<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64436#M2445</link>
    <description>&lt;P&gt;Yes, I opened a RFE. Let‘s see what happens. Thanks.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 06 Oct 2019 06:42:12 GMT</pubDate>
    <dc:creator>Stephan_Kremer</dc:creator>
    <dc:date>2019-10-06T06:42:12Z</dc:date>
    <item>
      <title>Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64030#M2418</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have two locally managed DAIP gateways (620 &amp;amp; 730). I need to create a site-to-site VPN between them:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;620 -----&amp;gt; NAT device ------&amp;gt; Internet ------&amp;gt; NAT device -----&amp;gt; 730&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;730 is configured that only remote site opens the connection. 620 is using the hostname to open the connection. Authentication is based on certificates and IKEv1 is used. Using the hostname to connect, NAT-T is not used and so the tunnel is not established. If I temporary change the connection from hostname to IP between static NAT, then the tunnel comes up because NAT-T is used.&lt;/P&gt;&lt;P&gt;My question: how can I force the gateway to use NAT-T when connecting to a hostname instead of an IP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 06:28:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64030#M2418</guid>
      <dc:creator>Stephan_Kremer</dc:creator>
      <dc:date>2019-10-01T06:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64033#M2419</link>
      <description>&lt;P&gt;This is explained in&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk162472&amp;amp;partition=Advanced&amp;amp;product=Small" target="_blank"&gt;sk162472: How to force &lt;STRONG&gt;NAT-T&lt;/STRONG&gt; on Gaia Embedded devices&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 06:58:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64033#M2419</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-10-01T06:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64035#M2420</link>
      <description>&lt;P&gt;I will give it a try later on, sounds promising. Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 07:32:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64035#M2420</guid>
      <dc:creator>Stephan_Kremer</dc:creator>
      <dc:date>2019-10-01T07:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64065#M2421</link>
      <description>&lt;P&gt;I gave it a try, but there is a known limitation that seems to match exactly my environment:&lt;/P&gt;&lt;P&gt;&lt;A title="600/700 known limitations" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105380" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105380&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ID:&amp;nbsp;&lt;A href="tel:01620625" target="_blank"&gt;01620625&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anybody know if there is a workaround or fix available, so would it make sense to open a SR?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 15:08:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64065#M2421</guid>
      <dc:creator>Stephan_Kremer</dc:creator>
      <dc:date>2019-10-01T15:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64419#M2444</link>
      <description>This would most likely require an RFE to address.</description>
      <pubDate>Sat, 05 Oct 2019 05:13:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64419#M2444</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-05T05:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64436#M2445</link>
      <description>&lt;P&gt;Yes, I opened a RFE. Let‘s see what happens. Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Oct 2019 06:42:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64436#M2445</guid>
      <dc:creator>Stephan_Kremer</dc:creator>
      <dc:date>2019-10-06T06:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64630#M2446</link>
      <description>&lt;P&gt;I think that&amp;nbsp;&lt;SPAN&gt;sk105380 and&amp;nbsp;sk162472 contradict&amp;nbsp;each h other - did you try&amp;nbsp;sk162472 yet ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 13:12:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64630#M2446</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-10-09T13:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64632#M2447</link>
      <description>&lt;P&gt;Yes, sure I tried but it does not work. The contradiction is quite obvious &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 13:30:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64632#M2447</guid>
      <dc:creator>Stephan_Kremer</dc:creator>
      <dc:date>2019-10-09T13:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64634#M2448</link>
      <description>&lt;P&gt;RFE is nice, but did you already consult TAC ?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 13:32:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64634#M2448</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-10-09T13:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: Force NAT-T for S2S VPN with two DAIP locally managed appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64637#M2449</link>
      <description>&lt;P&gt;Yes, they confirmed that the limitations is still valid and I need to open a RFE.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 13:40:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Force-NAT-T-for-S2S-VPN-with-two-DAIP-locally-managed-appliances/m-p/64637#M2449</guid>
      <dc:creator>Stephan_Kremer</dc:creator>
      <dc:date>2019-10-09T13:40:37Z</dc:date>
    </item>
  </channel>
</rss>

