- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
We recently got the 1200R SMB that is managed by the management server. We want to use the SMB to connect the remote site with the headend Check Point open server at the data center.
We ran into the issue that the vendor host cannot talk to the remote server 2 by the NATed IP (10.5.4.22). However, I can ping from the remote server 2 (172.22.1.1) to the vendor host (198.211.48.97). The vendor host can talk to LAN server 1 (10.5.4.21) without any issue.
I think there is an issue to NAT and VPN egress out to the remote site on the same Check Point FW.
I am not sure if I can remove the NAT and have the vendor host talks directly to the remote server 2 IP (172.22.1.1).
Can someone help me figure out what is the problem?
Finally, I was able to resolve the issue with tech support. It appeared the NATed address (10.5.4.22) for the remote server 2 is required to be part of the VPN domain on the remote Check Point SMB. In addition, the "Disable NAT inside the VPN community" must be unchecked in order to allow the NAT traffic reaching the destination IP.
Hi there,
To be able to assist you fully, could you please answer the following questions:
1) Is there a firewall rule on the Check Point Open Server that allows the vendor host to initiate traffic?
2) Have you ruled out that there are no issues with the intermediary routers before the open server (by running a traceroute or pathping)?
3) What type of traffic have you attempted to send from the vendor host to the remote server 2?
4) What do the logs show? Could you attach a couple of screenshots?
5) Is NAT disabled on the VPN or not?
6) Can the vendor host communicate with any other nodes behind the SMB gateway?
Thanks.
Yes to all the questions except the below question.
> Do you use automatic NAT? (added the NAT IP on the object of that remote server?)
No. I created a manual NAT. But since you asked, I just added the auto NAT 10.5.4.22 for the remote server 172.22.1.1.
I can currently ping from the remote server to the vendor host, I assume the manual NAT is working fine. I do know v77.30 has the NAT issue that requires adding the auto NAT prior to the manual NAT in order to make it functional.
Yes, I have the Proxy ARP setup for both 10.5.4.21 and 10.5.4.22. Is there a way to check the local.arp?
ok, I already ran fw ctl arp and saw the entry for 10.5.4.22
What do you think the issue is about? I only have the one-way traffic from remote server 2 to the vendor host.
> do you have the source network in the local VPN domain of your open server gateway?
Just to clarify for the above question, the source network of the vendor host subnet 198.211.48.0/24 is in the local VPN domain of the open server gateway as shown in the picture.
I would involve TAC here - they could possibly resolve this issue in a short RAS...
I already opened a case without a resolution. I hope we have more brains here for inputs and suggestions to figure out what’s the issue. Thanks!
Finally, I was able to resolve the issue with tech support. It appeared the NATed address (10.5.4.22) for the remote server 2 is required to be part of the VPN domain on the remote Check Point SMB. In addition, the "Disable NAT inside the VPN community" must be unchecked in order to allow the NAT traffic reaching the destination IP.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
5 | |
4 | |
4 | |
3 | |
3 | |
2 | |
2 | |
2 | |
2 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY