Resolving Connectivity Issues
IPsec NAT-Traversal
NAT-T (NAT traversal or UDP encapsulation) makes sure that IPsec VPN Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access. connections stay open when traffic goes through Security Gateways or devices that use NAT.
When an IP packet passes through a network address translator device, it is changed in a way that is not compatible with IPsec. To protect the original IPsec encoded packet, NAT traversal encapsulates it with an additional layer of UDP and IP headers.
For IPsec to work with NAT traversal, these protocols must be allowed through the NAT interface(s):
-
IKE - UDP port 500
-
IPsec NAT-T - UDP port 4500
-
Encapsulating Security Payload (ESP) - IP protocol number 50
-
Authentication Header (AH) - IP protocol number 51
Configuring NAT-Traversal
To configure NAT-T for Site to Site VPN:
-
In SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., from the left navigation panel, click Gateways & Servers.
-
Open the applicable Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. object with enabled IPsec VPN Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities..
-
From the left tree, click IPsec VPN > VPN Advanced.
-
Make sure to select Support NAT traversal (applies to Remote Access and Site to Site connections).
NAT-Traversal is enabled by default when a NAT device is detected.
-
Click OK.
-
Install the Access Control Policy.
Advanced NAT-T Configuration
These variables are defined for each Security Gateway and control NAT-T for Site to Site VPN An encrypted tunnel between two or more Security Gateways. Synonym: Site-to-Site VPN. Contractions: S2S VPN, S-to-S VPN.:
Item |
Description |
Default Value |
---|---|---|
|
Initiator sends NAT-T traffic |
|
|
Responder accepts NAT-T traffic from known Security Gateways |
|
|
Force NAT-T, even if there is no NAT-T device |
|
The variables can be viewed and changed in Database Tool (GuiDBEdit Tool) (see sk13009):
-
In the top left pane, click TABLE > Network Objects > network_objects.
-
In the top right pane, select the applicable Security Gateway object.
-
In the bottom pane, see the VPN section.
-
Save the changes: click File menu > Save All.
-
In SmartConsole, install the Access Control Policy on this Security Gateway object.