Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
This widget could not be displayed.
8 Replies
This widget could not be displayed.
This widget could not be displayed.

Good afternoon,

I have 2 SMBs added from Checkpoint Management, I closed the VPN using SIC and VPN COMUTIES, when I try to access or ping the servers at both ends, it responds normally.

However, when I give a TRACERT on the LAN IP, it should go out through the firewall's LAN IP to the head office and vice versa, but it is going out to the public IP (WAN) and then arrives on the LAN network on the other side.

 

EXAMPLE:

tracert 192.168.0.100

1     <1 ms <1 ms <1 ms 192.168.200.247 - IP FW MATRIZ (FICTICIO)


2      5 ms 7 ms 7 ms 186.201.133.84 - WAN IP OF THE UNIT


3       8 ms 7 ms 6 ms 192.168.0.100 UNIT LAN IP

This is causing me a problem, I have equipment in the unit that needs to communicate with a server in the head office, but it has to be with the LAN IP, it is arriving with the WAN IP, and the connection is not completed.

 

Has anyone experienced a similar problem?

 

Thank you in advance for your support.

 

 

VPN route over WAN link

VPN route over WAN link

VPN route over WAN link

VPN route over WAN link

Good afternoon,

I have 2 SMBs added from Checkpoint Management, I closed the VPN using SIC and VPN COMUTIES, when I try to access or ping the servers at both ends, it responds normally.

However, when I give a TRACERT on the LAN IP, it should go out through the firewall's LAN IP to the head office and vice versa, but it is going out to the public IP (WAN) and then arrives on the LAN network on the other side.

 

EXAMPLE:

tracert 192.168.0.100

1     <1 ms <1 ms <1 ms 192.168.200.247 - IP FW MATRIZ (FICTICIO)


2      5 ms 7 ms 7 ms 186.201.133.84 - WAN IP OF THE UNIT


3       8 ms 7 ms 6 ms 192.168.0.100 UNIT LAN IP

This is causing me a problem, I have equipment in the unit that needs to communicate with a server in the head office, but it has to be with the LAN IP, it is arriving with the WAN IP, and the connection is not completed.

 

Has anyone experienced a similar problem?

 

Thank you in advance for your support.

 

 

Good afternoon,

I have 2 SMBs added from Checkpoint Management, I closed the VPN using SIC and VPN COMUTIES, when I try to access or ping the servers at both ends, it responds normally.

However, when I give a TRACERT on the LAN IP, it should go out through the firewall's LAN IP to the head office and vice versa, but it is going out to the public IP (WAN) and then arrives on the LAN network on the other side.

 

EXAMPLE:

tracert 192.168.0.100

1     <1 ms <1 ms <1 ms 192.168.200.247 - IP FW MATRIZ (FICTICIO)


2      5 ms 7 ms 7 ms 186.201.133.84 - WAN IP OF THE UNIT


3       8 ms 7 ms 6 ms 192.168.0.100 UNIT LAN IP

This is causing me a problem, I have equipment in the unit that needs to communicate with a server in the head office, but it has to be with the LAN IP, it is arriving with the WAN IP, and the connection is not completed.

 

Has anyone experienced a similar problem?

 

Thank you in advance for your support.

 

 

Good afternoon,

I have 2 SMBs added from Checkpoint Management, I closed the VPN using SIC and VPN COMUTIES, when I try to access or ping the servers at both ends, it responds normally.

However, when I give a TRACERT on the LAN IP, it should go out through the firewall's LAN IP to the head office and vice versa, but it is going out to the public IP (WAN) and then arrives on the LAN network on the other side.

 

EXAMPLE:

tracert 192.168.0.100

1     <1 ms <1 ms <1 ms 192.168.200.247 - IP FW MATRIZ (FICTICIO)


2      5 ms 7 ms 7 ms 186.201.133.84 - WAN IP OF THE UNIT


3       8 ms 7 ms 6 ms 192.168.0.100 UNIT LAN IP

This is causing me a problem, I have equipment in the unit that needs to communicate with a server in the head office, but it has to be with the LAN IP, it is arriving with the WAN IP, and the connection is not completed.

 

Has anyone experienced a similar problem?

 

Thank you in advance for your support.

 

 

Good afternoon,

I have 2 SMBs added from Checkpoint Management, I closed the VPN using SIC and VPN COMUTIES, when I try to access or ping the servers at both ends, it responds normally.

However, when I give a TRACERT on the LAN IP, it should go out through the firewall's LAN IP to the head office and vice versa, but it is going out to the public IP (WAN) and then arrives on the LAN network on the other side.

 

EXAMPLE:

tracert 192.168.0.100

1     <1 ms <1 ms <1 ms 192.168.200.247 - IP FW MATRIZ (FICTICIO)


2      5 ms 7 ms 7 ms 186.201.133.84 - WAN IP OF THE UNIT


3       8 ms 7 ms 6 ms 192.168.0.100 UNIT LAN IP

This is causing me a problem, I have equipment in the unit that needs to communicate with a server in the head office, but it has to be with the LAN IP, it is arriving with the WAN IP, and the connection is not completed.

 

Has anyone experienced a similar problem?

 

Thank you in advance for your support.

 

 

0 Kudos
0 Kudos
0 Kudos
0 Kudos
Mayron
Explorer
Mayron
Explorer
Mayron
Explorer
Mayron
Explorer

Good afternoon, in this case I use it through centralized management, the configuration is done in the Smart Console, following the attached nat rule, which I had tested.

Good afternoon, in this case I use it through centralized management, the configuration is done in the Smart Console, following the attached nat rule, which I had tested.

Good afternoon, in this case I use it through centralized management, the configuration is done in the Smart Console, following the attached nat rule, which I had tested.

Good afternoon, in this case I use it through centralized management, the configuration is done in the Smart Console, following the attached nat rule, which I had tested.

0 Kudos
0 Kudos
0 Kudos
0 Kudos
PhoneBoy
Admin
Admin
PhoneBoy
Admin
Admin
PhoneBoy
Admin
Admin
PhoneBoy
Admin
Admin

There is a similar setting in the VPN Community for centrally managed gateways:

image.png

If you enable this checkbox and push policy to the relevant gateways, a NAT rule should not be necessary.

There is a similar setting in the VPN Community for centrally managed gateways:

image.png

If you enable this checkbox and push policy to the relevant gateways, a NAT rule should not be necessary.

There is a similar setting in the VPN Community for centrally managed gateways:

image.png

If you enable this checkbox and push policy to the relevant gateways, a NAT rule should not be necessary.

There is a similar setting in the VPN Community for centrally managed gateways:

image.png

If you enable this checkbox and push policy to the relevant gateways, a NAT rule should not be necessary.

0 Kudos
0 Kudos
0 Kudos
0 Kudos
Mayron
Explorer
Mayron
Explorer
Mayron
Explorer
Mayron
Explorer

Good afternoon,

Perfect, I understand, we are on the right track, I enabled it and it stopped appearing in my server's log which is coming through the unit's WAN IP, but I still haven't shown the IP of the equipment but rather the firewall of my Headquarters, inserting a printout below.

It should not arrive with IP 192.168.0.247 which is from the matrix firewall, it should arrive with IP 192.168.200.100 which would be the LAN IP of the equipment in the unit.

I am attaching the complete Community configuration.

Capture 5.jpg

Server Log.jpg

Good afternoon,

Perfect, I understand, we are on the right track, I enabled it and it stopped appearing in my server's log which is coming through the unit's WAN IP, but I still haven't shown the IP of the equipment but rather the firewall of my Headquarters, inserting a printout below.

It should not arrive with IP 192.168.0.247 which is from the matrix firewall, it should arrive with IP 192.168.200.100 which would be the LAN IP of the equipment in the unit.

I am attaching the complete Community configuration.

Capture 5.jpg

Server Log.jpg

Good afternoon,

Perfect, I understand, we are on the right track, I enabled it and it stopped appearing in my server's log which is coming through the unit's WAN IP, but I still haven't shown the IP of the equipment but rather the firewall of my Headquarters, inserting a printout below.

It should not arrive with IP 192.168.0.247 which is from the matrix firewall, it should arrive with IP 192.168.200.100 which would be the LAN IP of the equipment in the unit.

I am attaching the complete Community configuration.

Capture 5.jpg

Server Log.jpg

Good afternoon,

Perfect, I understand, we are on the right track, I enabled it and it stopped appearing in my server's log which is coming through the unit's WAN IP, but I still haven't shown the IP of the equipment but rather the firewall of my Headquarters, inserting a printout below.

It should not arrive with IP 192.168.0.247 which is from the matrix firewall, it should arrive with IP 192.168.200.100 which would be the LAN IP of the equipment in the unit.

I am attaching the complete Community configuration.

Capture 5.jpg

Server Log.jpg

0 Kudos
0 Kudos
0 Kudos
0 Kudos
PhoneBoy
Admin
Admin
PhoneBoy
Admin
Admin
PhoneBoy
Admin
Admin
PhoneBoy
Admin
Admin

I'm not clear what the "matrix" firewall is, or, really where anything in the diagram is.
Please reattach a diagram making the following items clearly noted:

  • Where traffic is originating from 
  • Where your Quantum Spark device is (the one we're talking about the configuration of)
  • Where your "headquarters" firewall is
  • Where the traffic is ultimately destined for 

In any case, if the traffic is leaving the SMB gateway with the correct IP according to the logs, then the NAT probably isn't happening at the SMB gateway.

I'm not clear what the "matrix" firewall is, or, really where anything in the diagram is.
Please reattach a diagram making the following items clearly noted:

  • Where traffic is originating from 
  • Where your Quantum Spark device is (the one we're talking about the configuration of)
  • Where your "headquarters" firewall is
  • Where the traffic is ultimately destined for 

In any case, if the traffic is leaving the SMB gateway with the correct IP according to the logs, then the NAT probably isn't happening at the SMB gateway.

I'm not clear what the "matrix" firewall is, or, really where anything in the diagram is.
Please reattach a diagram making the following items clearly noted:

  • Where traffic is originating from 
  • Where your Quantum Spark device is (the one we're talking about the configuration of)
  • Where your "headquarters" firewall is
  • Where the traffic is ultimately destined for 

In any case, if the traffic is leaving the SMB gateway with the correct IP according to the logs, then the NAT probably isn't happening at the SMB gateway.

I'm not clear what the "matrix" firewall is, or, really where anything in the diagram is.
Please reattach a diagram making the following items clearly noted:

  • Where traffic is originating from 
  • Where your Quantum Spark device is (the one we're talking about the configuration of)
  • Where your "headquarters" firewall is
  • Where the traffic is ultimately destined for 

In any case, if the traffic is leaving the SMB gateway with the correct IP according to the logs, then the NAT probably isn't happening at the SMB gateway.

0 Kudos
0 Kudos
0 Kudos
0 Kudos
Mayron
Explorer
Mayron
Explorer
Mayron
Explorer
Mayron
Explorer

Hello partner, I still have the same problem, testing it but I couldn't get it to arrive correctly, any ideas so I can test it?

I appreciate all the support.

Hello partner, I still have the same problem, testing it but I couldn't get it to arrive correctly, any ideas so I can test it?

I appreciate all the support.

Hello partner, I still have the same problem, testing it but I couldn't get it to arrive correctly, any ideas so I can test it?

I appreciate all the support.

Hello partner, I still have the same problem, testing it but I couldn't get it to arrive correctly, any ideas so I can test it?

I appreciate all the support.

0 Kudos
0 Kudos
0 Kudos
0 Kudos