- Products
- Learn
- Local User Groups
- Partners
-
More
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
IDC Spotlight -
Uplevel The SOC
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hi Guys,
We got some weird issues with NAT on R80.20 (no hf installed).
When we check logs we notice that basically the traffic was hitting a rule called "NAT Rule Number 0".
What does it stands for?
I have tried to check NAT Rules/Objects/implied rules/global properties and I was not able to find anything related to it or anything related to NAT for that specific network/objects.
Let me know,
RealD!Z
Do you have a static NAT defined for your SMS object and this checkbox set:
Do you have this box set in the NAT properties of your gateway/cluster:
There are also some NAT Rule 0 elements involved with clusters and hiding outbound connections initiated from the firewall itself behind the cluster address...
If you have cluster deployment and one of the members is the source of the traffic, then all outgoing traffic from cluster member is hiding behind cluster IP. This is the default behavior and in such a case you will see NAT rule number 0 doing "NAT" in log.
If this is the case, then you can read more about that here:
Thank you guys ALL for the fb.
By the way this was the first setting I was looking for:
As you can see traffic still hitting NAT rule number 0 that is why I have posted to the community..
Anyone that has experienced this behavior?
I'm currently experiencing this issue with CP control traffic passing through the gateway [FW1_ica_services] from a third party management server. We also have the hiding option in the gateway object disabled, support case is open...
Btw, also running R80.20 but with jumbo hotfix take 47 and a custom hotfix on top of this one.
(Why is this thread marked as solved?)
Hey @Maik ,
Thank you for your reply!!
The issue is not solved as mentioned in my previous post.
But my question answered by @PhoneBoyit is actually correct: NAT rule number 0 is the flagged option in the Security Gateway Object.
By the way can you just keep me posted on your case open with TAC?
You mentioned that you have currently installed take 47 and I'm assuming the issue is not solved at least up to this take.
I'm afraid of two things:
1. Rule is still matching traffic in production and they do not have actually notice it... Let's say for example we patch the firewall with latest JHFA.. and the rule won't be matched anymore, I should worry about ALL the traffic that is hitting the rule and create eventually NAT rule where is needed...
2. We have installed R80.20.M2 on the Security Management Server.. It could be a cosmetic bug where a flag that is not flagged is actually applied?
That's huge and I'm very concern about both points...
We are running MDM R80.20, standard release. I don't think that this one is a cosmetic issue as this would depend on the SmartConsole application - and I guess if this check box "works in reverse" (unselected => selected and vide versa) a lot of people would have complained until this point.
Still - the interesting thing is when and why this issue happens.
I am not worried about any impact after is has been fixed as this issue just destroys legitimate traffic by also translating the destination port to TCP 0 [in my case the dst ip stays as the correct one and does not get translated, just the source IP + port and the destination port are getting ripped apart).
Did you try to create a excplicit "no-nat" rule for this traffic to see if it has any impact? I was not able to do this due to a different bug which kills almost all connections and VPN tunnels once a policy install gets initiated (ticket already opened...).
I got your point, but in my case.. Someone maybe could have forgot to configure all the Hide NAT Rule needed to make thing works properly.
So if I solve the NAT rule number 0 in my case someone could experience issues with traffic that is actually natted with it.
I have to double check that everything is properly configured.
BTW I'm going to install latest Jumbo take for R80.20 and I will keep you posted with my findings.
Hey @Maik ,
On my side I have installed latest JHFA for R80.20 and no issues at all.
Btw I checked logs this morning and fortunately it seems there is NO MORE NAT RULE NUMBER 0 (except for packets orginating by the gateway itself)!!!!
I think this was a bug in a environment with a clean R80.20 without JHFA.
Now I can clearly see logs for http/https connections from client to Internet matching their own NAT rule.
D!Z
nice
Sounds good, thanks for the information! I received a TAC suggestion how the issue can be solved - but was not able to test it due to possible cluster failover / down time which is required for the change. Can post the suggestion when I am back in the office.
However; I asked the TAC engineer whether this is a known issue which would/already had been be fixed in an upcoming jumbo package (we have take 47 installed) and received the answer that it is possible but quite unlikely. So maybe we have a different problem - but the truth can be seen when I have updated to the latest jumbo take (and maybe tried the work around if the jumbo upgrade should not work/solve the issue).
Hello,
What was the solution for this issue, I currently have the same one on R80.20 take 118
Regards
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY