- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
My 5800 checkpoint LAN IP is 10.103.253.10 and LAN subnet is 10.100.0.0/16, then i have 2 vpn site to site to azure and the tunnel already established.
Now i have requirement to change that the traffic from LAN subnet if want go to 1st VPN tunnel (Subnet 10.200.0.0/16) will go directly without any NAT.
Then i also need traffic from LAN subnet if want go to 2nd VPN Tunnel (Subnet 10.150.0.0/16) should be NATted using interface ip address (10.103.255.10).
Anyone here know how to make that NAT?
You can simply make manual nat rules in smart console based on those requirements.
Andy
Hello,
So my NAT setting is :
Original source : 10.100.0.0/16
Original destination : 10.150.0.0/16
And what should i choose on translate source so the traffic will be translated to my checkpoint interface?
Whatever the IP is that needs to be translated to.
Andy
Let me test it in the lab and will let you know.
Andy
Works for me.
Andy
Did you set it as hide or static?
Im fairly sure that can ONLY work with hide nat.
Indeed I'm suggesting this is the likely cause for the error reported.
Yup, agree!
Hello,
I change the static nat to hide and the error was gone, but actually when i try RDP from 10.100.50.25 to Azure windows VM 10.50.10.10 then i check in the task manager, the source is still from host 10.100.50.25 and not from 10.103.107.1.
What i can see on the log there only decrypt message and in the message detail there are no NAT rule.
In such a case that you described, ONLY hide nat rule would work, as you cant do static nat from subnet to subnet translation, for the lack of the better term.
If IP is different, just change the natted IP in the translated packet, push policy and test.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 27 | |
| 23 | |
| 15 | |
| 14 | |
| 12 | |
| 10 | |
| 6 | |
| 6 | |
| 5 | |
| 4 |
Wed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY