<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global Protect client not isolated in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-client-not-isolated/m-p/513829#M3129</link>
    <description>&lt;P&gt;If you are using Global Protect AND you have split-tunneling enabled. Your PC is accessible via the local LAN. So if your in an insecure location the other people on that LAN can hack at your computer. If you don't believe me try it out.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 02 Sep 2022 13:22:00 GMT</pubDate>
    <dc:creator>MarkDufault</dc:creator>
    <dc:date>2022-09-02T13:22:00Z</dc:date>
    <item>
      <title>Global Protect client not isolated</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-client-not-isolated/m-p/513829#M3129</link>
      <description>&lt;P&gt;If you are using Global Protect AND you have split-tunneling enabled. Your PC is accessible via the local LAN. So if your in an insecure location the other people on that LAN can hack at your computer. If you don't believe me try it out.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2022 13:22:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-client-not-isolated/m-p/513829#M3129</guid>
      <dc:creator>MarkDufault</dc:creator>
      <dc:date>2022-09-02T13:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect client not isolated</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-client-not-isolated/m-p/513834#M3130</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20268"&gt;@MarkDufault&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tested with the "No direct access to local network" box checked? &amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPbACAW" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPbACAW&lt;/A&gt;&amp;nbsp; This should disable local LAN access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is also good to know how the Exclusions tab interacts with this feature. &amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001V2dCAE" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001V2dCAE&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2022 14:33:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-client-not-isolated/m-p/513834#M3130</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-09-02T14:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect client not isolated</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-client-not-isolated/m-p/513836#M3132</link>
      <description>&lt;P&gt;That is the way we had it configured.&amp;nbsp;"No direct access to local network" configured with split tunnel. The problem is that if we add any IP or domain under exclude, the&amp;nbsp;"No direct access to local network" setting is overridden inbound. The GP-connected device cannot access the public or home network, but devices on the said public or home network can access the GP-connected device. The assumption would be that the exclusion would be applied to only the IPs or domains in the exclusion list. No so.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Specific Example. On our GP gateway, we have&amp;nbsp;"No direct access to local network" enabled. We exclude IPs for Microsoft updates and Teams, Zoom, and Webex, as well as domains related to Zoom and Webex. Now an enterprise laptop, connected to a home network with IP 192.168.0.16, with GlobalProtect enabled, cannot ping or connect to anything in the 192.168.0.0/24 local network. But a device on the local network, say 192.168.0.10 can ping and RDP to 192.168.0.16. That is a problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We currently have removed all exclusions, and&amp;nbsp;"No direct access to local network" works as expected. 192.168.0.16 cannot connect to 192.168.0.10, and 192.168.0.10 cannot connect to 192.168.0.16. This means that&amp;nbsp;"No direct access to local network" is an all-or-nothing function. At least that is the way I see it. We have a ticket open with Palo Alto, and the engineers helping me on the case have verified what I have said and told me that is the case. They have made a "feature request" on our behalf.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The second link you provided (&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001V2dCAE" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001V2dCAE&lt;/A&gt;) states the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;The '&lt;I&gt;No direct access to local network&lt;/I&gt;' feature in GlobalProtect is used to block outgoing connections originating from the endpoint to the local subnet using the physical network adapter when GlobalProtect tunnel connection has been established.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;GlobalProtect application does not block incoming connections.&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;On Windows OS, when 'No direct access to local network'&amp;nbsp;is enabled and domain/application split tunnel is not configured, the GlobalProtect client enables&amp;nbsp;"weak-host-send" on the physical adapter (Windows feature), this allows the response packet for the incoming traffic to&amp;nbsp;go through the tunnel and hence the connection cannot be established.&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;MacOS does not have such a feature as Windows OS therefore&amp;nbsp;incoming connections will work.&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;If there is a requirement to block incoming connections, then the recommendation would be to use the native OS firewall on the endpoint or any other endpoint firewall product.&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 02 Sep 2022 15:11:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-client-not-isolated/m-p/513836#M3132</guid>
      <dc:creator>rbellare</dc:creator>
      <dc:date>2022-09-02T15:11:45Z</dc:date>
    </item>
  </channel>
</rss>

