<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic A global protect connected client machine access a resource(behind Cisco router) that is connected to the host PA 800 Firewall via IPsec in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/a-global-protect-connected-client-machine-access-a-resource/m-p/549577#M4213</link>
    <description>&lt;P&gt;Hello Everyone,&lt;BR /&gt;&lt;BR /&gt;I have a Palo Alto 820 Firewall locally and it has been licensed and configured with global protect for the remote mobility of our users. And It also has a Site-to-Site IPsec connectivity to a remote location of a different organization and the remote end of that organization has a Cisco router to configure the IPsec. There are existing successful connections of resources/end-point through the IPsec between the two sites and it is currently operational.&amp;nbsp;&lt;BR /&gt;So now this new requirement come up where the global protect client users in remote locations be able to access resources behind the remote site with the Cisco router through the IPsec tunnel. We have completed the required configuration and it was supposed to be working as we did a similar set up as the existing operational connection via the IPsec. Is there any extra configuration I need to add? Does it even work that way? #IPsec #Site-to-site #Cisco-to-PaloAlto &lt;LI-PRODUCT title="GlobalProtect" id="GlobalProtect"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jul 2023 12:37:57 GMT</pubDate>
    <dc:creator>SisayFekadu</dc:creator>
    <dc:date>2023-07-17T12:37:57Z</dc:date>
    <item>
      <title>A global protect connected client machine access a resource(behind Cisco router) that is connected to the host PA 800 Firewall via IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/a-global-protect-connected-client-machine-access-a-resource/m-p/549577#M4213</link>
      <description>&lt;P&gt;Hello Everyone,&lt;BR /&gt;&lt;BR /&gt;I have a Palo Alto 820 Firewall locally and it has been licensed and configured with global protect for the remote mobility of our users. And It also has a Site-to-Site IPsec connectivity to a remote location of a different organization and the remote end of that organization has a Cisco router to configure the IPsec. There are existing successful connections of resources/end-point through the IPsec between the two sites and it is currently operational.&amp;nbsp;&lt;BR /&gt;So now this new requirement come up where the global protect client users in remote locations be able to access resources behind the remote site with the Cisco router through the IPsec tunnel. We have completed the required configuration and it was supposed to be working as we did a similar set up as the existing operational connection via the IPsec. Is there any extra configuration I need to add? Does it even work that way? #IPsec #Site-to-site #Cisco-to-PaloAlto &lt;LI-PRODUCT title="GlobalProtect" id="GlobalProtect"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 12:37:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/a-global-protect-connected-client-machine-access-a-resource/m-p/549577#M4213</guid>
      <dc:creator>SisayFekadu</dc:creator>
      <dc:date>2023-07-17T12:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: A global protect connected client machine access a resource(behind Cisco router) that is connected to the host PA 800 Firewall via IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/a-global-protect-connected-client-machine-access-a-resource/m-p/550289#M4228</link>
      <description>&lt;P&gt;Hi SisayFekadu,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As i understand correctly you want. your mobile users connected via global protect to access resources over the IPSec tunnel you have with remote site. &amp;nbsp;First thing to check of course is the routing. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Is your global protect client configured for split tunneling or is everything send over the tunnel (default route over tunnel). &amp;nbsp;If split tunneling is used you will need to add routes to reach the remote destination.&lt;/P&gt;
&lt;P&gt;2. If you have the above sorted out , your site to site VPN tunnel is this a route base or policy based VPN if it is policy base you might need to also adjust proxy ID's on both sides. &amp;nbsp; Also check your routing on the remote site that it knows the mobile users subnet is to be routed over the tunnel.&lt;/P&gt;
&lt;P&gt;3. Of course you will also need firewall policies to allow the traffic to flow.&lt;/P&gt;
&lt;P&gt;So in short I see no reason why this requirement would not work it just needs the correct configuration steps.&lt;/P&gt;
&lt;P&gt;Tackle it one by one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 22:58:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/a-global-protect-connected-client-machine-access-a-resource/m-p/550289#M4228</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2023-07-20T22:58:21Z</dc:date>
    </item>
  </channel>
</rss>

