- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
You can probably make this work, but you are going "against the grain" of normal IP routing.
1) First off, under Global Properties, NAT verify that "translate destination on the client side" is checked for both automatic and manual NAT (this the default). DO NOT EVEN THINK ABOUT UNCHECKING ANY BOXES ON THIS SCREEN.
2) Next, add a static route on the firewall for 172.20.112.80/32 to a next hop router reachable through the eth2-02.611 interface. You cannot just specify the interface name, you must specify a nexthop router address leading to eth2-02.611. This /32 is more specific and will override your existing directly attached /24 route to 172.20.112.0/24. Note that the "real" 172.20.112.80/32 reachable through eth2-02.628 will no longer be accessible by any traffic traversing the firewall.
3) Check the topology of your firewall/cluster for interface for eth2-02.611, if not using "network defined by routes" you will need to add 172.20.112.80/32 to the anti-spoofing definition for this interface. You do NOT need to remove 172.20.112.80/32 from the topology of interface eth2-02.628.
4) You will need to ensure that your surrounding network will deliver traffic bound to 172.20.112.80/32 to the firewall on eth2-01; the firewall cannot force/spoof this with proxy ARP or somesuch in your scenario. This may involve static 172.20.112.80/32 routes added directly on user workstations, or adding a static 172.20.112.80/32 route on a router(s) in your network. If the firewall is already the default route for these user workstations you should not need to deal with this.
5) Next step will be a manual NAT rule. Because you are attempting to pluck the 172.20.112.80/32 address from an existing, real /24 subnet and send it somewhere else, there is a danger of asymmetric routing breaking things. For this reason I'd suggest both a source Hide NAT behind the egress firewall interface eth2-02.611 as well as the destination static NAT, to ensure replies come back symmetrically to the firewall. Keep in mind that if you do this connections can only be initiated outbound by the workstations and not the other way around; also this Hide NAT part may not be necessary depending on your network.
Manual NAT rule will look something like this:
Osrc=(initiating workstation subnet)
ODst=172.20.112.80/32
OSrv = Any
Tsrc=Firewall Object (Force Hide)
TDst=163.116.128.80/32 (Static)
Tsrc=Original
GW=(relevant gateway)
6) In your Access Control policy ensure you have a rule accepting the traffic, keep in mind you should always reference the pre-NAT IP addresses here, so:
src= (initiating workstation subnets)
Dst = 172.20.112.80/32
Service=whatever
Action=Accept
Track=Log (make sure "Connection" logging is set in advanced properties so you get proper NAT logging)
You can configure NAT rules this way, but other parts of the network may need to be configured to support it.
What is the default route for your clients here?
Will it direct traffic from 172.20.112.80 to your gateway?
If not, you will need to fix that.
The default gateway for the clients is another L3 switch before the packet makes its way to the firewall.
Yes, it will direct the traffic to the Checkpoint gateway and I can see it in the logs.
You can probably make this work, but you are going "against the grain" of normal IP routing.
1) First off, under Global Properties, NAT verify that "translate destination on the client side" is checked for both automatic and manual NAT (this the default). DO NOT EVEN THINK ABOUT UNCHECKING ANY BOXES ON THIS SCREEN.
2) Next, add a static route on the firewall for 172.20.112.80/32 to a next hop router reachable through the eth2-02.611 interface. You cannot just specify the interface name, you must specify a nexthop router address leading to eth2-02.611. This /32 is more specific and will override your existing directly attached /24 route to 172.20.112.0/24. Note that the "real" 172.20.112.80/32 reachable through eth2-02.628 will no longer be accessible by any traffic traversing the firewall.
3) Check the topology of your firewall/cluster for interface for eth2-02.611, if not using "network defined by routes" you will need to add 172.20.112.80/32 to the anti-spoofing definition for this interface. You do NOT need to remove 172.20.112.80/32 from the topology of interface eth2-02.628.
4) You will need to ensure that your surrounding network will deliver traffic bound to 172.20.112.80/32 to the firewall on eth2-01; the firewall cannot force/spoof this with proxy ARP or somesuch in your scenario. This may involve static 172.20.112.80/32 routes added directly on user workstations, or adding a static 172.20.112.80/32 route on a router(s) in your network. If the firewall is already the default route for these user workstations you should not need to deal with this.
5) Next step will be a manual NAT rule. Because you are attempting to pluck the 172.20.112.80/32 address from an existing, real /24 subnet and send it somewhere else, there is a danger of asymmetric routing breaking things. For this reason I'd suggest both a source Hide NAT behind the egress firewall interface eth2-02.611 as well as the destination static NAT, to ensure replies come back symmetrically to the firewall. Keep in mind that if you do this connections can only be initiated outbound by the workstations and not the other way around; also this Hide NAT part may not be necessary depending on your network.
Manual NAT rule will look something like this:
Osrc=(initiating workstation subnet)
ODst=172.20.112.80/32
OSrv = Any
Tsrc=Firewall Object (Force Hide)
TDst=163.116.128.80/32 (Static)
Tsrc=Original
GW=(relevant gateway)
6) In your Access Control policy ensure you have a rule accepting the traffic, keep in mind you should always reference the pre-NAT IP addresses here, so:
src= (initiating workstation subnets)
Dst = 172.20.112.80/32
Service=whatever
Action=Accept
Track=Log (make sure "Connection" logging is set in advanced properties so you get proper NAT logging)
Thank you. I'll try this in the next couple of days and report back.
Thank you so much. That worked really well. The reason we did this was because we had an old proxy server that we are going to decomission and point all servers to netskope. But changing proxy address on each server would have impacted our deadlines, so the easy approach was to NAT the old proxy IP and redirect traffic to the new netskope IP.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 33 | |
| 18 | |
| 7 | |
| 7 | |
| 6 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY