- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi
I am trying to do NAT translation inside the VPN tunnel and i cant wrap my head around this configuration.
The topology looks like this:
In the Encryption Domain on the Check Point i have 192.168.18.10 and 192.168.20.0/28
So server 192.168.18.10 should communicate with 10.10.13.1, which in turn is translated on the Fortigate side to 10.10.12.10.
First issue, Check Point will not route packet over VPN tunnel when i have 192.168.20.0/28 in the EncDom.
If i put 192.168.20.0/28, which i did for a test the phase2 fails, because of course this net is not on the other side really.
NAT is enabled in the community.
I need some suggestions on how to think here
I believe this is the NAT rule you are looking for if I am following you correctly.
I would like the 192.168.18.10 server communicate with IP address 192.168.20.1 and not directly with 10.10.13.1 therefore the NAT table looks a bit weird.
So SRC 192.168.18.10 sends traffic to IP 192.168.20.1 and then this traffic gets translated to 10.10.13.1 so i do not have to use 10.10.13.1 in my local network
The firewall needs to have a route for 192.168.20.1 somewhere if you want it to be a destination, so it would have to be in the encryption domain on the Fortigate side, but then you'd be doing the NAT translation on the Fortigate side.
What problem are you trying to solve here?
you need to change the source ip in the nat rule also as stated before.
the 192.168.20.1 is floating IP and should be attached to fw with proxy arp.
both real local ip range + local NAT pool should be in local encr domain. You only need to add NAT pool of fortigate in remote peer enc domain, no need for you to know the real ip range there.
Thanks, so 192.168.20.1 should be manually configured on each FW in the cluster, with the external as interface then ?
No see it as floating IP, it does not have to be directly configured on the interface.
With proxy arp firewall will reply if traffic comes in with arp reply. Make the fw aware the floating IP belongs to the firewall. Just like you would do with public NAT if the IP range is routed to the fw and not directly configured on the interface.
So i used the static nat function in the NAT object that should be sufficient.
So the manual NAT rule should look like this ?
Orig SRC 192.168.18.1 Orig DST 192.168.20.1 translated dst 10.10.13.1 ?
That looks right.
Hi
Can you clarify a bit how the proxy arp should look like ?
Yes i have seen that one but what interface should this translated IP being attached to ?
Most likely external.
I believe what Lesley suggested makes sense.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 18 | |
| 13 | |
| 8 | |
| 6 | |
| 6 | |
| 6 | |
| 5 | |
| 4 | |
| 4 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY