<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Simple Proxy Arp / NAT config failing in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220441#M11021</link>
    <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have set up a different NAT IP now but with the server configuration wizard which should create the automatic arp entries, the fw ctl arp shows:&lt;/P&gt;&lt;P&gt;[Expert@GW2]# fw ctl arp&lt;BR /&gt;.....&lt;BR /&gt;(192.168.232.70) at 00-xx-xx-xx-xx-xx interface 192.168.232.253&lt;/P&gt;&lt;P&gt;Which is the mac address of the checkpoint on that local lan, as expected&lt;/P&gt;&lt;P&gt;The following command from server A contacting the NAT 192.168.232.70 eventually times out&lt;/P&gt;&lt;P&gt;# ssh -p 80 -v 192.168.232.70&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tcpdump generated on the checkpoint from the command above :&lt;/P&gt;&lt;P&gt;18:45:08.227136 ARP, Request who-has 192.168.232.70 tell ulive, length 46&lt;BR /&gt;18:45:08.227182 ARP, Reply 192.168.232.70 is-at 00:xx:xx:xx:xx:xx (oui Unknown), length 46&lt;/P&gt;&lt;P&gt;18:45:41.670006 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;18:45:44.752975 ARP, Request who-has 192.168.232.70 tell ulive, length 46&lt;BR /&gt;18:45:44.753029 ARP, Reply 192.168.232.70 is-at 00:xx:xx:xx:xx:xx (oui Unknown), length 46&lt;BR /&gt;18:46:13.681121 IP ulive.37472 &amp;gt; 192.168.232.70.www: Flags [S], seq 2802536161, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0&lt;BR /&gt;18:46:13.683147 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;18:46:14.694007 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;18:46:15.722018 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;18:46:18.801058 ARP, Request who-has 192.168.232.70 tell ulive, length 46&lt;BR /&gt;18:46:18.801109 ARP, Reply 192.168.232.70 is-at 00:xx:xx:xx:xx:xx:xx (oui Unknown), length 46&lt;BR /&gt;18:46:22.962116 ARP, Request who-has 192.168.232.70 tell 192.168.232.70, length 28&lt;BR /&gt;18:47:31.530069 ARP, Request who-has 192.168.232.70 tell 192.168.232.70, length 28&lt;/P&gt;&lt;P&gt;No traffic emerges at the other end of the IPSEC tunnel.&lt;/P&gt;&lt;P&gt;I will open a ticket as suggested but I am still very interested to hear from others who may have successfully set this up.&lt;/P&gt;&lt;P&gt;Thanks for your time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dek&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jul 2024 18:35:43 GMT</pubDate>
    <dc:creator>DekPlent</dc:creator>
    <dc:date>2024-07-11T18:35:43Z</dc:date>
    <item>
      <title>Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220208#M11011</link>
      <description>&lt;P&gt;Hi There&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am struggling with a basic Manual NAT set up on a clustered pair of Quantum 1590s Runnung R81.10.10 where I am trying to set up a NAT on local network for a system on a remote network at the end of a VPN&lt;/P&gt;&lt;P&gt;So I have a system A 192.168.232.10 trying to reach a remote system at the end of an IPSEC VPN IP 10.10.10.1 via the checkpoint IP gateway address 192.168.232.254 mac aa:bb:cc:dd:ee:ff for example&lt;/P&gt;&lt;P&gt;Now I would like to set a NAT of 192.168.232.50 for 10.10.10.1 system so that system A contacts 192.168.232.50 instead of the 10.10.10.1 real IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried with a manual NAT rule:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SystemA to&amp;nbsp; dest:192.168.232.50&amp;nbsp; translate destination to 10.10.10.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked the checkpoint to : Serve as ARP Proxy for the original destination's IP Address&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But this does not appear to work as the checkpoint is not replying to&amp;nbsp; ARP requests for 192.168.232.50 and so I am assuming that I'll need a proxy arp entry . The document :&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk114531" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk114531&lt;/A&gt;&lt;/P&gt;&lt;P&gt;is not clear as to what should go in the local.arp file could someone please elaborate? And is it always necessary to reboot as I will be unable to reboot this clustered pair.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried to use standard arp commands like:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;arp -i LAN3 -Ds 192.168.232.50 LAN3 pub&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;arp -s 192.168.232.50 xx:xx:xx:xx:xx:xx pub&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;arp -i LAN3 -Ds 192.168.232.50 LAN3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;which I tried but now have these entries in arp:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;? (192.168.232.50) at xx.xx.xx.xx.xx.xx [ether] PERM on LAN3&lt;BR /&gt;? (192.168.232.50) at * PERM PUP on eth0&lt;BR /&gt;? (192.168.232.50) at * PERM PUP on LAN3&lt;/P&gt;&lt;P&gt;(I cannot remove the last 2 entries)&lt;/P&gt;&lt;P&gt;Could anyone please shed any light on this , especially how to remove the PERM PUP&amp;nbsp; entries please?&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;&lt;P&gt;Dek&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 10:53:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220208#M11011</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2024-07-10T10:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220212#M11012</link>
      <description>&lt;P&gt;How do you manage the cluster?&lt;BR /&gt;local or central?&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Peter&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 11:21:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220212#M11012</guid>
      <dc:creator>JP_Rex</dc:creator>
      <dc:date>2024-07-10T11:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220213#M11013</link>
      <description>&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are managed locally. I connect to the active device's UI using the floating VIP (or ssh)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 11:28:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220213#M11013</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2024-07-10T11:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220318#M11014</link>
      <description>&lt;P&gt;local.arp is only relevant if the IP you are proxy arping for is on the same subnet.&lt;BR /&gt;The MAC you use should be relevant to the interface on the LAN you wish to proxy arp on.&lt;BR /&gt;Otherwise, this should be handled through routing.&lt;/P&gt;
&lt;P&gt;A simple network diagram would be helpful.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 21:22:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220318#M11014</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-10T21:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220378#M11017</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;The proxy arp is for a local IP which I am hoping the checkpoint with advertise and respond on behalf of.&lt;/P&gt;&lt;P&gt;The network diagram attached shows system A wanting to contact system B (which is currently remote but will eventually be on the local net with A - shown as the dotted box) but in the meantime I would like the checkpoint to provide a NAT with the IP that system B will eventually have&amp;nbsp; (192.168.232.50) when it is eventually installed locally.&amp;nbsp; But for now, when system A contacts 192.168.232.50 I would like the traffic for this NAT IP on the checkpoint to be routed to 10.10.10.1 (where system B curretnly resides).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Proxy.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26733i41C9DF6B22AFFD24/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Proxy.jpg" alt="Proxy.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also tried creating system B&amp;nbsp; as a web or custom server having a NAT of 192.168.232.50 so that the NAT rules were automatically generated to be routed to 10.10.10.1 but this also failed in that I saw nothing newly added to the arp tables for IP 192.168.232.50.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope the diagram helps to explain&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Dek&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 10:16:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220378#M11017</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2024-07-11T10:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220422#M11020</link>
      <description>&lt;P&gt;What does fw ctl arp say?&lt;BR /&gt;This is probably going to require a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 16:27:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220422#M11020</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-11T16:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220441#M11021</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have set up a different NAT IP now but with the server configuration wizard which should create the automatic arp entries, the fw ctl arp shows:&lt;/P&gt;&lt;P&gt;[Expert@GW2]# fw ctl arp&lt;BR /&gt;.....