<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global Protect at a IPsec S2S branch office in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-at-a-ipsec-s2s-branch-office/m-p/436121#M1814</link>
    <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;We have a load of small branch offices that terminate at our azure Palo Alto gateway over an IPsec tunnel (via a Draytek router). This all works and allows printing &amp;amp; RDP to onprem services. We also have the Global Protect gateway on the same Palo Alto albeit on a separate subnet&lt;/P&gt;&lt;P&gt;We are starting to pilot win10 devices with global protect. The branch offices have a separate wifi which is essentially a public wifi&lt;/P&gt;&lt;P&gt;The setup is that they (intuned) Win10 device has 2 networks; when docked are hardwired into the IPsec router (so are connected to the LAN that is connected to Azure over IPsec tunnel), and when undocked are connected to the public wifi and Global Protect allows them to access 365/onprem resources&lt;/P&gt;&lt;P&gt;What I'm unclear about is when the device is docked and therefore hardwired to the Draytek router so traffic flows over the IPsec tunnel and Global Protect is also connected - both methods have the same destination subnets incl. in their routing tables - device traffic flows through GP but;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- is there an overhead with GP connecting through an IPsec tunnel? I imagine this will add to the latency at the very least&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried configuring policy routing on the Draytek to force all traffic through the IPSec tunnel (so GP can be disabled when hardwired) but have struggled to set this up consistently across the various Draytek models that we have at the +70 sites, this would have allowed us to use the Palo for URL filtering etc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Sep 2021 10:42:07 GMT</pubDate>
    <dc:creator>benslade</dc:creator>
    <dc:date>2021-09-23T10:42:07Z</dc:date>
    <item>
      <title>Global Protect at a IPsec S2S branch office</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-at-a-ipsec-s2s-branch-office/m-p/436121#M1814</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;We have a load of small branch offices that terminate at our azure Palo Alto gateway over an IPsec tunnel (via a Draytek router). This all works and allows printing &amp;amp; RDP to onprem services. We also have the Global Protect gateway on the same Palo Alto albeit on a separate subnet&lt;/P&gt;&lt;P&gt;We are starting to pilot win10 devices with global protect. The branch offices have a separate wifi which is essentially a public wifi&lt;/P&gt;&lt;P&gt;The setup is that they (intuned) Win10 device has 2 networks; when docked are hardwired into the IPsec router (so are connected to the LAN that is connected to Azure over IPsec tunnel), and when undocked are connected to the public wifi and Global Protect allows them to access 365/onprem resources&lt;/P&gt;&lt;P&gt;What I'm unclear about is when the device is docked and therefore hardwired to the Draytek router so traffic flows over the IPsec tunnel and Global Protect is also connected - both methods have the same destination subnets incl. in their routing tables - device traffic flows through GP but;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- is there an overhead with GP connecting through an IPsec tunnel? I imagine this will add to the latency at the very least&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried configuring policy routing on the Draytek to force all traffic through the IPSec tunnel (so GP can be disabled when hardwired) but have struggled to set this up consistently across the various Draytek models that we have at the +70 sites, this would have allowed us to use the Palo for URL filtering etc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 10:42:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-at-a-ipsec-s2s-branch-office/m-p/436121#M1814</guid>
      <dc:creator>benslade</dc:creator>
      <dc:date>2021-09-23T10:42:07Z</dc:date>
    </item>
  </channel>
</rss>

