- Products
- Learn
- Local User Groups
- Partners
- More
Secure Your AI Transformation
9 April @ 12pm SGT / 3pm CET / 2PM EDT
Check Point WAF TechTalk:
Introduction and New Features
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
CheckMates Go:
CheckMates Fest
Due to certain reasons. The previous administrator set several manual NAT rules (Rule6~10) on the firewall.
We want the host 172.16.224.109 to connect to the Internet through the third External interface (WAN3) of the firewall. And we set a PBR as the default route of the host.
But because of the influence of Manual NAT rule rule9. This makes it impossible for us to directly set Hide NAT to allow the host to connect to the Internet. Instead, a manual Hide NAT rule (Rule5) must be added to this rule.
After adding the NAT rule of Rule5, 172.16.224.109 can already access the Internet. But the strange thing is that after adding the NAT rule, I have to wait for several minutes before I can connect to the Internet. And when we remove the NAT, we have to wait for a few minutes before the connection is disconnected.
Wondering if anyone else has encountered a similar situation?
Existing connections that are NATted will keep using the same NAT, even if policy is reinstalled with rules specifying a different NAT address/rule for that connection. The NAT address to use is determined right after the Firewall/Network policy accept of the first packet and cannot be changed for the life of the connection. Only newly-initiated connections will use the newer rule.
What is probably happening is your DNS servers are sending DNS UDP requests to an ISP forwarder, which is tracked as a "connection" by the firewall. Even if you change the NAT rule and reinstall policy all those packets will still have the old NAT applied until the DNS "connection" ends and a new one starts. This would be a use case for clearing the NAT table as described earlier in the thread.
A better way to do this without deleting more than necessary is to add a new SAM rule matching the connection attributes in the SmartView Monitor (or fw sam) and making sure "close connections" is set. Simply apply the SAM rule, then immediately remove it to force new connections (with the new NAT) to start.
I recall customer having similar issue once and they just clearned NAT table, waited few mins, then all worked fine.
Andy
fw tab -t fwx_alloc -x from expert mode
Thanks for your kindly reply.
May I ask under what circumstances do we need to manually clear the NAT Cache? And will other service connections be affected when manually cleaned up?
Make sure to do it in maintenance mode, as any connections having to do with NAT, would be disrupted.
Andy
Existing connections that are NATted will keep using the same NAT, even if policy is reinstalled with rules specifying a different NAT address/rule for that connection. The NAT address to use is determined right after the Firewall/Network policy accept of the first packet and cannot be changed for the life of the connection. Only newly-initiated connections will use the newer rule.
What is probably happening is your DNS servers are sending DNS UDP requests to an ISP forwarder, which is tracked as a "connection" by the firewall. Even if you change the NAT rule and reinstall policy all those packets will still have the old NAT applied until the DNS "connection" ends and a new one starts. This would be a use case for clearing the NAT table as described earlier in the thread.
A better way to do this without deleting more than necessary is to add a new SAM rule matching the connection attributes in the SmartView Monitor (or fw sam) and making sure "close connections" is set. Simply apply the SAM rule, then immediately remove it to force new connections (with the new NAT) to start.
After add SAM rule. The traffic will be correctly applied to the new NAT settings.
But is this problem possibly caused by too much content in the NAT Table? I have never encountered similar problems when setting Manual NAT rules on other Checkpoint firewalls.
We checked the device status and the memory usage is not high.
That is why I mentioned clearing NAT table would not be a bad idea.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 41 | |
| 26 | |
| 14 | |
| 13 | |
| 12 | |
| 11 | |
| 11 | |
| 9 | |
| 8 |
Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesTue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY