Difference in Traffic Flow: Source NAT vs. Destination NAT in Check Point
- Feb 28
- 2 min read
Topology --

1. Traffic Flow for Source NAT (SNAT)
When an internal user accesses the internet, the firewall performs Source NAT to translate the private IP into a public IP.
Traffic Flow Order:
Routing Decision (Pre-NAT)
The firewall checks the original source IP and destination IP to determine the appropriate routing table entry.
Security Policy Lookup (Pre-NAT)
The firewall checks if there is an existing rule allowing traffic from the original source IP to the destination.
Source NAT (SNAT)
The firewall translates the internal source IP (e.g., 192.168.1.10) to the configured public IP (203.0.113.10).
Routing Decision (Post-NAT)
The firewall now performs a new routing lookup based on the NATed source IP (203.0.113.10).
Packet Sent to Destination
The packet is sent to the destination on the internet.
Return Traffic
The return packet from the public server is received by the firewall, which checks the NAT table to map it back to the original private source IP.
The firewall de-NATs the public IP (203.0.113.10) back to the original private IP (192.168.1.10).
Routing Decision (Post-De-NAT)
The firewall performs another routing lookup to forward the packet back to the internal network.

2. Traffic Flow for Destination NAT (DNAT)
When external users access an internal service using a public IP, the firewall performs Destination NAT to translate the public IP into the internal private IP.
Traffic Flow Order:
Routing Decision (Pre-NAT)
The firewall checks the routing table based on the original destination IP (e.g., 203.0.113.100).
Since the public IP belongs to the firewall, the packet is processed.
Destination NAT (DNAT)
The firewall translates the destination IP from the public IP (203.0.113.100) to the internal private IP (192.168.1.100).
Security Policy Lookup (Post-NAT)
The firewall checks if there is a security rule allowing traffic from the original source IP to the new destination IP (192.168.1.100).
Routing Decision (Post-NAT)
The firewall now determines how to forward traffic based on the translated private destination IP.
Packet Sent to Internal Server
The packet is sent to the actual internal server (192.168.1.100).
Return Traffic
The return packet from the internal server is received by the firewall.
The firewall looks up the NAT table and translates the private IP back to the public IP (203.0.113.100).
Routing Decision (Post-De-NAT)
The firewall forwards the packet back to the original external source.

Comments