- Products
- Learn
- Local User Groups
- Partners
- More
Check Point WAF TechTalk:
Introduction and New Features
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
CheckMates Go:
CheckMates Fest
Hello,
My 5800 checkpoint LAN IP is 10.103.253.10 and LAN subnet is 10.100.0.0/16, then i have 2 vpn site to site to azure and the tunnel already established.
Now i have requirement to change that the traffic from LAN subnet if want go to 1st VPN tunnel (Subnet 10.200.0.0/16) will go directly without any NAT.
Then i also need traffic from LAN subnet if want go to 2nd VPN Tunnel (Subnet 10.150.0.0/16) should be NATted using interface ip address (10.103.255.10).
Anyone here know how to make that NAT?
You can simply make manual nat rules in smart console based on those requirements.
Andy
Hello,
So my NAT setting is :
Original source : 10.100.0.0/16
Original destination : 10.150.0.0/16
And what should i choose on translate source so the traffic will be translated to my checkpoint interface?
Whatever the IP is that needs to be translated to.
Andy
Let me test it in the lab and will let you know.
Andy
Works for me.
Andy
Did you set it as hide or static?
Im fairly sure that can ONLY work with hide nat.
Indeed I'm suggesting this is the likely cause for the error reported.
Yup, agree!
Hello,
I change the static nat to hide and the error was gone, but actually when i try RDP from 10.100.50.25 to Azure windows VM 10.50.10.10 then i check in the task manager, the source is still from host 10.100.50.25 and not from 10.103.107.1.
What i can see on the log there only decrypt message and in the message detail there are no NAT rule.
In such a case that you described, ONLY hide nat rule would work, as you cant do static nat from subnet to subnet translation, for the lack of the better term.
If IP is different, just change the natted IP in the translated packet, push policy and test.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 33 | |
| 32 | |
| 20 | |
| 12 | |
| 11 | |
| 11 | |
| 10 | |
| 9 | |
| 8 | |
| 8 |
Tue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 03:00 PM (EDT)
Maestro Masters Americas: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 03:00 PM (EDT)
Maestro Masters Americas: Hyperscale Firewall Architectures and OptimizationTue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY