<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 750 Appliance with a DMZ'ed FTP Server in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61598#M2359</link>
    <description>Uncheck "Hide behind Gateway IP" in the Server object.</description>
    <pubDate>Sun, 01 Sep 2019 15:56:12 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-09-01T15:56:12Z</dc:date>
    <item>
      <title>750 Appliance with a DMZ'ed FTP Server</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61586#M2358</link>
      <description>&lt;P&gt;Hello, I was hoping to get some help setting up an FTP server on the DMZ port of a 750 Series Appliance.&amp;nbsp; I guess I'm actually looked for a "best-practice" technique because I'm not sure what I've done is the "proper" way.&lt;/P&gt;&lt;P&gt;We have a static IP address for our internet connection and also have an additional static IP available for the FTP server, if desired.&amp;nbsp; I'd be happy using either.&lt;/P&gt;&lt;P&gt;So, I have the 750 setup and working.&amp;nbsp; I activated the DMZ port and gave it an internal IP.&amp;nbsp; I setup an FTP machine on that subnet, plugged it into the DMZ port.&amp;nbsp; Then setup a "server" object to forward the FTP ports to the FTP server's IP.&amp;nbsp; I currently have the NAT for the server object set to "Hide Behind Gateway (port forwarding).&lt;/P&gt;&lt;P&gt;Now, this setup works by accessing our main IP address BUT the FTP server software sees all incoming FTP connections as coming from our main (external) IP address.&amp;nbsp; Not the actual originating IP address of the client.&amp;nbsp; So it seems to me like the incoming traffic is getting "NAT"ed to our internet IP.&amp;nbsp; (Is that possible?)&lt;/P&gt;&lt;P&gt;At this point I don't know what I'm doing wrong.&amp;nbsp; What I'd like is for the FTP Software to see incoming FTP connections with the originating IP address.&amp;nbsp; This way I could block/ban certain IP's.&amp;nbsp; Right now I can't block any IP's because everything is coming in with our public IP address.&lt;/P&gt;&lt;P&gt;I've love an explanation of the correct way to do this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks....&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2019 22:44:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61586#M2358</guid>
      <dc:creator>Suspend</dc:creator>
      <dc:date>2019-08-31T22:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: 750 Appliance with a DMZ'ed FTP Server</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61598#M2359</link>
      <description>Uncheck "Hide behind Gateway IP" in the Server object.</description>
      <pubDate>Sun, 01 Sep 2019 15:56:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61598#M2359</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-01T15:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: 750 Appliance with a DMZ'ed FTP Server</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61600#M2360</link>
      <description>&lt;P&gt;Thanks for the quick reply!!&lt;/P&gt;&lt;P&gt;The "Hide Behind Gateway (port forwarding)" option cannot be "unchecked".&amp;nbsp; I would have to choose a different NAT such as "Static NAT" or "No NAT".&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ServerObject.jpg" style="width: 708px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2375i4C5E84464B8ACCBB/image-size/large?v=v2&amp;amp;px=999" role="button" title="ServerObject.jpg" alt="ServerObject.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I've tried Static NAT with the same results.&amp;nbsp; I haven't been able to get "No NAT" to work because I don't understand what they mean by "Server's IP address is accessible from the internet".&amp;nbsp; I thought maybe that means I give the server computer our second public static IP but then it doesn't make sense how to configure the DMZ port because it wants to create an internal facing subnet, which seems to be counter-intuitive.&lt;/P&gt;&lt;P&gt;Help.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2019 16:45:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61600#M2360</guid>
      <dc:creator>Suspend</dc:creator>
      <dc:date>2019-09-01T16:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: 750 Appliance with a DMZ'ed FTP Server</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61604#M2361</link>
      <description>My bad, actually you need to uncheck the "Force translated traffic to return to the gateway" option.</description>
      <pubDate>Sun, 01 Sep 2019 21:02:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61604#M2361</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-01T21:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: 750 Appliance with a DMZ'ed FTP Server</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61605#M2362</link>
      <description>&lt;P&gt;You da man!!!!&amp;nbsp; Thank you!!!&amp;nbsp; That worked.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2019 21:08:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/750-Appliance-with-a-DMZ-ed-FTP-Server/m-p/61605#M2362</guid>
      <dc:creator>Suspend</dc:creator>
      <dc:date>2019-09-01T21:08:55Z</dc:date>
    </item>
  </channel>
</rss>

