- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi everyone,
I’m working with a centrally managed Check Point Spark appliance running R81.10.17 (latest build) in a multi‑ISP environment.
I need to configure manual DNAT/SNAT for specific services using a secondary public IP from a secondary ISP, while ensuring that:
For a specific internal host:
To make outbound traffic use the secondary ISP, I created a static route on the firewall such as:
Destination: Any
Gateway: Secondary ISP gateway However, when the route uses destination = Any, another issue appears:
✅Traffic toward the Internet correctly uses the secondary ISP
❌BUT traffic coming from devices reachable via other static routes
(e.g., internal routed networks or specific internal subnets)
is also sent out to the Internet instead of being forwarded to the correct internal interface.
It looks like the Any → secondary ISP route overrides more specific static routes, even though normally specific routes should take precedence.
Is it correct to fix this using route weights/metrics, or is there a better technique?
I’m trying to understand whether I should:
Any suggestions, experiences, or best‑practice examples would be greatly appreciated.
Thanks in advance!
How do you have the relevant routes configured?
Route for Internet:
Internet Route
Route for LAN:
LAN Route
NAT Configuration
DNAT
Original Source: Any
Original Destination: <Secondary Public IP>
Service: <Service Group>
Translated Source: Original
Translated Destination: 172.20.15.3
Translated Service: OriginalSNAT
Original Source: 172.20.15.3
Original Destination: Any
Service: Any
Translated Source: <Secondary Public IP>
Translated Destination: Original
Translated Service: OriginalMaybe create a single route with source 172.20.15.3, destination 172.18.9.0/24 and secondary WAN as the next hop?
To be clear, this would be in addition to the routes you already have.
I think I’m close to the solution, but I’m not sure this is the correct or optimal approach.
I changed my setup, the route to the WAN has destination any and a specific source host, while the static route to the internal LAN has a specific destination network and source any. This causes the WAN route to be evaluated first, even with a higher metric (10) than the LAN static route (metric 0).
To work around this, I added an additional static route to the internal LAN with priority 0, which correctly overrides the WAN route. However, this would require creating extra static routes for every internal network that already has a global static route (source any). I also had to adjust the SNAT so that the destination is only the external zone instead of any.
Is this configuration considered correct, or is there a better way to handle this scenario?
Do the routes look like the one I suggested?
That might be the only way to do it, though perhaps you could do it with fewer routes through supernetting.
Thanks for the suggestion.
In my setup, the static routes are slightly different from the ones you described. Below is the configuration that actually works for me. I also integrated the required supernetting to avoid routing conflicts and to make sure the correct egress interface is selected when DNAT/SNAT is applied.
(In the screenshot the source IP is 172.20.15.245, but you can assume it is 172.20.15.3.)
Looks alright to me.
More specific routes are always going to take priority.
I agree with your explanation. However, my initial assumption was that a route with a more specific destination and source set to any would take precedence over a route with source any and a single destination. That misunderstanding was actually the root cause of my issue.
I also have a couple of additional questions related to this scenario:
Can both DNAT rules be active at the same time (i.e. accept incoming connections on both ISP links)?
If so, will the return traffic always follow the same public IP/interface that was used for the incoming connection, or will it go out via the primary ISP or according to the static route configuration?
What is the correct configuration for NAT loopback (hairpin NAT) in this type of multi-ISP setup?
For these questions, would it be better to open a new post, or can they be addressed within this thread?
Thanks in advance for any clarification.
In theory, you can have both DNAT rules in place as we require a similar configuration for ISP Redundancy on non-Spark gateways.
Not sure the configuration would be different for Hairpin NAT, assuming the use case is internal hosts trying to reach an external address (based on WAN address).
I believe the issue with multiple DNAT rules is that only one outbound ISP can be effectively used at a time.
How can the gateway be configured to ensure that return traffic originating from a secondary ISP is routed back through the same secondary ISP, in order to avoid asymmetric routing?
At the moment, it does not seem possible to filter routing decisions based on source or destination, and even the route configuration follows predefined precedence rules that do not align with the NAT rules.
This might be SecureXL related...see if the behavior changes with fwaccel off.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY