<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote VPN client presents GW IP to other servers in the network in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116305#M8830</link>
    <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The client has been installed as Checkpoint Mobile&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access from the remote client to other resources in the Encryption domain work as expected.&lt;/P&gt;&lt;P&gt;All connections from the Encryption domain to the remote VPN addresses are failing.&amp;nbsp; They're not even appearing in the logs.&lt;/P&gt;&lt;P&gt;I've attached a snippet of the Fw Monitor below for connections from remote client to LAN:&lt;/P&gt;&lt;P&gt;eth1 - LAN&lt;/P&gt;&lt;P&gt;eth4 - external interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[vs_0][fw_4] eth4:i[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54811&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][fw_4] eth4:I[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54811&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][fw_4] eth1:o[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54811&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][fw_4] eth1:I[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][fw_4] eth1:O[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][fw_4] eth1:I[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][fw_4] eth1:I[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][fw_4] eth1:o[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][fw_4] eth1:O[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][fw_4] eth1:o[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][fw_4] eth1:O[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][ppak_0] eth4:i[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][fw_4] eth4:i[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][fw_4] eth4:I[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][fw_4] eth1:o[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][fw_4] eth1:I[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][fw_4] eth1:O[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][fw_4] eth1:I[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][fw_4] eth1:O[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[44]: 192.168.2.1 -&amp;gt; 172.21.1.10 (UDP) len=76 id=51122&lt;BR /&gt;[vs_0][ppak_0] eth4:i[44]: 192.168.2.1 -&amp;gt; 172.21.1.10 (UDP) len=76 id=51122&lt;BR /&gt;[vs_0][fw_4] eth4:i[44]: 192.168.2.1 -&amp;gt; 172.21.1.10 (UDP) len=76 id=51122&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I ping from LAN to remote client I get the below:&lt;/P&gt;&lt;P&gt;LAN PC: 192.168.0.5&lt;/P&gt;&lt;P&gt;Remote Client: 192.168.2.1&lt;/P&gt;&lt;P&gt;[vs_0][ppak_0] eth1:i[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_0] eth1:i[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_0] eth1:I[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_0] eth1:o[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_0] eth1:O[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_5] eth1:Oe[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Apr 2021 09:19:29 GMT</pubDate>
    <dc:creator>PointOfChecking</dc:creator>
    <dc:date>2021-04-19T09:19:29Z</dc:date>
    <item>
      <title>Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116176#M8824</link>
      <description>&lt;P&gt;Sorry if this has already been posted, but I can't find anything posted nor any admin guide which explains it.&lt;/P&gt;&lt;P&gt;We've got the Remote VPN set up, and clients connected successfully and working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, when we check logs of other servers, we cant see the IP of the remote client, just the Cluster IP (Main IP) of the GW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LAN Network address: 192.168.0.0/22 (192.168.0.0 - 192.168.3.255)&lt;/P&gt;&lt;P&gt;VPN Network Range: 192.168.2.0/24 (192.168.2.0 - 192.168.2.255)&lt;/P&gt;&lt;P&gt;GW (Main IP): 192.168.0.1&lt;/P&gt;&lt;P&gt;Proxy Server: 192.168.0.100&lt;/P&gt;&lt;P&gt;Remote Client IP: 192.168.2.1&lt;/P&gt;&lt;P&gt;LAN Client IP: 192.168.0.5&lt;/P&gt;&lt;P&gt;Both clients visit: &lt;A href="http://www.website.com" target="_blank"&gt;www.website.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I check the proxy log, I can see 2 connections visiting &lt;A href="http://www.website.com" target="_blank"&gt;www.website.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;- LAN Client IP: 192.168.0.5&lt;/P&gt;&lt;P&gt;- Remote Client IP: 192.168.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I can see clearly which LAN client accessed &lt;A href="http://www.website.com" target="_blank"&gt;www.website.com&lt;/A&gt;, but I can't see which of the 254 remote Clients accessed that website, just someone on the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to present the remote clients address (e.g. 192.168.2.1) to the proxy server?&lt;/P&gt;&lt;P&gt;Note that the LAN address is 192.168.0.0/22 which covers all addresses including those in the VPN range (192.168.2.0/24)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 10:32:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116176#M8824</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2021-04-16T10:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116190#M8825</link>
      <description>&lt;P&gt;That does not sound right...what is the remote access ip range you assigned for the clients? I had never seen this issue in all my years with CP.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 12:18:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116190#M8825</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-04-16T12:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116191#M8826</link>
