<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Not using AppID but GP connections are denying on apps for 10 minutes before allowing traffic to work properly in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/469390#M2511</link>
    <description>&lt;P&gt;Not fixed. &amp;nbsp;It was working beautifully for a few hours. &amp;nbsp;Everything was matching, then at one point the firewall out of nowhere started detecting users as domain.com\username , and because of that .com, not matching on any AD groups, therefore falling into our temporary all access safety net policy (which we really need to get rid of!).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What would cause the firewall go out of nowhere throw that additional .com back in the username? &amp;nbsp;Seems like you make a small change and commit the firewall, it will resolve it for a bit, but eventually break again all by itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I seem to be talking to myself here. &amp;nbsp;Is this forum visited often? &amp;nbsp;Or is it pretty much silence like Palo Alto support?&lt;/P&gt;</description>
    <pubDate>Mon, 28 Feb 2022 22:22:32 GMT</pubDate>
    <dc:creator>ksauer507</dc:creator>
    <dc:date>2022-02-28T22:22:32Z</dc:date>
    <item>
      <title>Not using AppID but GP connections are denying on apps for 10 minutes before allowing traffic to work properly</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/468820#M2494</link>
      <description>&lt;P&gt;We are currently working on trying to get PA-3220s working properly and Global protect working but are running into an issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once a user connects, recently its starting to deny based on app ID, however in our VPN policy we have any specified.&amp;nbsp; The thing is this is pretty random.&amp;nbsp; In 5 to 10 minutes the VPN starts working normally and those denies turn to allows and are identified as the proper VPN access policy.&amp;nbsp; You could go a day or a few hours and then it goes back into this vicious cycle where its detects apps and fails back to our last policy which is a default deny.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This would be easier to diagnose if the problem was consistent.&amp;nbsp; But it seems the firewall flip flops and denies specific apps and then it resolves itself all on its own.&amp;nbsp; Anyone see this?&lt;/P&gt;&lt;P&gt;We are on 10.0.8-h8 and Global Protect version 5.2.10.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="When vpn is not working" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39347i4D2FBCCFE3AAF33D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="palo-drops.jpg" alt="When vpn is not working" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;When vpn is not working&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rule for the VPN allows for ANY app id for this user" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39348iB85F1F8A54B66D7B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="palo-vpn-rules.jpg" alt="rule for the VPN allows for ANY app id for this user" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;rule for the VPN allows for ANY app id for this user&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="When vpn is working fine" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39349iF63381FBB2E38269/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="palo-allows.jpg" alt="When vpn is working fine" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;When vpn is working fine&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 20:06:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/468820#M2494</guid>
      <dc:creator>ksauer507</dc:creator>
      <dc:date>2022-02-25T20:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: Not using AppID but GP connections are denying on apps for 10 minutes before allowing traffic to work properly</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/468886#M2498</link>
      <description>&lt;P&gt;One of the things I've noticed is sometimes the fw will see the user as domain.com\username and sometimes as domain\username.&amp;nbsp; I found this thread and made changes so user and Group Attributes Primary Usernname is sAMAccountName and Alternate Username 1 is userPrincipalName, but it still randomly flip flops detecting the user.&lt;BR /&gt;&lt;BR /&gt;so we ignored app-id based on the user name with a temp rule and deleted our others, now things work.&amp;nbsp; Why doesn't the palo see what AzureAD is passing and normalize it with what we have in on prem AD?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 23:29:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/468886#M2498</guid>
      <dc:creator>ksauer507</dc:creator>
      <dc:date>2022-02-25T23:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Not using AppID but GP connections are denying on apps for 10 minutes before allowing traffic to work properly</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/468953#M2504</link>
      <description>&lt;P&gt;By creating a claims transform in AzureAD to user.onpremisesamaccountname that seems to make 95% of user-id&amp;nbsp;detected as domain\username now. &amp;nbsp;That’s also indicated in GP client settings in windows and Mac.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BUT we’re not out of the woods yet. &amp;nbsp;When you first connect on windows there’s two user-id entries in the monitor tab from source: vpn-client and GlobalProtect. &amp;nbsp;So initially there are hits to AD from domain.com\username which falls under a different access policy. &amp;nbsp;Once they hit any of our 4 AD servers, they update user-id with domain\username which now they can hit the appropriate policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a Mac client that is not intergrated with AD, user-id always sees them as domain.com\username so then they will never fall into appropriate user groups. &amp;nbsp;So since macs not touching AD we still think there’s more to the MS Azure AD SAML configuration, or maybe some how to override GP client from throwing in that stupid .com in the domain.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Feb 2022 16:55:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/468953#M2504</guid>
      <dc:creator>ksauer507</dc:creator>
      <dc:date>2022-02-26T16:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: Not using AppID but GP connections are denying on apps for 10 minutes before allowing traffic to work properly</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/469287#M2508</link>
      <description>&lt;P&gt;Ok in Azure claims we went back to user.userprincipalname, and in the Group Mapping &amp;gt; User and Group Attributes Primary Username is also matching as userPrincipalName.&lt;/P&gt;&lt;P&gt;Even though this was a direct match, PAN support basically threw us out saying this was an Azure AD issue.&amp;nbsp; In fact after 4 days of rigorous round-the-clock testing and troubleshooting, even on PTO time... we think we solved it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In User Identification, there's a certificate profile attached.&amp;nbsp; We went to that certificate profile and the third field down is User Domain.&amp;nbsp; It was set to our domain in this format: domain.com.&amp;nbsp; We basically threw a hail mary here and changed it to just domain..&amp;nbsp; After reconnecting we finally saw non-domain machines such as iPhone and mac test equipment finally match the user ID in &lt;A href="mailto:username@domain.com" target="_blank"&gt;username@domain.com &lt;/A&gt;format and hit on the actual policy we have tied to that AD group the user lives in.&amp;nbsp; We also see successful consistent user-id matching on domain-joined Windows machines as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems we are ok now, but we are still watching it!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2022 17:37:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/469287#M2508</guid>
      <dc:creator>ksauer507</dc:creator>
      <dc:date>2022-02-28T17:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Not using AppID but GP connections are denying on apps for 10 minutes before allowing traffic to work properly</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/469390#M2511</link>
      <description>&lt;P&gt;Not fixed. &amp;nbsp;It was working beautifully for a few hours. &amp;nbsp;Everything was matching, then at one point the firewall out of nowhere started detecting users as domain.com\username , and because of that .com, not matching on any AD groups, therefore falling into our temporary all access safety net policy (which we really need to get rid of!).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What would cause the firewall go out of nowhere throw that additional .com back in the username? &amp;nbsp;Seems like you make a small change and commit the firewall, it will resolve it for a bit, but eventually break again all by itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I seem to be talking to myself here. &amp;nbsp;Is this forum visited often? &amp;nbsp;Or is it pretty much silence like Palo Alto support?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2022 22:22:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/not-using-appid-but-gp-connections-are-denying-on-apps-for-10/m-p/469390#M2511</guid>
      <dc:creator>ksauer507</dc:creator>
      <dc:date>2022-02-28T22:22:32Z</dc:date>
    </item>
  </channel>
</rss>

