- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hey guys,
we use R81.10. We have already establised a IPv6 tunnel between two Gaia gateways, because we have only a public IPv6 address on our 5G contract available.
Basically it works fine with the tunnel, when we use IPv6 for communication. The bad thing is, that Check Point does not support IPv4 in IPv6 tunnels. That makes it nearly useless, because we have a lot applications who are not IPv6 ready - unfortunately.
We tried to translate the IPv4 addresses in IPv6, that we can pass the tunnel. On the peer gateway we nat the addresses from IPv6 in IPv4 addresses back. That would make IPv6 transparent for the client/server communication.
Client (v4/v6) -->| fw1 (v6) | ==(v6 Tunnel)== | fw2 (NAT64)| ---> Server (v4)
Nat46 and Nat64 works fine. On the fw1 Nat46 will executed, but the packets are not entering the tunnel. Is there a solution to prior the Nat rules before the VPN rules (Policy)? NAT66 works fine in the tunnel, but the destination IPv6 is already included in the Encryption Domain.
Thanks in advance,
Best regards,
Stefan
Did you happen to include in your IPv6 Encryption Domain the IPv6 version of your IPv4 addresses?
Hi PhoneBoy,
thanks for the fast response. Yes, the IPv6 addresses are in included in the Encryption Domain. Do you have still any other idea?
Destination IPv4 - 192.168.1.105 (is only in normal Access Rule)
Destination IPv6 (NAT46) - 2003:cf:825:210::105 (is inlcuded in the Endryption Domain)
If i try to connect to the IPv6 address it works fine over the IPv6 tunnel.
I'm not talking about the destination encryption domain, I'm talking about the source encryption domain.
Is the result of the NAT46 translation included in the source encryption domain?
Yes, the "Xlate (NAT)" source IP address is also in the source encryption domain.
Is this a domain-based VPN or a route-based VPN?
Possible that might work with a route-based VPN, but I suspect this is unsupported.
I would open a TAC case to get confirmation: https://help.checkpoint.com
TAC response:
I suspect that it may work with Route based VPN(VTI) but it is currently not supported per sk163313.
https://support.checkpoint.com/results/sk/sk163313
That SK doesn't really say it's not supported...but it doesn't say it is, either.
However, trying Route-Based VPNs (if possible) seems like the only possibility.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 18 | |
| 10 | |
| 9 | |
| 9 | |
| 4 | |
| 4 | |
| 3 | |
| 2 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY