Check Point Basics R80.40 - SmartConsole Part03 - Nat

แชร์
ฝัง
  • เผยแพร่เมื่อ 13 ก.ย. 2024

ความคิดเห็น • 60

  • @saravanakanthan9367
    @saravanakanthan9367 2 ปีที่แล้ว +1

    fantastic explanation, kept the presentation to the point and simple..Thank you

  • @mh63111
    @mh63111 4 ปีที่แล้ว +1

    WOW, THIS IS DEEP UNDERSTANDING FOR CHECK POINT !!
    Demonstration in a classy mood

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  4 ปีที่แล้ว +1

      Thank You for watching and commenting :)
      Are you prepping for taking the CCSA certificate?

    • @mh63111
      @mh63111 4 ปีที่แล้ว

      @@MagnusHolmberg-NetSec Yes brother, I am Cisco & Palo Alto certified, I am trying to be cp certified asap.

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  4 ปีที่แล้ว

      @@mh63111 aha great hopefully you find the content interesting then :)
      Time to skip palo for the good stuff ;)

    • @mh63111
      @mh63111 4 ปีที่แล้ว

      ​@@MagnusHolmberg-NetSec Yes 100% I agreed with you, check point will be on the top of comprehensive security solutions, but they should focus on [middle east] because it is not familiar here.

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  4 ปีที่แล้ว

      @@mh63111 it’s an Israeli company and Israel’s relationship with Middle East is not the best.

  • @powerfulyogi3327
    @powerfulyogi3327 3 ปีที่แล้ว +1

    while looking for some information related to checkpoint came across your channel. I started from part-2, and buddy its WoW. Loving your tutorial which is definitely going to help lots of people. Am planning to go through your checkpoint series. Keep up the good work

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว

      Thank you for the kind words.
      Really appreciate the feedback and its fun to see that you guys seams to like it.
      Hope you like the serie and good luck in any certification journey!

  • @rizwanrashid172
    @rizwanrashid172 4 ปีที่แล้ว

    This is the best Checkpoint NAT explanation on TH-cam so far, i like the way you presents very educational clear and precise language waiting for next video :)

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  4 ปีที่แล้ว +1

      Thank you :) congrats to your CCSA! We still have a bounch of things to cover within the smartconsole. We haven’t even started with the funny stuff yet :D

    • @rizwanrashid172
      @rizwanrashid172 4 ปีที่แล้ว +1

      Thanks Magnus :) Appreciated for good works .

  • @giri455161
    @giri455161 4 ปีที่แล้ว

    Yes, you explained very well about the NAT concept and how does it work in Checkpoint software. I really appreciate for your efforts, you have been putting to making such a good videos for public. Thankyou so much for knowledge sharing.

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  4 ปีที่แล้ว

      Girjesh Sharma thank you for watching and commenting :)
      My plan for the next video (it will come in a few days) is to talk about the 3 diff types of logs within check point.
      Smartlog, auditlog and messages file.

  • @sportsboy5935
    @sportsboy5935 2 ปีที่แล้ว

    An excellent video explaining NAT in a simple way

  • @CyberPolice911
    @CyberPolice911 3 ปีที่แล้ว

    Thanks mate for sharing your knowledge. Very well explained.

  • @chrismilladancemoves2394
    @chrismilladancemoves2394 4 ปีที่แล้ว

    Great work buddy have been following your tutorials well explained.Keep up the good work !!!

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  4 ปีที่แล้ว +1

      Taro Manga thank you, am working on some lab videos.
      Installing mgmt and gateway cluster from scratch in VMware workstation
      Hopefully u guys will like it :)
      More or less thinking if I should edit away my mistakes or keep them as live troubleshooting.

  • @enriquito.20
    @enriquito.20 2 ปีที่แล้ว

    Very informative.

  • @johns5790
    @johns5790 4 ปีที่แล้ว +2

    Great effort !!

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  4 ปีที่แล้ว

      Thank you, more to come.
      SmartConsole is a huge topic within Check Point. Hopefully soon we can go in to some more advance stuff. :)

  • @srinivasann62
    @srinivasann62 2 ปีที่แล้ว

    Hi Magnus, Thanks a lot for the extraordinary video. At 07:28, you've explained about the 'Link Networks' to the routers to bypass proxy ARP config manually for manual NAT. Can you please brief what you meant by 'Link Networks' ?

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  2 ปีที่แล้ว

      What am refering to is that you have a dedicated linknetwork such as a /29 between your firewall and the Router.
      Then you route the rest of your IP addresses within the router to the firewall.
      So the router knows that all of those IP addresses are behind the firewall.
      Instead of having like an /24 between the firewall and router and using part of that /24 to servers or similar.
      And expect the firewall to respond on ARP when the router question who has these and this ip on the network its directly connected to.
      ie.
      Server /24

    • @srinivasann62
      @srinivasann62 2 ปีที่แล้ว

      @@MagnusHolmberg-NetSec Thanks for the reply. Typically, when the traffic is received on the firewall, it'll send its MAC address on behalf of the back-end application/server. Since router is pointing the advertised NAT subnet to firewall, here no proxy-ARP happens or what is the traffic flow..? Can you please brief. Thanks.

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  2 ปีที่แล้ว

      @@srinivasann62 proxy arp is not in that traffic flow, if I understand you correctly.
      Proxy arp is needed when, let’s say
      Your firewall and router connect to each other.
      And you using a /28 network between them. And you do expect the firewall to be able to send out traffic not only sourcing from its ip 1-3 (cluster xl + the nodes) but also like ip 4-6 and the router have .7-9
      Or if same if you expect the firewall to respond on arp request from the router, who has IP 4-6 if these are used for dmz servers or similar.
      This works by default when using automatic nat, but if you use manual nat you do need proxy arp (sk30197)
      However if you route the ip 4-6 towards let’s say .1 (clusterxl ip) this is not needed to configure proxy arp.
      But I think it’s not a pretty solution that why I use dedicated link network between boxes and then route the prefix instead.
      Cleaner and nicer.

  • @raghunathsahoo2862
    @raghunathsahoo2862 3 ปีที่แล้ว +1

    Hello Magnus--Let say we have to create lots of manual NAT ..in same time we hae to create ARP same ARP entry in firewall..to avoid you mentioned link router. Please explain this

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว +1

      I would avoid using static arp entry.
      I would route in the NAT addresses so the static arp is not needed.
      I have zero installations (over 300 firewalls) where we use static arp because it’s a pain in the butt.

  • @chrismilladancemoves2394
    @chrismilladancemoves2394 2 ปีที่แล้ว

    Hi Magnus
    Are you able to setup a video on how to bypass https inspection on Checkpoint ?

  • @surajrajendrapandey6917
    @surajrajendrapandey6917 3 ปีที่แล้ว

    Great....video,

  • @ghsi007
    @ghsi007 3 ปีที่แล้ว

    what's the difference between the NAT method of "Hide" and "Static", considering about a Host object?

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว +1

      i think you will need to watch the video again,
      But in general HIDE nat is many behind 1 IP, meaning you can put it on multiple network and host object and it will hide all of them behind the gateways IP.
      Static is a 1 to 1 nat, IE a DMZ server or similar that should be exposed on the internet.

  • @ranghelsoto6516
    @ranghelsoto6516 3 ปีที่แล้ว

    Hi Magnus. Watching the video, I am left without clarifying a doubt. Could you explain the difference between the Translation Method, between the HIDE and the STATIC? When should one apply one over the other? If your desire is to get something to the INTERNET, which one would you apply? Thank you very much. :)

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว +1

      Hi,
      Static = 1 to 1 NAT.
      Normal usage is when you want to put a server in a DMZ and have a service accessible on internet.
      In this case traffic could start from Internet and go in to the server.
      Hide NAT = Many to 1
      Normal usage, hide nat client networks behind a single IP for websurfing.
      In this case the traffic must start from inside the network and go out.

    • @sportsboy5935
      @sportsboy5935 2 ปีที่แล้ว

      @@MagnusHolmberg-NetSec nicely explained

  • @abdellahmaher7073
    @abdellahmaher7073 3 ปีที่แล้ว

    Thanks for this good video! i have quation please: to connect the private network to the internet, I probably need Hide NAT but what do I need to put in Translated Source. I need to put the external interface object of the checkpoint?

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว +1

      If you use hide nat on the object you don’t need to do any manual nat. (This would be an automated nat)
      If you do manual nat with hide nat you would need to put the external IP you want for that hide nat on translated source.
      You could also put the firewall object in the translated source but personally I put the specific IP as a nat object instead so it really dose what I want :)

  • @ranghelsoto6516
    @ranghelsoto6516 2 ปีที่แล้ว

    Hello, Magnus.
    One query.
    Why when you create a NAT rule automatically, it creates 2 rules by default?
    Is this normal?

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  ปีที่แล้ว

      Yes its normal :)

    • @ranghelsoto6516
      @ranghelsoto6516 ปีที่แล้ว

      @@MagnusHolmberg-NetSec
      The use of one or another NAT method (NAT MANUAL, or NAT AUTOMATIC), you would say that the use will depend on the ADMINISTRATOR'S taste?
      Sometimes in productive environments, it is somewhat tedious to find out if the NAT that you find in the logs, was created manually or automatically.

  • @angelcornelio6652
    @angelcornelio6652 3 ปีที่แล้ว

    Why do you need to add NAT entry for 10.10.10.0/24 destination 10.10.10.0/24 when in the first place this will not even routed and hit the Firewall since they are in the same broadcast domain?

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว

      Its not really needed so to say, but this was added during the automated NAT.
      Am guessing its a way to highlight it in the NAT rulebase.
      Normally you do add some group containing all local networks and make a no nat with localnet to localnet

  • @raghunathsahoo2862
    @raghunathsahoo2862 3 ปีที่แล้ว

    other doubt let say we have two ISP Primary (80.80.80.80) and backup.(90.90.90.90) we already created manual static NAT and translating to Primary ISP IP and in any case primary ISP goes down then how static NAT will work
    .

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว

      Would suggest to check the video I made about ISP redundancy as it involves a lot more then just NAT.
      If you do have PI addresses then it would be no diff as you would need to announce your network to both ISP.
      But if you are not having PI it’s a complete diff thing and backup isp would never announce primary isp ips and it would not work.
      (And the reason why it would not work has nothing to do with checkpoint, just to make that clear :) )

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว +1

      th-cam.com/video/BuwU-ppyDmo/w-d-xo.html

    • @raghunathsahoo2862
      @raghunathsahoo2862 3 ปีที่แล้ว

      @@MagnusHolmberg-NetSec thank very much.. Your replay is prompt :)

  • @jasonmaiolo6471
    @jasonmaiolo6471 3 ปีที่แล้ว

    Magnus. Thanks for all help with Check Point NAT configuration. I'm having a NAT issue and hope you can help me. My check point cluster has two external interfaces. Existing internet traffic is on a hide NAT behind address 204.1.1.1 , and a default route to 204.1.1.2 . I created a NEW external interface 50.1.1.1 (50.1.1.0/24 network) and connected it to our secondary internet connection at 50.1.1.2 . If I static NAT a host to 50.1.1.50/24 traffic still leaves the firewall from the physical interface connected to 204.1.1.1. Any ideas?

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว +1

      How are you routing between the 2 external interfaces, how is the decition on what interface to take?
      Meaning how is the routing setup
      Secondly NAT rules are based on what order they are in. The first rule that hits will be in use.
      My recommendation is always to use linknetworks like /29 toward the firewall.
      And then route the rest of the public IP addresses.
      Because this helps for announcing the ip correctly, automatic NAT announce the ip addresses by default via gratuitous arp Manual nat do not.
      This means that you need to create a file for it and I think it’s a big hassle just.
      sk30197

    • @jasonmaiolo6471
      @jasonmaiolo6471 3 ปีที่แล้ว

      We use BGP and that seems to work fine. If we use /28 bit ranges for the firewall interfaces ... how do I use my /25 bit allocation of public IPs for static NATs? I thought to firewall needed a interface directly on that network to do the NATs. If I move the public IP address range, do I move it to a router inside or outside the firewall?

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว +1

      @@jasonmaiolo6471 the firewall do not need any interface for IP addresses used for nat.
      Meaning you can have
      Router1 - Linknetwork /29 - Firewall
      In case of static routing then
      router1 you route x.x.x.x/X towards the firewall IP (cluster ip or similar)
      Then you can use these in NAT.
      Benefit of doing this is that you dont need to do a local arp file even if doing static NAT.
      Now when you are using BGP then you do need to announce the prefix as its no longer a directly connected interface you need to specify it, check the advance routing guide for the specific command :) (i think you need to do a route map.)

    • @jasonmaiolo6471
      @jasonmaiolo6471 3 ปีที่แล้ว

      @@MagnusHolmberg-NetSec So, should the public IP address range for NATs be on a router inside or outside my firewall?

    • @MagnusHolmberg-NetSec
      @MagnusHolmberg-NetSec  3 ปีที่แล้ว

      @@jasonmaiolo6471 They only needed to be routed to your firewall. They don’t need to be anywhere else.
      No need for any interface if you planning to use it as NAT ip.

  • @ChandanKumarMohanty16
    @ChandanKumarMohanty16 3 ปีที่แล้ว

    👍