<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XDR Network location configuration &amp;amp; VPN in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-network-location-configuration-amp-vpn/m-p/380855#M493</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/168714"&gt;@mdsgn1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If I understand correctly, you want a way to mark tunneled VPN traffic as "external" so that the Cortex XDR-Managed Windows Firewall can scrutinize the traffic. If that is accurate, I would recommend disabling the Network Location Configuration setting in the Agent Settings Profile for your target endpoint(s). You can do this by going to Endpoints &amp;gt; Profiles, Editing your target profile, and then disabling the Network Location Configuration item as shown below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Disable_Network Location Configuration_TakeI.gif" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29594i5D1A1019350D54E9/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Disable_Network Location Configuration_TakeI.gif" alt="Disable_Network Location Configuration_TakeI.gif" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Once completed, all traffic will be considered External as there will no longer be tests to evaluate positioning. Please let me know how this works for you.&lt;BR /&gt;&lt;BR /&gt;PS:&amp;nbsp; As an alternative, you can also configure the Network Location Configuration to test for an IP or Domain that you know will fail over the VPN tunnel. However, this would require more advanced knowledge of the network configuration.&lt;/P&gt;</description>
    <pubDate>Tue, 19 Jan 2021 19:36:41 GMT</pubDate>
    <dc:creator>gjenkins</dc:creator>
    <dc:date>2021-01-19T19:36:41Z</dc:date>
    <item>
      <title>XDR Network location configuration &amp; VPN</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-network-location-configuration-amp-vpn/m-p/380736#M491</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On all our endpoints we are using XDR with firewall(Uses built in Windows firewall) and Palo Alto GlobalProtect VPN connecting to PanOS devices at our office. We use split tunneling for the VPN, that means that only specified traffic goes through VPN tunnel to access internal resources and Active Directory services, the rest stays out of it. We also have different profiles for Internal and External network types, with a lot more restriction on the External.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is that due to most traffic being outside the tunnel, we want XDR Firewall to consider being an external network when connected to VPN. But the check that determines what type of network profile to apply does that with an LDAP connectivity test and a DNS resolve test for some internal domain. Both of these tests pass when connected to VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far the only idea I have had is blocking LDAP connections in our office firewall when the traffic comes from VPN, but that seems like a bad solution. So maybe someone has experience with how to best solve this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the DNS check would be rather ping, than resolve, then it would be an easy trick to just block pinging to that name for VPN subnet, but that is not the case.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 10:01:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-network-location-configuration-amp-vpn/m-p/380736#M491</guid>
      <dc:creator>mdsgn1</dc:creator>
      <dc:date>2021-01-19T10:01:58Z</dc:date>
    </item>
    <item>
      <title>Re: XDR Network location configuration &amp; VPN</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-network-location-configuration-amp-vpn/m-p/380855#M493</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/168714"&gt;@mdsgn1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If I understand correctly, you want a way to mark tunneled VPN traffic as "external" so that the Cortex XDR-Managed Windows Firewall can scrutinize the traffic. If that is accurate, I would recommend disabling the Network Location Configuration setting in the Agent Settings Profile for your target endpoint(s). You can do this by going to Endpoints &amp;gt; Profiles, Editing your target profile, and then disabling the Network Location Configuration item as shown below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Disable_Network Location Configuration_TakeI.gif" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29594i5D1A1019350D54E9/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Disable_Network Location Configuration_TakeI.gif" alt="Disable_Network Location Configuration_TakeI.gif" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Once completed, all traffic will be considered External as there will no longer be tests to evaluate positioning. Please let me know how this works for you.&lt;BR /&gt;&lt;BR /&gt;PS:&amp;nbsp; As an alternative, you can also configure the Network Location Configuration to test for an IP or Domain that you know will fail over the VPN tunnel. However, this would require more advanced knowledge of the network configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 19:36:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-network-location-configuration-amp-vpn/m-p/380855#M493</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-01-19T19:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: XDR Network location configuration &amp; VPN</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-network-location-configuration-amp-vpn/m-p/381029#M495</link>
      <description>&lt;P&gt;Thank you for the reply!&lt;/P&gt;&lt;P&gt;Then it is as I understood it from the start, I guess there are workarounds, but no simple and direct way of keeping the automated detection and switching.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 16:46:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-network-location-configuration-amp-vpn/m-p/381029#M495</guid>
      <dc:creator>mdsgn1</dc:creator>
      <dc:date>2021-01-20T16:46:05Z</dc:date>
    </item>
  </channel>
</rss>

