- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Everyone
I have a question for the experienced people here.
I have a VPN installed on my workphones which works perfectly from remote networks.
But it doesn't work on the same network in the office where the server is installed.
I have been led to believe that a Nat Loopback needs to be configured for the devices to connect via VPN on the same local network as the Server.
Anyone who may have done this or knows how I need to configure the NAT loopback ?
For Example, Server's External IP is 1.1.1.1, its internal IP is 192.168.1.51
The Devices get their IP via DHCP from 100 and above in this range.
Are the clients and server in the same 192.168.1.X network? What is the subnet?
Why VPN is enabled if they are in the office? If users are connected via VPN it will change the local routing table.
Also it could be related to DNS. With or without you could different DNS output for the server you want to reach unless you try to connect it via IP.
I don't think the loopback will fix anything
Yes, clients are in the same IP range.
So the VPN is used for the Clients to make secure calls with each other.
One client can be in the office and another client can be somewhere else and when they are connected with a VPN they can have a secure conversation. But for example, Client 1 is in the office and is connected with Wi-fi, the IP range is for example 192.168.131.x with a net mas 255.255.255.0. Where the server has an internal IP for example 192.168.131.31. The wireless devices get their IPs by DHCP from 100 and above. So when the Client is in the Office and his device gets an IP 192.168.131.101 for example it won't connect with the VPN of course. I'm looking for a solution if there is any for this issue. This is how they have had their network set up and they don't want to change it. Since they are a small company they want to have everything in this range. There may be several answers and solutions for this, so I'm open to receive you knowledge on this matter and want to thank you for taking your time to help.
When you say same network in the office where server is installed, can you clarify? To me, that insinuates testing the VPN inside the network, which would defeat the purpose.
Unless I totally misunderstood...apologies in that case.
Best,
Andy
Hi Andy ,
So the VPN is used for some phones to be connected through and to talk to each other in a more secure way.
They work perfectly remotely, but the issue is that the company is so small and they use the same IP range for everything , there are no subnets or anything. So for example The Server has an internal IP of 192.168.131.31 and the phone has an IP of 192.168.131.111. The phone won't connect to the VPN so it won't be able to talk to another partner who is on field duty via the secure line. I hope this clarifies it more and what is the best solution in this case , without making big changes on the system. All they want now is when they are connected to the Wifi in the office for their VPN to work.
K, sorry, not trying to be pain in the a** as they say (lol), but, do you happen to have basic network diagram of this? You can even scribble something on piece of paper, take picture, and upload. I just want to make sure I understand this 100% properly.
Andy
K, no clue if this is right, but this is what I understand...
Andy
Yes pretty much this is. I know it goes against what VPN,
But,can I somehow route the traffic to connect them via VPN.
What VPN client are you using?
What is the VPN gateway?
What is the IP range given to VPN connected clients?
How does the secure call routing work (and why doesn't it work without the VPN connected when in the office?)
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
12 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 | |
3 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY