<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EndPoint VPN NAT limitations in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/EndPoint-VPN-NAT-limitations/m-p/89999#M10221</link>
    <description>Unless you’re using SecuRemote, each client is assigned an Office Mode IP that is unique.&lt;BR /&gt;Not sure what it looks like at the IPSec level but I’ve also never seen/heard of any issues related many users being behind the same NAT using our Remote Access VPN either.</description>
    <pubDate>Sun, 28 Jun 2020 21:51:25 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-06-28T21:51:25Z</dc:date>
    <item>
      <title>EndPoint VPN NAT limitations</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/EndPoint-VPN-NAT-limitations/m-p/89983#M10220</link>
      <description>&lt;P&gt;We are looking to possibly replace a Microsoft AlwaysOn deployment which supports roughly 750 users/devices with the CheckPoint EndPoint suite.&lt;/P&gt;&lt;P&gt;It appears that the CheckPoint EndPoint IPSEC VPN is what would be required to replicate the "always on VPN" capability.&amp;nbsp; Specifically, we want the user's corporate issued laptops to automatically instantiate the tunnel back to corporate any time they are powered on and network connected, without user intervention or involvement.&amp;nbsp; This enables smooth login with AD credentials and allows the laptop to be centrally managed by our corporate infrastructure.&lt;/P&gt;&lt;P&gt;Does anyone know what the CheckPoint central firewall will use as identifiers for the IPSEC tunnels back from the EndPoint clients?&amp;nbsp; Normal IPSEC VPN metadata is identified and indexed by the IP address from which the connection originates.&amp;nbsp; Thus one cannot, for instance, have multiple SMB appliances sharing the same routable NAT address.&amp;nbsp; Are the EndPoint IPSEC VPNs also identified in the same way?&amp;nbsp; I would hope not, because sharing NAT addresses has to be fairly common for remote devices, which is why we see the workarounds for it built into SSL VPN clients.&lt;/P&gt;&lt;P&gt;We've had lots of issues with AlwaysOn, which is also an IPSEC VPN, mostly with the client being unable to form a tunnel back to the VPN concentrator.&amp;nbsp; I'm worried as we test the CheckPoint replacement, that we may see the same issues; perhaps the issues with AlwaysOn exist because we live in a small city with only a few ISPs, and thus a lot of our user base may be sharing routable NAT IPs under the carrier grade NAT scheme.&lt;/P&gt;&lt;P&gt;So, does anyone know: Will we see any issues with EndPoint IPSEC clients sharing routable IP addresses?&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jun 2020 10:21:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/EndPoint-VPN-NAT-limitations/m-p/89983#M10220</guid>
      <dc:creator>Dale_Lobb</dc:creator>
      <dc:date>2020-06-28T10:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: EndPoint VPN NAT limitations</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/EndPoint-VPN-NAT-limitations/m-p/89999#M10221</link>
      <description>Unless you’re using SecuRemote, each client is assigned an Office Mode IP that is unique.&lt;BR /&gt;Not sure what it looks like at the IPSec level but I’ve also never seen/heard of any issues related many users being behind the same NAT using our Remote Access VPN either.</description>
      <pubDate>Sun, 28 Jun 2020 21:51:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/EndPoint-VPN-NAT-limitations/m-p/89999#M10221</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-06-28T21:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: EndPoint VPN NAT limitations</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/EndPoint-VPN-NAT-limitations/m-p/90054#M10222</link>
      <description>&lt;P&gt;Having multiple VPN clients behind a single Hide NAT shouldn't be a problem.&amp;nbsp; Individual IKE negotiations are identified by cookies, and individual IPSec tunnels are identified by unique SPI (Security Parameter Index) values.&amp;nbsp; Because intervening NAT is present, NAT Traversal will be in use on UDP/4500.&lt;/P&gt;
&lt;P&gt;Of course should the VPN client use SSL/TLS for the VPN transport instead, port numbers will be in use and modified/tracked by the NAT device.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2020 13:31:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/EndPoint-VPN-NAT-limitations/m-p/90054#M10222</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-06-29T13:31:37Z</dc:date>
    </item>
  </channel>
</rss>

