Resolving Connectivity Issues
IPsec NAT-Traversal
NAT-T (NAT traversal or UDP encapsulation) makes sure that IPsec VPN Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access. connections stay open when traffic goes through Security Gateways or devices that use NAT.
When an IP packet passes through a network address translator device, it is changed in a way that is not compatible with IPsec. To protect the original IPsec encoded packet, NAT traversal encapsulates it with an additional layer of UDP and IP headers.
For IPsec to work with NAT traversal, these protocols must be allowed through the NAT interface(s):
-
IKE - UDP port 500
-
IPsec NAT-T - UDP port 4500
-
Encapsulating Security Payload (ESP) - IP protocol number 50
-
Authentication Header (AH) - IP protocol number 51
-
In SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., from the left navigation panel, click Gateways & Servers.
-
Open the applicable Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. object with enabled IPsec VPNSoftware Blade Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities..
-
From the left tree, click IPsec VPN > VPN Advanced.
-
Make sure to select Support NAT traversal (applies to Remote Access and Site to Site connections).
NAT-Traversal is enabled by default when a NAT device is detected.
-
Click OK.
-
Install the Access Control Policy.
These kernel parameters are defined for each Security Gateway and control NAT-T for Site to Site VPN An encrypted tunnel between two or more Security Gateways. Synonym: Site-to-Site VPN. Contractions: S2S VPN, S-to-S VPN.
Item |
Description |
Default Value |
---|---|---|
|
Initiator sends NAT-T traffic For more information, see sk177823. |
|
|
Responder accepts NAT-T traffic from known Security Gateways |
|
|
Force NAT-T, even if there is no NAT-T device For more information, see sk166037. Important - The value of this parameter must be the same for all VPN peers. |
|
You can edit these parameters with Database Tool (GuiDBEdit Tool):
-
(Recommended) Back up the Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. / Domain Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..
-
Close all SmartConsole windows connected to the Management Server.
-
Connect with Database Tool (GuiDBEdit Tool) to the Security Management Server / Domain Management Server.
-
In the upper left pane, go to Table - Network Objects - network_objects.
-
In the upper right pane, select the relevant Security Gateway / Cluster Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. object.
-
Press
CTRL + F
(or go to Search menu - Find) - paste<NAME OF PARAMETER>
- click Find Next. -
In the lower pane, right click
<NAME OF PARAMETER>
- click Edit... - configure the desired value. -
Save the changes (File menu > Save All).
-
Close the Database Tool (GuiDBEdit Tool).
-
Connect with SmartConsole to the Security Management Server / Domain Management Server.
-
Install the Access Control Policy.