- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi All,
I hope you are doing well.
The issue I am facing is that my GTW A is not able to communicate with the MGMT server sitting in a different location. There is mpls connection between GTW A and the MGMT server. When we ping the MGMT server from GTW A, it nats to mpls interface ip and sends traffic to the other site. Ideally, this should not happen. We created no nat rule at the top, but the issue is there.
GTW A: 10.1.12.22
MPLS IP on GTW A: 10.1.92.3
MGMT Server: 10.1.85.200
GTW A--> (MPLS) ---> DC GTW --> MGMT SERVER
On MGMT SERVER, in tcp dump, I see traffic is coming from 10.1.92.3
There is no route on the DC MPLS router for 10.1.92.3 to send reply traffic to Site A.
Anyone face this issue?
Do you have this setting enabled on mgmt?
Hello @the_rock : This setting is not enabled.
Hi,
What is the route on GTW A to reach the MGMT server?
Looking at "GTW A--> (MPLS) ---> DC GTW --> MGMT SERVER" the route on GTW A to the MGTM server is via the MPLS network.
So a PING will leave the MPLS interface on GTW A and thus source IP is 10.1.92.3.
Is IPSec involved? Is there a tunnel between GTW A and DC GTW over which the MGMT traffic is send?
Regards,
Martijn
Hi @Martijn : Yes route on the firewall to send traffic to the MGMT server is through the MPLS interface.
MGMT traffic is over the MPLS link, not ipsec tunnel.
Hi,
So if the route on the firewall towards the management server is on the MPLS (Internal) interface it is normal behaviour the firewall will us this interface as the source interface (and thus source IP) for traffic the firewall initiates to the management server. Just like @emmap mentions.
The IP-address configured on the firewall object (maybe in your case 10.1.12.22) is only administrative. The Gaia OS will use standard routing to reach a destination.
From the information you provided all is working fine and there is no NAT-ing involved. Just basic routing. But maybe I missed something.
When running 'tcpdump', you see the MPLS IP. Can you also try "fw monitor'. It will show more details and you can check the NAT-ing.
Martijn
Outbound traffic from a gateway is basically always sourced from the interface IP that it exited on. So, it's not NAT'ing anything, it's the actual source IP of the packet, so a noNAT rule won't change anything. (unless you're seeing an actual NAT statement in the log card for this traffic, in which case I am confused).
You can try an explicit NAT to set it back to the other interface IP, but I can't guarantee this would work reliably or at all.
Hi @emmap : The MPLS interface is set to internal at the moment. I am not able to understand why its natting it to the MPLS Interface IP. The setting hide internal networks behind the gateway's external ip is also not selected. We don't see nat in logs, but NAT is happening when we see is tcpdump.
How to do explicit NAT? I was checking if this is expected behaviour?
As @Martijn says it sounds like you are describing normal outbound packet behaviour. If the packet is leaving a gateway, it will use the IP address of the interface it left on (or the VIP of that interface if it's a cluster). There is no NATing occuring in your logs because the gateway is not NAT'ing anything, it's just sending a packet from an interface and using the IP of that interface as its source IP.
I have now reread the original post and lo and behold, your post has opened my eyes. I first read that it uses VIP, but it actually uses its own MPLS IP. So you are absolutely right, it works as designed.
As mates already stated, this should not happen. Was the behavior from beginning? Would suprise because this should not be standard behavior.
Anyway, i remember the sk https://support.checkpoint.com/results/sk/sk34180 which you might check.
If this has been modified you should check why this has been done.
long ago there was an option to select which protocols have been hidden behind vip but i forgot all about it.
Hi @Vincent_Bacher : This behaviour is from begining and we are seeing this on all locations linked with MPLS connection to DC MGMT SRVR.
I also checked sk34180, and the configuration has not changed.
Strange, in this case I would log a sr at UC and ask tac.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 23 | |
| 19 | |
| 10 | |
| 9 | |
| 8 | |
| 7 | |
| 6 | |
| 4 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementThu 18 Jun 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point WAF - The Next Generation of AI powered protectionFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY