- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I will try to keep this as brief as possible while also giving the pertinent information.
We have a HA cluster with ISP device IPs. We proxy ARP additional customer IPs (which we have had for 20 years) to this cluster.
We static NAT specific networks to these IPs as per historical business rules. IE keep the IPs you can get.
When I have network nodes that use the Hide NAT method it is considerably quicker than any static NAT method, which I can assume is related to the Proxy ARP. I am using the same 3 devices and changing their NAT method each time to eliminate some variables. The access rule order is not changing during my testing.
My cluster is a pair of 6700s using 10GbE interface for ingress and egress. I found an article about peak
[Expert@fw-ext-01:0]# fw tab -t fwx_cache -s
HOST NAME ID #VALS #PEAK #SLINKS
localhost fwx_cache 8116 64374 68428 0
Can anyone point my to documentation that can explain away this difference to Management?
Hey All.
I figured this out and will give a summary since it has a bit of history. Replying for future generations 🙂
Background:
The FIX:
Disable ISP redundancy and configure PBR
I dived into documentation and found a feature conflict between ISP Redundancy and PBR: Policy-Based Routing and Application-Based Routing in Gaia (checkpoint.com)
@Mike_T thanks for this post, it really helped! Solved: Route specific subnet out second ISP interface - Check Point CheckMates
Thanks for reading..
Please elaborate how HIDE NAT is "considerably quicker" than STATIC NAT.
Some packet captures might also provide clues as to what's actually going on here.
Also what version/JHF is this relevant to?
Personally, I never heard one type of nat be faster than the other, thats news to me.
Andy
Define "quicker" for Hide NAT. Overall throughput? Connection establishment time? Connection via static NAT is established but stops working for brief periods?
My guess is you are using the gateway's address for your Hide NATs which of course the gateway will answer ARP requests for, but for your static NATs you probably have manual proxy ARPs defined. Sounds like something is amiss with your proxy ARPs and they are not being learned promptly or being kept cached by the surrounding devices. If you suspect intermittent ARP problems consider arpwatch, the clish command is: set ip-conflicts-monitor
How many static proxy ARPs are we talking here? Dozens? Hundreds? Thousands? Your firewall's default route is explicitly defined to a next-hop IP address and not the just the interface itself right? If defined to the interface that will cause an ARP table overflow which will cause a "rolling outage" behavior that will severely impact performance.
The number of cached NAT entries in fwx_cache is unlikely to be related to your problem, unless the slowness is only happening at initial connection establishment time and the gateway's CPU is heavily overloaded. Maybe.
@the_rock & @PhoneBoy I am gathering the stats and captures shortly. Given this is for a Guest DMZ network it isn't the greatest of urgencies.
R81.20 JHF Take 76
@Timothy_Hall Yes the hide NAT is using the gateway's interface IP and yes the Proxy ARP entries are manual (8 of them)
I have found the affected route to the Guest network do in fact point to an interface and not an IP. Default route points to ISP IP on the gateway's network. I will investigate ARP table overflow. It does appear to be overall throughput, not just initial connections.
The only routes that should ever point to an interface are directly connected networks on the same subnet.
Otherwise, you might get the "rolling outage" situation that @Timothy_Hall described, which I accidentally created once. 🙂
No rush mate...when you got it, just send them over and we will review.
Andy
Hey All.
I figured this out and will give a summary since it has a bit of history. Replying for future generations 🙂
Background:
The FIX:
Disable ISP redundancy and configure PBR
I dived into documentation and found a feature conflict between ISP Redundancy and PBR: Policy-Based Routing and Application-Based Routing in Gaia (checkpoint.com)
@Mike_T thanks for this post, it really helped! Solved: Route specific subnet out second ISP interface - Check Point CheckMates
Thanks for reading..
Excellent...thanks for sharing!
Andy
For the context, below sk states pbr is NOT supported with ispr.
Andy
https://support.checkpoint.com/results/sk/sk167135
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 18 | |
| 13 | |
| 12 | |
| 12 | |
| 10 | |
| 6 | |
| 5 | |
| 5 | |
| 4 |
Wed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY