<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Troubleshoot Split Tunnel Domain &amp;amp; Applications and Exclude Video Traffic in GlobalProtect Articles</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/ta-p/321075</link>
    <description>&lt;H2 class="lia-align-center"&gt;&lt;STRONG&gt;GlobalProtect&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Troubleshooting Tips&lt;/STRONG&gt;&lt;STRONG&gt;: &lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;Split Tunnel Domain &amp;amp; Applications &lt;/STRONG&gt;&lt;STRONG&gt;and Exclude Video Traffic Features&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Background&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;GlobalProtect with on-premise firewall is utilized by employees to securely connect to their enterprise environment and access their corporate applications. GlobalProtect supports &lt;STRONG&gt;Split Tunnel Domain &amp;amp; Applications and Exclude Video Traffic features&lt;/STRONG&gt; to exclude certain bandwidth clogging applications and domains to help enterprises with business continuity during high Work From Home (WFH) scenarios because of a COVID-19 pandemic or any other type of calamity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="alert alert-warning" align="left"&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; Split-tunnel traffic is not inspected by next-generation firewall and, therefore, does not have the threat-protection offered by Palo Alto Networks. Hence, customers are advised to carefully review before enabling this feature and then decide whether the split tunnel meets their environment needs.&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Objective&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;The objective of this document is to provide enterprise administrators with troubleshooting tips and tricks related to &lt;STRONG&gt;Split Tunnel Domain &amp;amp; Applications and Exclude Video Traffic features. &lt;/STRONG&gt;This will help administrators during implementation and operational maintenance of these features. For a configuration guide of this feature, refer to&amp;nbsp;&lt;A title="Optimized Split Tunneling for GlobalProtect | TechDocs | Palo Alto Networks" href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/globalprotect-features/split-tunnel-for-public-applications.html" target="_blank" rel="noopener"&gt;Optimized Split Tunneling for GlobalProtect&lt;/A&gt; and&amp;nbsp;&lt;A title="Implement Split Domain and Applications | LIVEcommunity | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/Prisma-Access-Articles/GlobalProtect-Implement-Split-Domain-and-Applications/ta-p/316929" target="_self"&gt;GlobalProtect: Implement Split Tunnel Domain and Applications&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Verification and Troubleshooting&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following verification and troubleshooting steps are written with consideration of the configuration specified in &lt;A title="GlobalProtect Split Domain, Applications, Video Traffic | LIVEcommunity | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-Implement-Split-Domain-and-Applications/ta-p/316929" target="_self"&gt;GlobalProtect: Implement Split Tunnel Domain, Applications, Exclude Video Traffic Configuration&lt;/A&gt;&amp;nbsp;and applies to any such configurations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Split Tunnel Domain &amp;amp; Application&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;To verify and troubleshoot the split tunnel domain and application traffic features, you can utilize the following steps:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;First step is to verify whether the configuration on the gateway for ‘Split Tunnel Domain’ or ‘Split Application’ has been pushed correctly on the GlobalProtect app or not. This can be verified by collecting GlobalProtect logs. For steps on collecting GlobalProtect logs refer to:&amp;nbsp;&lt;A title="Collect Logs From GlobalProtect | Knowledge Base | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClaLCAS" target="_blank" rel="noopener"&gt;How to Collect Logs From GlobalProtect Clients&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Within GlobalProtect logs bundle, review &lt;STRONG&gt;PanGPS.log&lt;/STRONG&gt; and verify that based on the configuration on the gateway GlobalProtect receives:&lt;/LI&gt;
&lt;OL class="lia-list-style-type-lower-alpha"&gt;
&lt;LI&gt;‘Split Tunnel’ configuration:&lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;exclude-split-tunneling-domain&amp;gt;
       &amp;lt;member&amp;gt;*.ringcentral.com&amp;lt;/member&amp;gt;
&amp;lt;/exclude-split-tunneling-domain&amp;gt;​&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;‘Split Application' configuration:&lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;exclude-split-tunneling-application&amp;gt;
       &amp;lt;member&amp;gt;%AppData%\Local\RingCentral\SoftPhoneApp\Softphone.exe&amp;lt;/member&amp;gt;
       &amp;lt;member&amp;gt;%AppData%\Local\RingCentral\SoftPhoneApp\SoftPhoneMapiBridge.exe&amp;lt;/member&amp;gt;
       &amp;lt;member&amp;gt;/Applications/RingCentral for Mac.app/Contents/MacOS/Softphone&amp;lt;/member&amp;gt;
&amp;lt;/exclude-split-tunneling-application&amp;gt;​&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;LI&gt;Within the GlobalProtect logs bundle, also review gpsplit.log (the equivalent file on the macOS is PanNExt.log) and see the split tunnel and application rules applied. In the logs below, we can see that ‘.ringcentral.com’ application is bound to physical interface en0. Thus, traffic for the RingCentral application will be excluded from the VPN tunnel. Here, Rule 0 to 3 corresponds to the IP address of the domain and application we have configured on the gateway.&lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;gpsplit [0x52bc2520] :860 Rule   0: 1TCP v4 50.239.202.198 0 &amp;gt; 2PHY (83115)
gpsplit [0x52bc2520] :860 Rule   1: 3APP %AppData%\Local\RingCentral\SoftPhoneApp\SoftPhoneMapiBridge.exe &amp;gt; 2PHY (0)
gpsplit [0x52bc2520] :860 Rule   2: 3APP %AppData%\Local\RingCentral\SoftPhoneApp\Softphone.exe &amp;gt; 2PHY (0)
gpsplit [0x52bc2520] :860 Rule   3: 3APP /Applications/RingCentral for Mac.app/Contents/MacOS/Softphone &amp;gt; 2PHY (0)
gpsplit [0x5fd50a40] :933 0x59bc4620 binding to interface en0, index 3&lt;/LI-CODE&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; If an FQDN resolves to multiple IP addresses, all the IP addresses will be added to the exclude rules.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;Change the debug level to “Dump”, to make sure that PanGPS.log will contain the details related to split-tunnel functionality (Settings -&amp;gt; Troubleshooting -&amp;gt; Logging Level). Make sure to mark the time of the test (when the issue has been reproduced), along with the domain being accessed&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;You can also verify the connection table on the client machine and confirm that specific application connections are going via physical interface and not the tunnel interface. On macOS, use&amp;nbsp;&lt;FONT face="courier new,courier"&gt;‘netstat -arn’&lt;/FONT&gt;&amp;nbsp;or &lt;FONT face="courier new,courier"&gt;'lsof -n -i | grep &amp;lt;application&amp;gt;'&lt;/FONT&gt; command, and on a Windows machine, this&amp;nbsp;&lt;FONT face="courier new,courier"&gt;‘netstat -anob’&lt;/FONT&gt; command can be used.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;We can also utilize 'whois' lookup utility to find the public IP address associated with specific domains or ISPs.&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="whois lookup for IP address" style="width: 378px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25011i34D4EB16B28E78E6/image-size/large?v=v2&amp;amp;px=999" role="button" title="whois lookup for IP address.png" alt="whois lookup for IP address" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;whois lookup for IP address&lt;/span&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;For application visibility on Windows platforms, Microsoft Network Monitor can also be utilized. More information can be found in this article:&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" title="Network Monitor 3 | Microsoft Window Support" href="https://support.microsoft.com/en-us/help/933741/information-about-network-monitor-3" target="_blank" rel="noopener"&gt;Information about Network Monitor 3&lt;/A&gt;&lt;SPAN style="font-family: inherit;"&gt;.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;To track traffic for a specific domain, enable wireshark (or tcpdump) packet captures on the client machine on the physical and tunnel (utun) interface. This is considered the most reliable method to track the traffic for specific domains. Always take packet captures for both physical and tunnel interface when reporting split-tunnel issues to Palo Alto Networks support. &lt;BR /&gt;On macOS, use tcpdump: &lt;FONT face="courier new,courier"&gt;sudo tcpdump -i all -k INP -w gptest.pcapng&lt;/FONT&gt;&lt;BR /&gt;Wireshark can be used for capturing the same on Windows&lt;BR /&gt;&lt;STRONG&gt;NOTE:&amp;nbsp;&lt;/STRONG&gt;Make sure to mark the time of the test (when the issue has been reproduced), along with the domain being accessed&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;To find an IP address for a specific domain, resolve the IP address of the specific domain using nslookup as shown below. Apply the resulting IP address as a filter in wireshark.&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;$ nslookup ringcentral.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Non-authoritative answer:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Name: ringcentral.