<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traversing Site-To-Site Tunnel via GlobalProtect in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552212#M4254</link>
    <description>&lt;P&gt;Mick_Ball,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're a star! The ping test you suggested highlighted an issue. Whereas when pinging to the secondary PA MGMT interface from the primary showed source zone as S2S-VPN, the secondary MGMT ping to GP client address showed destination zone as GlobalProtect and not S2S-VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then came to realise GlobalProtect was setup on secondary PA with exact same subnet as the primary. D'OH!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyway, killing GlobalProtect on secondary has now resolved issue. I can reach secondary PA via GlobalProtect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you so much once again for your help!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jared&lt;/P&gt;</description>
    <pubDate>Wed, 02 Aug 2023 15:07:09 GMT</pubDate>
    <dc:creator>JaredBaglietto</dc:creator>
    <dc:date>2023-08-02T15:07:09Z</dc:date>
    <item>
      <title>Traversing Site-To-Site Tunnel via GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552010#M4242</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See if you can give me some insight here as I've exhausted all my options.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Scenario&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I have a client who has two branch offices, each one with a PA-440 installed. Both these PAs are linked together via IPSec tunnel. I can confirm that between both these LAN subnets, there is harmonious communication.&lt;/P&gt;
&lt;P&gt;At the same time, I have created a GlobalProtect gateway to primary office's PA-440, in the hopes I could reach both office PA's MGMT interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Problem&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The problem, I can reach primary office MGMT just fine via GlobalProtect, but not the secondary office's.&lt;/P&gt;
&lt;P&gt;I have checked logs on both PAs and can see that traffic is allowed, and that the traffic knows to travel across the relevant tunnels. But I'm getting constant age-outs on both PA logs. So I can see traffic from my GP address to the secondary PA is arriving and permitted, but just doesn't know how to translate to its MGMT interface for the standard port 443. I've also checked the permitted IP ranges for the second PA's MGMT interface, and all seems ok as it includes the GP subnet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Look forward to hearing your thoughts. Many thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2023 08:44:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552010#M4242</guid>
      <dc:creator>JaredBaglietto</dc:creator>
      <dc:date>2023-08-01T08:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: Traversing Site-To-Site Tunnel via GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552035#M4243</link>
      <description>&lt;P&gt;Are you seeing anything on the remote sites traffic logs? If not then perhaps add a policy on them to deny “any source” to “management destination” and log session start to see if at least routing is as expected… perhaps you already said it was getting there…. If so then do the management interfaces know how to get back to you?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2023 10:49:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552035#M4243</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2023-08-01T10:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: Traversing Site-To-Site Tunnel via GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552157#M4246</link>
      <description>&lt;P&gt;Hi Mick_Ball,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your swift response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Traffic logs are indeed reaching the branch office firewall, just timing out like in the first office PA logs.&lt;/P&gt;
&lt;P&gt;I've checked your suggestion of MGMT interface routing back to the GlobalProtect subnet I'm accessing through. I can see there's a static route set on the PA's virtual router to go via the Site-to-Site tunnel to reach the primary PA, which is where I connect to for GlobalProtect.&lt;/P&gt;
&lt;P&gt;Please let me know if I may be missing something.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jared&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2023 07:24:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552157#M4246</guid>
      <dc:creator>JaredBaglietto</dc:creator>
      <dc:date>2023-08-02T07:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: Traversing Site-To-Site Tunnel via GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552176#M4248</link>
      <description>&lt;P&gt;if you can see your traffic on other devices does that mean you can connect to them via another source or are they log forwarding to Panorama... if you can access them then perhaps it may be worth testing a ping locally....&lt;/P&gt;
&lt;P&gt;ping source "internal interface address" host "management interface address"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if all is good then perhaps also try ...&lt;/P&gt;
&lt;P&gt;traceroute source "management interface address" host " GP Client address"&amp;nbsp; to just see if it knows how to get back...&lt;/P&gt;
&lt;P&gt;The reason i suggest this is because the management interface is not inlfuenced by the virtual router as it has it's own default gateway...&amp;nbsp;&amp;nbsp; &lt;/P&gt;
&lt;P&gt;also... QQ.. are management and trusted on different subnets????&amp;nbsp; I assume not but not confirmed...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2023 12:23:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552176#M4248</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2023-08-02T12:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: Traversing Site-To-Site Tunnel via GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552188#M4250</link>
      <description>&lt;P&gt;Hi Mick_Ball,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Confirmed ping tests between PA hosts directly linked within Site-to-Site tunnel were successful.&lt;/P&gt;
&lt;P&gt;Traceroute from secondary PA MGMT interface to GP client fails completely. So it's definitely an issue of communication between GP and Site-to-Site zones.&lt;/P&gt;
&lt;P&gt;MGMT and trusted zones are on same subnet for both PAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2023 12:51:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552188#M4250</guid>
      <dc:creator>JaredBaglietto</dc:creator>
      <dc:date>2023-08-02T12:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Traversing Site-To-Site Tunnel via GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552194#M4252</link>
      <description>&lt;P&gt;on the remote firewall did you add a policy to deny all traffic from management to trusted interface and log session start..&amp;nbsp;&amp;nbsp; then you could see if pings from management were hitting the interface...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also.. can the management interface ping it's own gateway...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;save troubleshooting... if same subnet,, just add management to trusted interface...&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2023 13:16:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552194#M4252</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2023-08-02T13:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: Traversing Site-To-Site Tunnel via GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552212#M4254</link>
      <description>&lt;P&gt;Mick_Ball,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're a star! The ping test you suggested highlighted an issue. Whereas when pinging to the secondary PA MGMT interface from the primary showed source zone as S2S-VPN, the secondary MGMT ping to GP client address showed destination zone as GlobalProtect and not S2S-VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then came to realise GlobalProtect was setup on secondary PA with exact same subnet as the primary. D'OH!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyway, killing GlobalProtect on secondary has now resolved issue. I can reach secondary PA via GlobalProtect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you so much once again for your help!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jared&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2023 15:07:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552212#M4254</guid>
      <dc:creator>JaredBaglietto</dc:creator>
      <dc:date>2023-08-02T15:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: Traversing Site-To-Site Tunnel via GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552217#M4255</link>
      <description>&lt;P&gt;&lt;STRONG&gt;"Then came to realise GlobalProtect was setup on secondary PA with exact same subnet as the primary. D'OH!"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;you is fik innit......&amp;nbsp;&amp;nbsp; lol...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Nice one and good you kept at it...&amp;nbsp; so much easier someties to do it a different way rather than to find a resolution ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NP and anytime ...&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2023 16:02:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/traversing-site-to-site-tunnel-via-globalprotect/m-p/552217#M4255</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2023-08-02T16:02:51Z</dc:date>
    </item>
  </channel>
</rss>

