Configuring the NAT Policy
Getting Started with NAT
-
Learn about types of NAT Rules and types of NAT Methods (below in this topic).
-
Follow the applicable procedure:
-
Working with Automatic NAT Rules (for IPv4 or IPv6 translation)
-
Working with Manual NAT Rules (for IPv4 or IPv6 translation)
-
Working with NAT46 Rules (for IPv4-to-IPv6 translation)
-
Working with NAT64 Rules (for IPv6-to-IPv4 translation)
-
-
Configure the applicable NAT advanced settings (see Advanced NAT Settings).
- Install the Access Control Policy.
Introduction
NAT (Network Address Translation) is a feature of the Firewall Software Blade Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. and replaces IPv4 and IPv6 addresses to add more security. NAT protects the identity of a network and does not show internal IP addresses to the Internet.
-
The source IP address in a packet.
-
The destination IP address in a packet.
-
The TCP / UDP port in a packet.
-
An internal computer sends a packet to an external computer
-
The Security Gateway translates the source IP address to a new one.
-
The packet comes back from the external computer
-
The Security Gateway translates the new IP address back to the original IP address.
-
The packet from the external computer goes to the correct internal computer.
Types of NAT Rules
In SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., you can create these types of NAT rules:
Types of NAT Methods
You can configure one of these NAT methods for Automatic NAT Rules and in Manual NAT Rules Manual configuration of NAT rules by the administrator of the Check Point Management Server.:
The Security Gateway changes the source IP address of all connections from a source to the same IP address - either that of the Security Gateway's outgoing interface, or an IP address you configure.
Hide > Hide behind gateway
The Security Gateway changes the source IP address of all connections from a source to the same IP address of the Security Gateway's outgoing interface.
Hide > Hide behind IP address
The Security Gateway changes the source IP address of all connections from a source to the same IP address your configure.
|
Notes:
|
Example diagram
Item |
Description |
---|---|
1 |
Internal computers |
2 |
Security Gateway configured with Hide NAT |
3 |
External computers and servers on the Internet |
Sample Hide NAT Workflow
-
Internal computer A (10.10.0.26) sends a packet to an external computer.
-
The Security Gateway intercepts the packet and translates the source IP address from (10.10.0.26) to 192.0.2.1, and port 11000.
-
The external computer sends back a packet to 192.0.2.1, to port 11000.
-
The Security Gateway translates the packet's IP address from 192.0.2.1 to 10.10.0.26 and sends it to internal computer A.
The Security Gateway changes the source IP address of all connections from a source to the IP address your configure.
|
Notes:
|
Example diagram
Item |
Description |
---|---|
1 |
Internal computers |
2 |
Security Gateway configured with Static NAT |
3 |
External computers and servers on the Internet |
Example traffic flow with Static NAT
-
An external computer on the Internet sends a packet to 192.0.2.5.
-
The Security Gateway translates the IP address from 192.0.2.5 to 10.10.0.26 and sends the packet to internal computer A.
-
Internal computer A (10.10.0.26) sends back a packet to the external computer.
-
The Security Gateway intercepts the packet and translates the source IP address from 10.10.0.26 to 192.0.2.5.
-
Internal computer B (10.10.0.37) sends a packet to an external computer.
-
The Security Gateway intercepts the packet translates the source IP address from 10.10.0.37 to 192.0.2.16.
NAT Rules in SmartConsole
The NAT Rule Base All rules configured in a given Security Policy. Synonym: Rulebase. has two sections in that specify how the IP addresses and Ports are translated:
-
Original - with columns Source, Destination, and Services
-
Translated - with columns Source, Destination, and Services
Order of NAT Rule Enforcement
The Security Gateway enforces the NAT Rule Base in a sequential manner - in the order you place the rules in the NAT Policy (see the No. column).
The Security Gateway enforces Automatic NAT and Manual NAT rules in different ways.
-
Manual NAT rules - The Security Gateway enforces the first Manual NAT rule that matches a connection. The Security Gateway does not examine other Manual NAT rules.
-
Automatic NAT rules - The Security Gateway can enforce two Automatic NAT rules that match a connection - one rule for the Source and one for the Destination. When a connection matches two Automatic NAT rules, the Security Gateway enforces those rules.
Note - SmartConsole organizes the Automatic NAT rules in this order:
-
Static NAT rules for the Security Gateway, or Host (computer or server) objects
-
Hide NAT rules for the Security Gateway, or Host objects
-
Static NAT rules for Network or Address Range objects
-
Hide NAT rules for Network or Address Range objects
-