0/24 towards Interface of the default-route for the return traffic or will it be routed via VPN tunnel automatically since it's part of the encryption domain?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 09:21:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248315#M41495</guid>
      <dc:creator>SriNarasimha005</dc:creator>
      <dc:date>2025-05-07T09:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: Question on IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248347#M41502</link>
      <description>&lt;P&gt;1. Yes, this is correct.&lt;/P&gt;
&lt;P&gt;2. Should be handled with implied rules automatically, yes.&lt;/P&gt;
&lt;P&gt;3. The encryption domain on the local system should contain the addresses pre-NAT that will communicate over the VPN. The remote will need to account for the relevant NAT IP in their definition for your site.&lt;/P&gt;
&lt;P&gt;4. Default route should cover it in this case. The only time you need an explicit route is if you want to use a different interface for outbound VPN traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 14:10:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248347#M41502</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-07T14:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Question on IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248349#M41503</link>
      <description>&lt;P&gt;You got the answers from phoneboy and they are correct.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 14:15:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248349#M41503</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-07T14:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Question on IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248357#M41504</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;Gents,&lt;/P&gt;&lt;P&gt;Many thanks for your feedback.&lt;/P&gt;&lt;P&gt;With regards to Point#3, you've highlighted as the Pre-NAT addresses which implies about the real-server IP (&lt;SPAN&gt;10.60.1.1/32)&lt;/SPAN&gt;. As per my understanding, I believe, Encryption happens after the source NAT. In this case, on the local system/Checkpoint shouldn't we be configuring the NAT'd IP addresses on the encryption domain?&lt;/P&gt;&lt;P&gt;With regards to Point#4, Apologies, I missed to highlight it. Internet facing firewall is having a wider-route towards the Internal/Core firewall for 10.0.0.0/8. In this scenario, should we need to place the route for the source:&amp;nbsp;&lt;SPAN&gt;10.40.1.0/24 on the Internet facing firewall towards the default-route from preventing the traffic being routed back to the Internal firewall again? Or will it be automatically sent via the tunnel without any specific route?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please help to clarify&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 15:11:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248357#M41504</guid>
      <dc:creator>SriNarasimha005</dc:creator>
      <dc:date>2025-05-07T15:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: Question on IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248358#M41505</link>
      <description>&lt;P&gt;NAT happens when the packet is routed on the local gateway (before the Output chains).&lt;BR /&gt;The NAT IP does not need to be in your local Encryption Domain.&lt;/P&gt;
&lt;P&gt;With the details you provided, yes, an explicit route on the gateway for 10.40.1.0/24 is necessary.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 15:15:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248358#M41505</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-07T15:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: Question on IPSEC VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248361#M41507</link>
      <description>&lt;P&gt;Here is what I would do, just to be 100% sure. if natting is needed for vpn, MAKE SURE that both original and natted IP(s) are part of VPN domain.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 16:05:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Question-on-IPSEC-VPN/m-p/248361#M41507</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-07T16:05:19Z</dc:date>
    </item>
  </channel>
</rss>