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Address: 216.146.46.11&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Name: ringcentral.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Address: 216.146.46.10&lt;SPAN style="font-family: inherit;"&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;Verify that split-tunnel configuration is working as per the order of operation below where &lt;STRONG&gt;application exclude&lt;/STRONG&gt; takes precedence over &lt;STRONG&gt;application include&lt;/STRONG&gt; followed by &lt;STRONG&gt;domain exclude&lt;/STRONG&gt; take precedence over &lt;STRONG&gt;domain include&lt;/STRONG&gt;, and then Network traffic is excluded or included based on the specific access route.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="GlobalProtect split tunnel order" style="width: 586px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26837i6DD7A5E086588EC9/image-dimensions/586x274?v=v2" width="586" height="274" role="button" title="GlobalProtect split tunnel order.png" alt="GlobalProtect split tunnel order" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;GlobalProtect split tunnel order&lt;/span&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Split-tunneling rules only apply to TCP/UDP traffic, so ICMP/ping is not subject to split-tunneling rules. Do not use ping to test whether split-tunnel rules are applied&lt;/LI&gt;
&lt;LI&gt;For detailed Windows Kernel side logs, which allows us to see the interaction between GlobalProtect filter driver and the kernel, use DebugView, which can be found here:&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/sysinternals/downloads/debugview" target="_self"&gt;debugview&lt;/A&gt;&amp;nbsp; &lt;BR /&gt;Run dbgview.exe as Administrator&lt;BR /&gt;"Enable Verbose Kernel Output" and Start "Capture Kernel" (Ctrl + K) &lt;BR /&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; This can generate large amount of logs and may also impact endpoint performance. Please enable this only when requested by Palo Alto TAC or engineering teams.&lt;/LI&gt;
&lt;LI&gt;On macOS: please also check whether GlobalProtect system extension is active using&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;$ systemextensionsctl list&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;--- com.apple.system_extension.network_extension&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;enabled active teamID bundleID (version) name [state]&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;* * PXPZ95SK77 com.paloaltonetworks.GlobalProtect.client.extension (5.2.5-66/1) GlobalProtectExtension [activated enabled]&lt;/FONT&gt;&lt;BR /&gt;Run &lt;FONT face="courier new,courier"&gt;sudo launchctl list | grep palo&lt;/FONT&gt; command to confirm the presence of &lt;FONT face="courier new,courier"&gt;NetworkExtension.com.paloaltonetworks.GlobalProtect.client.extension&lt;/FONT&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;&lt;STRONG&gt;3rd Party Interoperability:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;Check if there is a 3rd party product which can prevent GlobalProtect from properly using filters/extensions to perform split-tunnel operations. Most of the times, conflicts are found with DLP (Data Loss Prevention), AV/AM (Anti-Virus/Anti-Malware) and other VPN types of software. In these cases we need to investigate whether the issue is on the GlobalProtect side or 3rd party vendor.&lt;/LI&gt;
&lt;LI&gt;Application based exclusion will only affect the traffic generated directly by the named application. If the application is using another (system) process (for example through IPC) to facilitate a connection (such as svchost.exe), GlobalProtect filter will not capture it. Excluding such (system) a process is not advisable as it may be utilized by another non-related application, which can cause unintended consequences.&amp;nbsp;In these cases we can take one of the two approaches:
&lt;UL&gt;
&lt;LI&gt;Check if the traffic bypassing the rules, we aren’t capturing due to aforementioned reasons with the Application based exclusion, needs DNS resolution before transmission. If this is the case, we may be able to exclude the leaking traffic using domain-based exclusions&lt;/LI&gt;
&lt;LI&gt;In case we can’t use domain-based exclusion (no corresponding DNS transaction), we have to rely on route exclusion; This implies that the application is using well-known IP subnets as a destination (depending on the application, list may be found on the Internet)&lt;/LI&gt;
&lt;LI&gt;Such behavior has been noted for some applications such as MS Teams, Skype etc. Please refer to&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-Optimizing-Office-365-Traffic/ta-p/319669" target="_self"&gt;GlobalProtect: Optimizing Office 365 Traffic&lt;/A&gt;&amp;nbsp;for additional information&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;macOS: Some applications are having connection issues when split-tunnel rules are applied using the new Apple System Extensions framework. Starting with GlobalProtect 5.1.4 and macOS 10.15.4 GlobalProtect switched, as a best practice, from legacy KEXT (Kernel Extensions) to the new System Extension framework. Apple is deprecating KEXT starting with the macOS Big Sur release (ref. &lt;A href="https://support.apple.com/en-us/HT210999" target="_self"&gt;About system extensions and macOS&lt;/A&gt;&amp;nbsp; and &lt;A href="https://developer.apple.com/support/kernel-extensions/" target="_self"&gt;Deprecated Kernel Extensions and System Extension Alternatives&lt;/A&gt;&amp;nbsp;). Please confirm with the 3rd party vendors on their support for the new Apple framework.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;BR /&gt;Exclude Video Traffic&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;To verify and troubleshoot exclude video traffic from the tunnel (Windows and macOS only) feature, you can utilize following steps:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Verify whether the configuration you have on your gateway for ‘Exclude video traffic from the tunnel (Windows and macOS only)’ has been pushed correctly on the GlobalProtect or not. This can be verified by collecting GlobalProtect logs. For steps on collecting GlobalProtect logs, refer to this knowledge article:&amp;nbsp;&lt;A title="Collect Logs From GlobalProtect | Knowledge Base | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClaLCAS" target="_blank" rel="noopener"&gt;How to Collect Logs From GlobalProtect Clients&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Within the GlobalProtect logs bundle, you can review &lt;STRONG&gt;PanGPS.log&lt;/STRONG&gt; and verify that ‘Exclude video traffic from the tunnel (Windows and macOS only)’ configuration is received from the gateway as shown below:&lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;exclude-video-redirect&amp;gt;yes&amp;lt;/exclude-video-redirect&amp;gt;​&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;The firewall will send a redirect message to GlobalProtect once it understands that the specific video application needs to be excluded from the VPN tunnel. In our example, we are excluding YouTube traffic. It determines the application as video based on the initial http/https request from the client, and it also matches the destination domain in the request with the one configured. Review of PanGPS.log file within the GlobalProtect logs bundle will confirm the video redirect message received by GlobalProtect client from the gateway. Same can be seen in the logs below:&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Split tunneling is enabled: 0 include app, 2 exclude app, 0 include domain, 3 exclude domain, &lt;STRONG&gt;video-redirect yes&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Debug(1732): SP set exclude ip 74.125.166.167, port 443 for video redirect&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Debug(1732): SP set exclude ip 173.194.167.166, port 443 for video redirect&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Debug(1732): SP set exclude ip 173.194.167.166, port 443 for video redirect&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;On the firewall, you can filter the session based on a specific application by using command &lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;‘show session all filter application &amp;lt;application-name&amp;gt;’&lt;/FONT&gt;&lt;/STRONG&gt;. The example below is filtering &lt;FONT face="courier new,courier"&gt;‘youtube-base’&lt;/FONT&gt; application:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Admin view of PA-3260 in show session all filter application command" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24964iFDD21623758DFCA3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Admin view of PA-3260 in show session all filter application command.png" alt="Admin view of PA-3260 in show session all filter application command" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Admin view of PA-3260 in show session all filter application command&lt;/span&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;Review the specific session details based on the output from Step 4 by using command &lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;‘show session id &amp;lt;session id&amp;gt;’&lt;/FONT&gt;&lt;/STRONG&gt;. Look for &lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;'tracker stage firewall: split tunnel'&lt;/FONT&gt;&lt;/STRONG&gt; in the session detail output, which confirms that the traffic is being excluded from the VPN tunnel.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Browser verification can also be performed for HTTP 302 redirect response received from the gateway for the URL or video application, which we have excluded. In Chrome, Firefox, or Internet Explorer, you can utilize the Web Developer/Developer tools and Network option within them for such verification. HTTP 302 URL redirect message is seen under the status or result column when the gateway sends a redirect message. The below snapshot provides an example for Firefox Web Developer tool where under status column 302 redirect received from the gateway is seen for video playback.&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Example of the Firefox Web Developer tool showing status column 302 results" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24965iDFDAC82D6AE265F5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Example of the Firefox Web Developer tool showing status column 302 results.png" alt="Example of the Firefox Web Developer tool showing status column 302 results" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Example of the Firefox Web Developer tool showing status column 302 results&lt;/span&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
    <pubDate>Thu, 14 Jan 2021 19:24:08 GMT</pubDate>
    <dc:creator>nnaik</dc:creator>
    <dc:date>2021-01-14T19:24:08Z</dc:date>
    <item>
      <title>Troubleshoot Split Tunnel Domain &amp; Applications and Exclude Video Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/ta-p/321075</link>
      <description>&lt;P&gt;Find troubleshooting tips and tricks related to Split Tunnel Domain &amp;amp; Applications and Exclude Video Traffic features.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2021 19:24:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/ta-p/321075</guid>
      <dc:creator>nnaik</dc:creator>
      <dc:date>2021-01-14T19:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: Troubleshoot Split Tunnel Domain &amp; Applications and Exclude Video Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/396875#M26</link>
      <description>&lt;P&gt;Recently ringcentral has changed where their directories reside. What was under %appdata% is now under %program files%. I noticed this after a number of users started complaining that ringcentral meetings would not work. I tried adding the following lines below to exclude from tunnel but still facing same issue. This article configuration worked well for the past year until recently after the folder relocation. If I remove exclusions from split tunnel it works great. Any ideas? Do I need a globalprotect license for this to work properly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;%programfiles%\RingCentral\RingCentral.exe&lt;BR /&gt;%programfiles(x86)%\RingCentralMeetings\bin\RingCentral_launcher.exe&lt;BR /&gt;%programfiles(x86)%\RingCentralMeetings\bin\RingCentralMeetings.exe&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 14:09:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/396875#M26</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2021-04-09T14:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: Troubleshoot Split Tunnel Domain &amp; Applications and Exclude Video Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/443300#M31</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In the GlobalProtect Log bundle, we don't have gpsplit.log -- just wondering where specifically is this file&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"Within the GlobalProtect logs bundle, also review gpsplit.log (the equivalent file on the macOS is PanNExt.log) "&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 00:33:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/443300#M31</guid>
      <dc:creator>rajjair</dc:creator>
      <dc:date>2021-10-26T00:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: Troubleshoot Split Tunnel Domain &amp; Applications and Exclude Video Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/445706#M32</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/119812"&gt;@rajjair&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Comments in the following page can be helpful for you.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/globalprotect-working-from-home-prisma-access-and-covid-19/td-p/316122/page/4" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/globalprotect-working-from-home-prisma-access-and-covid-19/td-p/316122/page/4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;######&lt;/P&gt;&lt;P&gt;Thanks for the feedback. Actually gpsplit.log file is available as part of GlobalProtect logs bundle before GlobalProtect client 5.1.4 for macOS. After GlobalProtect client 5.1.4 and later, based on your macOS version you will either see gpsplit.log or PanNext.log [macOS 10.15.4 + GP 5.1.4 onwards]. For windows you can review PanGPS.log file. I will also update the document which you referred with this most current information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Nehal&lt;/P&gt;&lt;P&gt;######&lt;/P&gt;</description>
      <pubDate>Fri, 05 Nov 2021 08:01:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/445706#M32</guid>
      <dc:creator>taksato</dc:creator>
