Hi everyone,
I have a question about NAT in a VPN tunnel. So far I don’t have any experience with this in a Check Point environment.
Current situation: There is already an existing VPN tunnel, and we want to make a server on our side available to the remote side, but have it hidden behind a different IP address using NAT.
How should the NAT rule be configured in Check Point for this? And what happens first: the decryption of the VPN traffic or the NAT processing?
Remote Server -> Remote GW — VPN Tunnel—> CP GW -> local Server
NAT Rule:
src: any| dst: nat ip | dst Port | Transl src: orig | transl dst: IP local srv | transl dst Port : 443.
??
Thanks in advance!
best regards,
Roman