<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Split tunneling based on the domain is not working. in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/316996#M43</link>
    <description>&lt;P&gt;Sorry, my bad. The firewall type 820 was running 8.1.11. After upgrade to 9.0.5 it is all working good. No Global Protect license is needed for split-tunnel based on domain. I also notice that included domains are required for Office 365 to function properly. That because we use SSO and Microsoft is expecting to see logins coming from registered public addresses. For that I include domains from option 56 as on next Microsoft page:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The rest I add to excluded list. In order to configure I use set cli like in next example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;excl:&lt;/P&gt;&lt;P&gt;set global-protect global-protect-gateway &lt;EM&gt;GATEWAY_NAME&lt;/EM&gt; remote-user-tunnel-configs &lt;EM&gt;CONFIG_NAME&lt;/EM&gt; split-tunneling exclude-domains list *.microsoft.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;incl:&lt;/P&gt;&lt;P&gt;set global-protect global-protect-gateway &lt;EM&gt;GATEWAY_NAME&lt;/EM&gt; remote-user-tunnel-configs &lt;EM&gt;CONFIG_NAME&lt;/EM&gt; split-tunneling include-domains list login.microsoft.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From this lists is visible why included list is needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the portal I use option not to use tunnel for all DNS queries. That way the clients use local ISP for resolving Microsoft addresses, in order to connect to the nearest pod.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if you need complete list of Office 365. I had to tweak it in order to have less than 200 entries.&lt;/P&gt;</description>
    <pubDate>Wed, 18 Mar 2020 09:26:23 GMT</pubDate>
    <dc:creator>goran.katava</dc:creator>
    <dc:date>2020-03-18T09:26:23Z</dc:date>
    <item>
      <title>Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/261904#M35</link>
      <description>&lt;P&gt;Split tunneling based on the domain is not working. We need to monitor our user's web traffic while they are on roaming. While users need to connect GlobalProtect and Cisco Any connects simultaneously, some traffic should go via Cisco Any connects and rest of them via GlobalProtect. I tried split tunneling based on the domain but no luck. Is there any solution for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN-OS - 8.1.7&lt;/P&gt;&lt;P&gt;GlobalProtect- 5.0.2&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 07:59:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/261904#M35</guid>
      <dc:creator>NavigantNetworkteam</dc:creator>
      <dc:date>2019-05-22T07:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/266199#M36</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Without mode information, it will be difficult to troubleshooting your problem, maybe a support ticket will be the best thing to do here.&lt;/P&gt;&lt;P&gt;However, just in case of, the split tunneling per domain requires a GP subscription license on the Firewall. May be the cause of your problem.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 12:52:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/266199#M36</guid>
      <dc:creator>khuynh</dc:creator>
      <dc:date>2019-06-04T12:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/284444#M37</link>
      <description>&lt;P&gt;I have exactly the same problem. Panorama on 9.0.3 level, firewalls on 8.1.8H5. Information on included and excluded networks in split tunneling is visible on Panorama but not on firewalls. There is no relevant issue in commit warnings.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you resolved that problem?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 20:15:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/284444#M37</guid>
      <dc:creator>Miroslaw_Iwanowski</dc:creator>
      <dc:date>2019-08-21T20:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/314377#M38</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84247"&gt;@NavigantNetworkteam&lt;/a&gt;&amp;nbsp;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you ever resolve this issue.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 14:33:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/314377#M38</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-03-04T14:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/314392#M39</link>
      <description>&lt;P&gt;The only solution is to upgrade firewalls to 9.x version. No other way.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 15:26:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/314392#M39</guid>
      <dc:creator>Miroslaw_Iwanowski</dc:creator>
      <dc:date>2020-03-04T15:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/314418#M40</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/73217"&gt;@Miroslaw_Iwanowski&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your response.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 16:04:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/314418#M40</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-03-04T16:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/316881#M41</link>
      <description>&lt;P&gt;I have configured split tunneling on version 9.0.4 in order to offload Office365 from the tunnel. I have added 163 entries in excluded domains. That works fine so far. I don't understand the purpose of included domain list. I even notice that my vpn is not working when I add a list on PA-820. It is working on PA-3200. Which list has a precedence in case of conflicting entries? I can't find this documented on PA.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2020 21:05:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/316881#M41</guid>
      <dc:creator>goran.katava</dc:creator>
      <dc:date>2020-03-17T21:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/316885#M42</link>
      <description>&lt;P&gt;One comment. For domain based split tunneling you need a global portal license. Do you have it on both devices?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2020 21:07:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/316885#M42</guid>
