- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters
E1: How AI is Reshaping Our World
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
We have VSX running on R81.20 JHF76, with one virtual system (id 5) running just FW1+VPN blades. It has one LAN interface, an external and a numbered VTI with universal tunnel. The default route is up the tunnel.
The client LAN is set to do DHCP relay to a remote server:
set bootp interface bond101.XXX1 on
set bootp interface bond101.XXX1 relay-to XXX.XXX.XXX.231 on
set bootp interface bond101.XXX1 primary 192.168.50.254
However, the DHCP relay is originating from the wrong IP - it's from the vsx private subnet, and it's then automatically NATted it behind the outgoing interface (VTI).
Has anyone else had this problem?
Thanks
Jamie
If you do a 'show route destination [ip of your relay-to server]' from clish or 'ip route get [ip of your relay-to server]' from expert in the VS5 context, does it have a route out of the correct interface?
Hi Emma,
Yes, it's following the default route up the tunnel
[Expert@FW-VSX-PRI:5]# ip route get XXX.XXX.XXX.231
XXX.XXX.XXX.231 via 192.0.2.81 dev vpnt509 src 172.31.248.33
cache
[Expert@FW-VSX-PRI:5]# ip route
default via 192.0.2.81 dev vpnt509 proto 7
172.31.248.0/28 dev wrp320 proto kernel scope link src 172.31.248.1
172.31.248.16/28 dev bond101.3xx1 proto kernel scope link src 172.31.248.17
PUBLICIP.0/27 dev wrp320 proto 7 scope link
192.0.2.81 dev vpnt509 proto 7 scope link
192.168.50.0/24 dev bond101.3xx1 proto 7 scope link
VPNPEER via PUBLICIP.30 dev wrp320 proto 7
It looks like it's going to route the DHCP requests up the VPN tunnel to the relay, is that intended? If not you might should add a static route to the correct next hop for it.
The Primary IP in the bootp config isn't there to set the source IP on the packets. From the admin guide: it's the IPv4 address to use as the BOOTP/DHCP router address. If you enter an IPv4 address, all BOOTP/DHCP requests received on the interface are stamped with this IPv4 address. This can be useful on interfaces with multiple IPv4 addresses (aliases).
Hence the outgoing packets are still going to use the source IP on the interface they are routed out of.
Thanks, is there a way we can "persuade" the NAT to use the LAN-side vip 192.168.50.254 as its hide NAT, not the outgoing tunnel interface? We only have a number on the VTI because it's VSX, and the other end doesn't by default know how to route back to the tunnel local interface.
The cluster hide NAT isn't something that can be directly affected in that way. You can try adding a hideNAT rule in the policy but outbound hide NAT for packets originating from the gateway doesn't generally work. Would it be possible to NAT it at the other end of the VPN tunnel?
Yeah, we ended up doing that to change the private tunnel IP into something that the 3rd party could route.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 13 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsThu 08 Jan 2026 @ 05:00 PM (CET)
AI Security Masters Session 1: How AI is Reshaping Our WorldAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY