<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LAN NAT address issue in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/LAN-NAT-address-issue/m-p/114175#M5042</link>
    <description>&lt;P&gt;What model exactly is the Check Point gateway in this case?&lt;BR /&gt;Since you posted this in the SMB space, we'll assume it's one of the SMB appliances (700/1400/1500/1800).&lt;/P&gt;
&lt;P&gt;If the internal gateway is natting the subnet before the Check Point gateway sees it, there's no way to see those addresses unless the gateway does a "proxy" and adds an XFF header.&lt;BR /&gt;Even then, that will probably only work for HTTP traffic.&lt;BR /&gt;Otherwise, what should happen is the gateway should NOT NAT that subnet and the Check Point gateway should have a route pointing back to that network through that gateway.&lt;BR /&gt;This should also resolve the anti-spoofing issue as well, since anti-spoofing configuration is based on the routing table (on SMB appliances).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 21 Mar 2021 21:19:32 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-03-21T21:19:32Z</dc:date>
    <item>
      <title>LAN NAT address issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/LAN-NAT-address-issue/m-p/114174#M5041</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;Any help on the below please?&lt;BR /&gt;&lt;BR /&gt;Client is running a small network however part of the&amp;nbsp; LAN network goes through a internal gateway device where that portion of that LAN&amp;nbsp; subnet is terminated.&lt;BR /&gt;That GW&amp;nbsp; device then NAT's those addresses behind its direct connection it has to the Checkpoint Firewall using a&amp;nbsp; /30 address range&lt;/P&gt;&lt;P&gt;When I look at the FW logs I only see that&amp;nbsp; GW devices IP &amp;lt;10.0.8.2&amp;gt;, the Firewall then also does not apply any of the policies to the devices behind that internal GW&lt;/P&gt;&lt;P&gt;Is there anyway for the Firewall to see that&amp;nbsp; Natted subnet so polices can be applied?&lt;/P&gt;&lt;P&gt;It did initially pick up that subnet as spoofed addresses, however I disabled that in the CLI so now it only see the internal GW address and any devices that are directly connected to the firewall on the WiFi&lt;/P&gt;&lt;P&gt;Device&amp;lt;10.0.2.6 --- GW&amp;lt;10.0.2.1&amp;gt; NAT GW direct connection to fw &amp;lt;10.0.8.2&amp;gt; ---- &amp;lt;10.0.8.1&amp;gt;FW --- WAN fibre breakout&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Barry&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Mar 2021 20:22:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/LAN-NAT-address-issue/m-p/114174#M5041</guid>
      <dc:creator>Bazz_Tars</dc:creator>
      <dc:date>2021-03-21T20:22:04Z</dc:date>
    </item>
    <item>
      <title>Re: LAN NAT address issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/LAN-NAT-address-issue/m-p/114175#M5042</link>
      <description>&lt;P&gt;What model exactly is the Check Point gateway in this case?&lt;BR /&gt;Since you posted this in the SMB space, we'll assume it's one of the SMB appliances (700/1400/1500/1800).&lt;/P&gt;
&lt;P&gt;If the internal gateway is natting the subnet before the Check Point gateway sees it, there's no way to see those addresses unless the gateway does a "proxy" and adds an XFF header.&lt;BR /&gt;Even then, that will probably only work for HTTP traffic.&lt;BR /&gt;Otherwise, what should happen is the gateway should NOT NAT that subnet and the Check Point gateway should have a route pointing back to that network through that gateway.&lt;BR /&gt;This should also resolve the anti-spoofing issue as well, since anti-spoofing configuration is based on the routing table (on SMB appliances).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Mar 2021 21:19:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/LAN-NAT-address-issue/m-p/114175#M5042</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-03-21T21:19:32Z</dc:date>
    </item>
  </channel>
</rss>