      <description>&lt;P&gt;Hi the_rock.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry, I may have used the wrong terminology:&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;VPN Network Range: 192.168.2.0/24 (192.168.2.0 - 192.168.2.255)"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The "VPN Network Range" is the "Remote access ip range".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just to clarify:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- we're using R80.40 for MGMT and GWs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- from Logs and Monitor in SmartConsole I can see the different source IPs and Access Roles pick up correct LDAP information&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- The problem is I can only see GW (MAIN IP) when checking logs of other third party servers (in the example in the OP, it was the proxy server in use)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 12:41:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116191#M8826</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2021-04-16T12:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116194#M8827</link>
      <description>&lt;P&gt;I would check the NAT rules (manual and implicit ones).&lt;/P&gt;
&lt;P&gt;Check the Check Point logs again and watch for xlate information.&lt;/P&gt;
&lt;P&gt;It's definitly possible to not hide NAT vpn client traffic behind gateway when using Office Mode.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 13:22:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116194#M8827</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-04-16T13:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116198#M8828</link>
      <description>&lt;P&gt;There aren't any NAT rules apart from the automatically created hide rule for the office mode range.&lt;/P&gt;&lt;P&gt;Based on your comment, I thought this might be the problem, so I added a rule higher above for:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SRC:OfficeMode DST:VPNDOMAIN&amp;nbsp; any service&amp;nbsp; =original =original =original&lt;/P&gt;&lt;P&gt;This didn't work, but made things worse, we lost all connections to the office.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 15:00:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116198#M8828</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2021-04-16T15:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116206#M8829</link>
      <description>&lt;P&gt;What precisely was the VPN client installed as?&lt;BR /&gt;Can you confirm that access to other resources works as expected?&lt;BR /&gt;Have you used fw monitor to see what’s happening when the Remote Access client is trying to access something?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 16:36:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116206#M8829</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-04-16T16:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116305#M8830</link>
      <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The client has been installed as Checkpoint Mobile&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access from the remote client to other resources in the Encryption domain work as expected.&lt;/P&gt;&lt;P&gt;All connections from the Encryption domain to the remote VPN addresses are failing.&amp;nbsp; They're not even appearing in the logs.&lt;/P&gt;&lt;P&gt;I've attached a snippet of the Fw Monitor below for connections from remote client to LAN:&lt;/P&gt;&lt;P&gt;eth1 - LAN&lt;/P&gt;&lt;P&gt;eth4 - external interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[vs_0][fw_4] eth4:i[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54811&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][fw_4] eth4:I[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54811&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][fw_4] eth1:o[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54811&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54812&lt;BR /&gt;[vs_0][fw_4] eth1:I[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][fw_4] eth1:O[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=43340&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54813&lt;BR /&gt;[vs_0][fw_4] eth1:I[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][fw_4] eth1:I[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][fw_4] eth1:o[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][fw_4] eth1:O[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][fw_4] eth1:o[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][fw_4] eth1:O[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=1350 id=60780&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[44]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=388 id=60781&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][ppak_0] eth4:i[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][fw_4] eth4:i[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][fw_4] eth4:I[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54814&lt;BR /&gt;[vs_0][fw_4] eth1:o[44]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=47 id=54815&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54816&lt;BR /&gt;[vs_0][fw_4] eth1:I[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][fw_4] eth1:O[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][fw_4] eth1:I[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60782&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][fw_4] eth1:O[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][fw_4] eth1:Oe[40]: 192.168.0.100 -&amp;gt; 192.168.2.1 (TCP) len=40 id=60783&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][ppak_0] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][fw_4] eth4:i[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][fw_4] eth4:I[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][fw_4] eth1:o[40]: 192.168.2.1 -&amp;gt; 192.168.0.100 (TCP) len=40 id=54817&lt;BR /&gt;[vs_0][ppak_0] eth4:iD[44]: 192.168.2.1 -&amp;gt; 172.21.1.10 (UDP) len=76 id=51122&lt;BR /&gt;[vs_0][ppak_0] eth4:i[44]: 192.168.2.1 -&amp;gt; 172.21.1.10 (UDP) len=76 id=51122&lt;BR /&gt;[vs_0][fw_4] eth4:i[44]: 192.168.2.1 -&amp;gt; 172.21.1.10 (UDP) len=76 id=51122&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I ping from LAN to remote client I get the below:&lt;/P&gt;&lt;P&gt;LAN PC: 192.168.0.5&lt;/P&gt;&lt;P&gt;Remote Client: 192.168.2.1&lt;/P&gt;&lt;P&gt;[vs_0][ppak_0] eth1:i[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_0] eth1:i[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][ppak_0] eth1:Oe[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_0] eth1:I[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_0] eth1:o[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_0] eth1:O[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;BR /&gt;[vs_0][fw_5] eth1:Oe[44]: 192.168.0.5 -&amp;gt; 192.168.2.1 (ICMP) len=60 id=9278&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 09:19:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116305#M8830</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2021-04-19T09:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116325#M8831</link>
      <description>&lt;P&gt;If I'm reading this right, it's getting dropped before the big O on the inbound direction.&amp;nbsp;&lt;BR /&gt;What does an fw ctl zdebug drop | grep client-ip says is the reason for this?&lt;BR /&gt;If nothing is shown, I recommend a TAC case for further troubleshooting.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 15:41:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116325#M8831</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-04-19T15:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116615#M8833</link>
      <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we found that it was a routing issue.&amp;nbsp; We had to add a route to the hosts on the LAN to point to the GW.&lt;/P&gt;&lt;P&gt;192.168.2.0/24 -&amp;gt; 192.168.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question is, as the LAN network range is 192.168.0.0/22 (which includes 192.168.0.0 - 192.168.3.255 addresses)&lt;/P&gt;&lt;P&gt;This covers the VPN network range 192.168.2.0/24&amp;nbsp;(192.168.2.0 - 192.168.2.255).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why do I need to add the route?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have a VPN server from another manufacturer where the config works without having to add the route.&lt;/P&gt;&lt;P&gt;When I ping a host connected via that server I'm able to see the remote client added to my ARP table.&lt;/P&gt;&lt;P&gt;When I ping a host connected via the Checkpoint VPN, (after adding the route to my PC), the ping works, but the remote client does not appear in my ARP table.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 10:58:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116615#M8833</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2021-04-22T10:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116676#M8834</link>
      <description>&lt;P&gt;What is the precise network configuration between the LAN clients and the gateway?&lt;BR /&gt;Sounds like it's really a flat network (i.e. the gateway and the LAN clients are on the same network), is that correct?&lt;/P&gt;
&lt;P&gt;In which case, that route is one way to solve it.&lt;BR /&gt;Proxy ARPs on the gateway are another.&lt;BR /&gt;I don't believe either of these things happen automatically as the Office Mode subnet is usually on a different segment from the directly connected LAN.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 19:44:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116676#M8834</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-04-22T19:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN client presents GW IP to other servers in the network</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116699#M8835</link>
      <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;&lt;P&gt;Appreciate your time with this question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is indeed a flat network.&amp;nbsp; We've scheduled a change to update the routing on all the routers next Monday.&amp;nbsp; So should have this resolved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the tip about Proxy ARP, that might have been an easier and quicker solution.&amp;nbsp; Thanks again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Just tried the Proxy ARP and can confirm it works, but there isn't an option to configure for the entire subnet: 192.168.2.0/24&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If we were to use this solution, we'd have to manually add Proxy ARP records for all 254 IP addresses.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;May be in new update, we could request to add the facility to configure Proxy ARP for entire subnets?&amp;nbsp; Or would there be problems doing that?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks again&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Apr 2021 07:28:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-client-presents-GW-IP-to-other-servers-in-the-network/m-p/116699#M8835</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2021-04-23T07:28:34Z</dc:date>
    </item>
  </channel>
</rss>