&lt;BR /&gt;(192.168.232.70) at 00-xx-xx-xx-xx-xx interface 192.168.232.253&lt;/P&gt;&lt;P&gt;Which is the mac address of the checkpoint on that local lan, as expected&lt;/P&gt;&lt;P&gt;The following command from server A contacting the NAT 192.168.232.70 eventually times out&lt;/P&gt;&lt;P&gt;# ssh -p 80 -v 192.168.232.70&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tcpdump generated on the checkpoint from the command above :&lt;/P&gt;&lt;P&gt;18:45:08.227136 ARP, Request who-has 192.168.232.70 tell ulive, length 46&lt;BR /&gt;18:45:08.227182 ARP, Reply 192.168.232.70 is-at 00:xx:xx:xx:xx:xx (oui Unknown), length 46&lt;/P&gt;&lt;P&gt;18:45:41.670006 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;18:45:44.752975 ARP, Request who-has 192.168.232.70 tell ulive, length 46&lt;BR /&gt;18:45:44.753029 ARP, Reply 192.168.232.70 is-at 00:xx:xx:xx:xx:xx (oui Unknown), length 46&lt;BR /&gt;18:46:13.681121 IP ulive.37472 &amp;gt; 192.168.232.70.www: Flags [S], seq 2802536161, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0&lt;BR /&gt;18:46:13.683147 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;18:46:14.694007 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;18:46:15.722018 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;18:46:18.801058 ARP, Request who-has 192.168.232.70 tell ulive, length 46&lt;BR /&gt;18:46:18.801109 ARP, Reply 192.168.232.70 is-at 00:xx:xx:xx:xx:xx:xx (oui Unknown), length 46&lt;BR /&gt;18:46:22.962116 ARP, Request who-has 192.168.232.70 tell 192.168.232.70, length 28&lt;BR /&gt;18:47:31.530069 ARP, Request who-has 192.168.232.70 tell 192.168.232.70, length 28&lt;/P&gt;&lt;P&gt;No traffic emerges at the other end of the IPSEC tunnel.&lt;/P&gt;&lt;P&gt;I will open a ticket as suggested but I am still very interested to hear from others who may have successfully set this up.&lt;/P&gt;&lt;P&gt;Thanks for your time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dek&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 18:35:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220441#M11021</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2024-07-11T18:35:43Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220444#M11022</link>
      <description>&lt;P&gt;Looks like we are actually replying to the arp whois with a MAC address.&lt;BR /&gt;It doesn't appear to be received by the remote end, thus why the repeated arp whois requests.&lt;/P&gt;
&lt;P&gt;Can you try putting a static arp on the client to see if that resolves the issue?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 18:40:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220444#M11022</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-11T18:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220446#M11023</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;The client ulive has the arp entry from the checkpoint:&lt;/P&gt;&lt;P&gt;root@ulive:~# arp -an&lt;BR /&gt;....&lt;BR /&gt;? (192.168.232.70) at 00:xx:xx:xx:xx:xx [ether] on eth0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The strange packets in trace is the&lt;/P&gt;&lt;P&gt;19:11:46.609646 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;19:11:47.622716 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;BR /&gt;19:11:48.642635 ARP, Request who-has 192.168.232.70 tell my.firewall, length 28&lt;/P&gt;&lt;P&gt;I am assuming my.firewall is the checkpoint itself but then also these packets:&lt;/P&gt;&lt;P&gt;19:05:47.794699 ARP, Request who-has 192.168.232.70 tell 192.168.232.70, length 28&lt;BR /&gt;19:06:56.402683 ARP, Request who-has 192.168.232.70 tell 192.168.232.70, length 28&lt;BR /&gt;19:08:04.846690 ARP, Request who-has 192.168.232.70 tell 192.168.232.70, length 28&lt;BR /&gt;19:09:14.466704 ARP, Request who-has 192.168.232.70 tell 192.168.232.70, length 28&lt;/P&gt;&lt;P&gt;I don't quite understand those either...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Derek&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 18:48:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220446#M11023</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2024-07-11T18:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220449#M11024</link>
      <description>&lt;P&gt;That sounds like a bug.&lt;BR /&gt;TAC is definitely your best bet.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 19:15:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220449#M11024</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-11T19:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Proxy Arp / NAT config failing</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220479#M11026</link>
      <description>&lt;P&gt;Thanks, I will open a call&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 08:45:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Simple-Proxy-Arp-NAT-config-failing/m-p/220479#M11026</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2024-07-12T08:45:49Z</dc:date>
    </item>
  </channel>
</rss>

