I'm still confused...
Packet comes from remote private IP (10.1.1.13 - lucky number ;-)
encrypted, then sent, then remote router NATS to say, 222.1.1.13 & sends
along to firewall. Firewall sets up the tunnel to use internal
address 101.1.1.13 on our LAN, decrypts the packet, keeps the
association between the source IP (10.1.1.13) and the internal IP
(111.1.1.13) and the packet is resent out on the LAN as though it came
from 111.1.1.13 on the firewall internal interface. In the last step,
the packet with target IP address 111.1.1.13 gets handed to the OS for
routing, but the OS doesn't know anything about the association with
222.1.1.13 and 10.1.1.13.
Return trip, packet addressed to 111.1.1.13, received on the firewall
internal interface, and the Checkpoint s/w "gets" the packet for target
111.1.1.13, changes the target IP to 10.1.1.13 & encrypts it, then sends
it to the remote router 222.1.1.13, keeping track of source port, etc.--
the Checkpoint s/w puts the encrypted packet (payload) inside a packet
with target IP 222.1.1.13 & hands it to the OS for routing. I would
expect that it's the Checkpoint s/w doing this, since how would the OS
associate those three different IPs?
But, since the Checkpoint "knows" the association between the internal
IP Pool address assigned (111.1.1.13) and the NAT-ed remote address
(222.1.1.13) and the private internal IP (10.1.1.13), can't it keep
track if another 10.1.1.13 arrives NAT'ed to 50.50.50.50 (or something)?
The new incoming packet has a different public IP, so it gets a
different IP Pool address, maybe 111.1.1.14.
What am I missing here, please?
--
David Strom
Charalambos Klitiropoulos wrote:
It is a matter of where NAT happens, before or after routing. As you
probably know, it is the OS that does the routing in a Check Point firewall.
The FW-1 module sits between the NIC driver and the OS kernel (between ISO
levels 2 and 3). In the case of IP Pool NAT, address translation happens on
the server side. In case of a SecuRemote tunnel, the path of the encrypted
packets is as follows:
1. they arrive at the external interface
2. they are extracted from the ESP packets (packets from users A and B
are destined for server C)
3. they are forwarded to the kernel, where they are routed to the
proper internal interface, according to their destination IP address (C)
4. their source addresses are translated to the IP addresses that
were assigned to each user when the SecuRemote session was established (IP
address A is translated to X and IP address B is translated to Y)
5. they are transmitted from the internal interface
The reply packets follow the exact reverse path:
1. they arrive at the internal interface (packets from server C to
addresses X and Y)
2. the destination addresses are translated back to the original
addresses (address X is translated back to address A and address Y is
translated back to address B) - (address translation of the subsequent
packets of any connection happens on the "place" where the first packet of
that connection was translated)
3. they are forwarded to the kernel, where they are routed to the
external interface, according to their destination IP addresses
4. they are encrypted and put in ESP packets
5. the ESP packets is transmitted from the external interface
If you have two SecuRemote users with the same IP address (A and A) on their
machines, their packets will correctly enter the internal network and reach
the internal server. Each user's packets will be translated to a separate IP
address taken from the NAT pool (X and Y). The replies to those packets will
be translated to their originals in step 2 (A and A). The problem will
appear in the fourth step, where VPN-1 will need to decide to which user
each packet belongs. The problem is that the packets from both users will
have the same destination IP address. Although there could be a mechanism to
decide which packet goes where (similar to the NAT mechanism that takes into
account other packet properties such as port numbers etc), I do not know how
easy or not it is to code such a feature. Other than that, VPN security
associations are configured for IP addresses and not users.
OfficeMode is a way of making sure that users A and B will be assigned an IP
address from the firewall, making sure that they will not be the same. Hence
there is no need for an IP pool. Sometime ago I was told from a Check Point
presales engineer that OfficeMode would be available sometime in the future.
However I do not know if and when they will actually offer this. I guess
when the competition forces them to add a "new" feature to their free VPN
client.
On 6/8/05, David Strom <[EMAIL PROTECTED]> wrote:
Did Checkpoint say *why* they did this "by design"? If it was a
mistake, then a big one, if not, then they're punishing those of us
using SecuRemote. And, Office Mode/Secure Client doesn't seem to
permit exactly the same type of configuration (range of IPs within the
local, vpn-ed to subnet).
Maybe they messed up, & decided it was a good thing to force SR users to
pay for SC, so they decided it's a "design feature".
--
David Strom
O'Flynn, Derek wrote:
Just a note on this, if you use IP Pool NAT this does nothing to help
endpoints that have the same source ip. For instance, two users behind
routers at their house with 192.168.1.1 <http://192.168.1.1> as their IP
address. If they both
connect at the same time, you will notice connectivity issues. I just
recently worked with CheckPoint Support on this and they confirmed the
issue
with me and verified it is by design, and to resolve it I'll need to
upgrade
to SecureClient or have one of the end users change their router subnet.
Derek O'Flynn
-----Original Message-----
From: Mailing list for discussion of Firewall-1
[mailto:[EMAIL PROTECTED] On Behalf Of Neil
Kemp
Sent: Sunday, June 05, 2005 2:46 AM
To: [email protected]
Subject: Re: [FW-1] VPN ip pool
You can use IP Pools where you create an address range (has to be
outside of
your Internal Network) and assign it.
Works OK, done this a couple of times.
-----Original Message-----
From: Mailing list for discussion of Firewall-1
[mailto:[EMAIL PROTECTED] On Behalf Of Cem
Akbas
Sent: Saturday, June 04, 2005 8:31 AM
To: [email protected]
Subject: [FW-1] VPN ip pool
Using VPN-1 - Securemote, how can i assign IP address to clients. Or
is it possible only for SecureClient.
Thanks
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================
############################################################################
#########
This e-mail message has been scanned for Viruses and Content and cleared
by 3DMail
############################################################################
#########
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================