- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Since you used the automatic NAT setup technique on the object "Web Server", when that object is placed into a rule it can match both IP addresses (the "real" address and the NAT address) since they both exist within the configuration of that object.
This would most definitely not apply if the manual NAT setup technique was used, as two host objects would need to be created. One object represents the "real" address and the other object represents the NAT address. Because the network policy layer ("firewall policy") is referenced prior to the NAT policy, the latter host object representing this NAT address should be used in your firewall policy rule.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY