- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
This may be a pipe-dream, but can I somehow create a NAT Rule and/or Policy to tell CP to protect a group of IP addresses instead of a single IP? I've got a situation where my customer has multiple PIPs to protect, and I'd hate to create a NAT rule for each one.
I was thinking perhaps even connecting to Azure, then creating a NAT rule based on multiple Azure Objects/IPs?
Any insight is super appreciated
Cheers,
Oscar
Please elaborate with example of what you want to acheive
If I understand well, you would like to simply add more than one object on a NAT rule ?
If so, you've alright, we cannot do that; but: this object could be a group of objects... That's the solution I would propose.
BTW: that could be the What is your Check Point Idea of the Year? what do you think Dameon Welch Abernathy ?
Thank you Xavier, any chance you can provide an example of group of Objects which represent Public IPs? The Original Services uses a Port, which is different for each IP.
Hi Oscar, Vladimir Yakovlev proposed you what I thought
Regarding , you'll be able to look at available articles on Check Mates, like Video Link : 5568
Thank you Xavier Bensemhoun . I have modified the #Ansible Playbook and running it on my local OS X. I already enabled the API via the Mangement Server and tested login via Postman, all works.
Now I am just overcoming running the Playbook locally on OS X as it wants to SSH into localhost, and I enabled SSH. But now get another error. Figuring out what that actually is now...
I've used Ansible before but never forced it to SSH to local machine but rather remote machines like Linux and Windows via WinRM as well.
fatal: [127.0.0.1]: FAILED! => {
"changed": false,
"module_stderr": "/bin/sh: [path: command not found\n",
"module_stdout": "",
"msg": "MODULE FAILURE",
"rc": 127
}
to retry, use: --limit @/Users/sharepointoscar/Downloads/check_point_mgmt_v1.0.1/plays/cpmanagement/checkpointmanagement.retry
____________
< PLAY RECAP >
------------
\ ^__^
\ (oo)\_______
(__)\ )\/\
||----w |
|| ||
127.0.0.1 : ok=0 changed=0 unreachable=0 failed=1
OK ; so at this point, you should create another "question" article in Developers (Code Hub) section so that everyone involved on using Ansible will be able to help you
Thanks Xavier Bensemhoun . I'll post on the other forum. I got past this issue, but have others....
You mean something like this:
Thanks Vladimir - so here is a screenshot of my existing configuration. Basically I have about 80 more PIPs to protect, right now each line protects a PIP since we have different Service/Port for a given protocol.
I don't see how I can avoid using the Service/Protocol if I were to group the PIPs?
OK. Let's see if I understand your environment setup:
1. You are probably using your public DNS to translate URLs to the IP of the gateway with high ports.
2. Inbound traffic to the high ports hitting gateway is then NATed to the static private IPs with standard ports and forwarded to the servers.
If this is the case, you can implement another device between gateway and your servers that will perform NAT and PAT. Something like F5 will do the trick, I believe.
This should allow you to use single static destination in a single rule with "Original Services" containing a group comprised of all custom HTTP HTTPS services you have defined for your hosts and "Translated Services" remaining "Original".
Thank you Vladimir Yakovlev we did not want to add yet another device for this scenario, hence why it would not work for us.
You're doing port translation for a specific destination IP, which will redirect to a different IP based on destination port.
Don't know of a way to do this without creating lots of rules, like you describe.
Thank you Dameon Welch Abernathy My next approach will be to use Ansible to create a batch of Hosts, Rules and publish them
If the challenge is to deliver on a server farm you can setup a logical server, it's not the most advanced but will allow you to add more than one server to receive the at the same destination port/service.
If it's just trying to map several services on a single public IP and deliverer it to it's own different IP, on a per service bases, then I think it might be like Dameon says. I do have a question though.
If the "world" is going for a high-port on the gw IP, why are you forcing the redirect to a standard port like http? Why don't you put the listening http at the same port you published to outside world?, by simply assuming you MUST redirect destination port you are narrowing down your options by your self:
The above screenshot might has well be a group of high ports or what ever you need, just make the services on the server side match the original destination service and you are on with a bundle of ports in a single NAT rule.
Hope this helps
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
7 | |
6 | |
4 | |
4 | |
4 | |
3 | |
2 | |
2 | |
2 | |
2 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY