- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
We recently got the 1200R SMB that is managed by the management server. We want to use the SMB to connect the remote site with the headend Check Point open server at the data center.
We ran into the issue that the vendor host cannot talk to the remote server 2 by the NATed IP (10.5.4.22). However, I can ping from the remote server 2 (172.22.1.1) to the vendor host (198.211.48.97). The vendor host can talk to LAN server 1 (10.5.4.21) without any issue.
I think there is an issue to NAT and VPN egress out to the remote site on the same Check Point FW.
I am not sure if I can remove the NAT and have the vendor host talks directly to the remote server 2 IP (172.22.1.1).
Can someone help me figure out what is the problem?
Finally, I was able to resolve the issue with tech support. It appeared the NATed address (10.5.4.22) for the remote server 2 is required to be part of the VPN domain on the remote Check Point SMB. In addition, the "Disable NAT inside the VPN community" must be unchecked in order to allow the NAT traffic reaching the destination IP.
Hi there,
To be able to assist you fully, could you please answer the following questions:
1) Is there a firewall rule on the Check Point Open Server that allows the vendor host to initiate traffic?
2) Have you ruled out that there are no issues with the intermediary routers before the open server (by running a traceroute or pathping)?
3) What type of traffic have you attempted to send from the vendor host to the remote server 2?
4) What do the logs show? Could you attach a couple of screenshots?
5) Is NAT disabled on the VPN or not?
6) Can the vendor host communicate with any other nodes behind the SMB gateway?
Thanks.
Yes to all the questions except the below question.
> Do you use automatic NAT? (added the NAT IP on the object of that remote server?)
No. I created a manual NAT. But since you asked, I just added the auto NAT 10.5.4.22 for the remote server 172.22.1.1.
I can currently ping from the remote server to the vendor host, I assume the manual NAT is working fine. I do know v77.30 has the NAT issue that requires adding the auto NAT prior to the manual NAT in order to make it functional.
Yes, I have the Proxy ARP setup for both 10.5.4.21 and 10.5.4.22. Is there a way to check the local.arp?
ok, I already ran fw ctl arp and saw the entry for 10.5.4.22
What do you think the issue is about? I only have the one-way traffic from remote server 2 to the vendor host.
> do you have the source network in the local VPN domain of your open server gateway?
Just to clarify for the above question, the source network of the vendor host subnet 198.211.48.0/24 is in the local VPN domain of the open server gateway as shown in the picture.
I would involve TAC here - they could possibly resolve this issue in a short RAS...
I already opened a case without a resolution. I hope we have more brains here for inputs and suggestions to figure out what’s the issue. Thanks!
Finally, I was able to resolve the issue with tech support. It appeared the NATed address (10.5.4.22) for the remote server 2 is required to be part of the VPN domain on the remote Check Point SMB. In addition, the "Disable NAT inside the VPN community" must be unchecked in order to allow the NAT traffic reaching the destination IP.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 3 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY