Attempting to NAT GRE traffic through a Check Point Security Gateway results in the traffic traversing without NAT taking effect.
PPTP connectivity fails when GRE tunnels are encrypted and being Hide NATed through a Security Gateway.
PPTP/GRE traffic stops passing after enabling SecureXL Optimized Drops feature per sk90861.
PPTP/GRE enforcement and NAT require inspection of PPTP/GRE packet header data and do not support encrypted GRE tunnels that encrypt the GRE header payload.
GRE protocol (Protocol #47) does not use ports. For this and other reasons, there are technical difficulties attempting to NAT encrypted GRE traffic.
Until NG AI HFA_10, and the existence of the IPS protection "Non Compliant PPTP" (formerly known as SmartDefense protection "PPTP Enforcement"), it was not possible to create multiple sessions with a PPTP server while the clients were hidden using Hide NAT.
Activate the relevant IPS protection to enable PPTP parsing enforcement, which also allows the Security Gateway to support PPTP/GRE traffic over Hide-NAT.
This solution describes how to configure R70 (and above) Security Gateway to allow PPTP/GRE clients behind NAT to connect to remote PPTP server. This solution depends on IPS to inspect and better understand the PPTP / GRE traffic to allow NAT to function correctly. This, therefore, requires appropriate IPS licenses.
Important: Starting from R80 PPTP_TCP has been removed as a deprecated protocol per sk103766. If this protocol is required, please contact your Sales Engineer or submit a Request for Enhancement.
Follow these steps in SmartDashboard:
Edit the PPTP Client/PPTP Network object:
NAT
' tab. Add Automatic Address Translation rules
.Select NAT Translation Method:
Translation Method
' field, select Hide
. Hide behind Gateway
, or Hide behind IP Address
. OK
' to close the object properties window.Example:
Create a Security Rule to allow connections to the PPTP Server - use the 'PPTP
' service:
Edit the Security Gateway object:
General Properties
pane. IPS blade
(check the box 'IPS
'). OK
' to close the object properties window.Example:
Configure the IPS protection "Non Compliant PPTP
":
IPS
tab. Protections
. Look for
field, type PPTP
and press Enter. Non Compliant PPTP
" - click on Details...
. General
tab, select the relevant IPS profile - click on Edit...
.In the Main Action
section:
Override IPS Policy with
Detect
OK
' to close the protection settings window. OK
' to close the protection details window. Example:
File
' menu - click on 'Save
'.
Configure the IPS Protection "Non Compliant PPTP":
1. In left Pane of Smart Console, go to "MANAGE & SETTINGS"
2. Go to Blades > General > Inspection Settings...
3. In the Look for field, type PPTP and press Enter
4. Right click Non Compliant PPTP and Edit
5. In the required profile(default/recommended which is applied on gateway)
6. Select Override with Action:
7. In Drop down menu > select "Accept" > press "ok"
8. Install policy.
Limitation:
To allow the PPTP traffic to pass, Security Gateway must have the IPS Software Blade enabled in its 'General Properties
' pane. IPS Software blade requires a separate license to be installed on Security Gateway and on Security Management Server / Domain Management Server.