      <dc:date>2021-11-05T08:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: Troubleshoot Split Tunnel Domain &amp; Applications and Exclude Video Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/469824#M35</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71992"&gt;@nnaik&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;You sure Domain-based split tunneling is supposed to work for UDP traffic?&lt;/P&gt;&lt;P&gt;Same for the process based.&lt;/P&gt;&lt;P&gt;I did split-tunnel a domain, can see from the logs that an exception is added&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;""(P12804-T13544)Dump ( 797): 03/02/22 17:31:50:960 SP added an exclude ip 40.76.167.50, port 0, ttl 10 for domain GLOBAL.G.NSSVC.NET, original ttl=10, infinite ttl=no""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However UDP traffic still goes through the tunnel interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I generate some random TCP traffic to the same domain (telnet on random port) I can confirm this TCP traffic goes through the physical interface.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 16:02:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/469824#M35</guid>
      <dc:creator>rjovanovski</dc:creator>
      <dc:date>2022-03-02T16:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: Troubleshoot Split Tunnel Domain &amp; Applications and Exclude Video Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/471533#M38</link>
      <description>&lt;P&gt;These added domains, include or exclude, *.ringcentral.com, how does the client machine identifies it as to exit locally or go through the tunnel ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One issue found is, when added a single domain in a split tunnel, some other domain traffic also starts coming through the tunnel.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 05:41:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/471533#M38</guid>
      <dc:creator>sambhusarath</dc:creator>
      <dc:date>2022-03-09T05:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Troubleshoot Split Tunnel Domain &amp; Applications and Exclude Video Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/472576#M39</link>
      <description>&lt;P&gt;Thank you for correcting this article in regards to the log files and providing the details very helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, we seem to be running into an issue with this feature I am just wondering if this has been tested with a recent version of clients and if you guys have a link to try this feature out to confirm this is working as expected to not. In our environment we can see in the pangps.log we can see the video redirect being logged and the session on the firewall also shows the tracker stage of the split-tunnel occurring. However, the video errors out on the browser and the user are not able to play the content, based on the article there is 302 redirect but I don't see that occurring for us on the web trace, this video link is embedded on the site so wondering if this feature works with embedded videos or not.. Any information would help.. I have opened a ticket with support also on this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rajjair_0-1647144038150.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39613i2BB473F447DADD71/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="rajjair_0-1647144038150.png" alt="rajjair_0-1647144038150.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also tried to copy the URL and what I noticed on the first try was it fails on the second try it works after I refresh the browser.. but there is no 302 redirect as mentioned in the article above. below is a complete web trace when I have copied the original URL of the video and tried to play it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rajjair_1-1647144173573.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39614i5276DCB00CD677B7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="rajjair_1-1647144173573.png" alt="rajjair_1-1647144173573.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks for any info anybody can share...&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Mar 2022 04:04:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/472576#M39</guid>
      <dc:creator>rajjair</dc:creator>
      <dc:date>2022-03-13T04:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: Troubleshoot Split Tunnel Domain &amp; Applications and Exclude Video Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/1248807#M159</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71992"&gt;@nnaik&lt;/a&gt;&amp;nbsp;I really appreciate this post. What're the chances we see revisions in 2026 and beyond?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 19:53:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/tac-p/1248807#M159</guid>
      <dc:creator>asciikeyboard</dc:creator>
      <dc:date>2026-02-23T19:53:43Z</dc:date>
    </item>
  </channel>
</rss>