      <dc:creator>Miroslaw_Iwanowski</dc:creator>
      <dc:date>2020-03-17T21:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/316996#M43</link>
      <description>&lt;P&gt;Sorry, my bad. The firewall type 820 was running 8.1.11. After upgrade to 9.0.5 it is all working good. No Global Protect license is needed for split-tunnel based on domain. I also notice that included domains are required for Office 365 to function properly. That because we use SSO and Microsoft is expecting to see logins coming from registered public addresses. For that I include domains from option 56 as on next Microsoft page:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The rest I add to excluded list. In order to configure I use set cli like in next example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;excl:&lt;/P&gt;&lt;P&gt;set global-protect global-protect-gateway &lt;EM&gt;GATEWAY_NAME&lt;/EM&gt; remote-user-tunnel-configs &lt;EM&gt;CONFIG_NAME&lt;/EM&gt; split-tunneling exclude-domains list *.microsoft.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;incl:&lt;/P&gt;&lt;P&gt;set global-protect global-protect-gateway &lt;EM&gt;GATEWAY_NAME&lt;/EM&gt; remote-user-tunnel-configs &lt;EM&gt;CONFIG_NAME&lt;/EM&gt; split-tunneling include-domains list login.microsoft.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From this lists is visible why included list is needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the portal I use option not to use tunnel for all DNS queries. That way the clients use local ISP for resolving Microsoft addresses, in order to connect to the nearest pod.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if you need complete list of Office 365. I had to tweak it in order to have less than 200 entries.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2020 09:26:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/316996#M43</guid>
      <dc:creator>goran.katava</dc:creator>
      <dc:date>2020-03-18T09:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/317077#M44</link>
      <description>&lt;P&gt;I am having the same issue but we are trying to exclude WebEx and Blackboard Collaborate and I cannot get this to work via domain names...the traffic just comes through the VPN.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2020 16:37:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/317077#M44</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-03-18T16:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/317252#M45</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/117265"&gt;@goran.katava&lt;/a&gt;&amp;nbsp;, Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would like to see your cut down list as may be the way to go but I found this link and it suggests only a few for optimization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont thing 365 will work if we shutdown the VPN tunnel with such a few url's but it does seem to keep the bulk of office traffic local.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/office-365-blog/how-to-quickly-optimize-office-365-traffic-for-remote-staff-amp/ba-p/1214571" target="_blank"&gt;https://techcommunity.microsoft.com/t5/office-365-blog/how-to-quickly-optimize-office-365-traffic-for-remote-staff-amp/ba-p/1214571&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 08:33:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/317252#M45</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-03-19T08:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318514#M46</link>
      <description>&lt;P&gt;Hi Goran&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you able to share you configuration.. we are trying to split the o365 traffic want to ensure we are configuring it correctly. Teams traffic for us is still going through the tunnel..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you do any split tunnel using process or all domains&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RJ&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 15:25:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318514#M46</guid>
      <dc:creator>rajjair</dc:creator>
      <dc:date>2020-03-25T15:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318560#M47</link>
      <description>&lt;P&gt;Hi RJ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I followed advice from &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;, and realized that 'optimized' should be enough for split-tunnel on Global Protect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Search for category 'optimize' on next :&lt;/P&gt;&lt;P&gt;&lt;A href="https://endpoints.office.com/endpoints/worldwide?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7" target="_blank"&gt;https://endpoints.office.com/endpoints/worldwide?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It takes 4 domains and about 20 subnets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set global-protect global-protect-gateway GATEWAY_NAME remote-user-tunnel-configs test-Office365-offloading split-tunneling exclude-access-route [ 13.107.18.10/31 13.107.6.152/31&lt;BR /&gt;13.107.64.0/18 13.107.128.0/22 13.107.136.0/22 23.103.160.0/20 40.96.0.0/13 40.104.0.0/15 40.108.128.0/17 52.96.0.0/14 52.104.0.0/14 52.112.0.0/14 104.146.128.0/17 131.253.33.215/32 132.245.0.0/16 150.171.32.0/22 150.171.40.0/22 191.234.140.0/22 204.79.197.215/32 ]&lt;/P&gt;&lt;P&gt;set global-protect global-protect-gateway GATEWAY_NAME remote-user-tunnel-configs test-Office365-offloading split-tunneling exclude-domains list outlook.office.com&lt;BR /&gt;set global-protect global-protect-gateway GATEWAY_NAME remote-user-tunnel-configs test-Office365-offloading split-tunneling exclude-domains list outlook.office365.com&lt;BR /&gt;set global-protect global-protect-gateway GATEWAY_NAME remote-user-tunnel-configs test-Office365-offloading split-tunneling exclude-domains list company-name.sharepoint.com&lt;BR /&gt;set global-protect global-protect-gateway GATEWAY_NAME remote-user-tunnel-configs test-Office365-offloading split-tunneling exclude-domains list company-name-my.sharepoint.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 18:03:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318560#M47</guid>
      <dc:creator>goran.katava</dc:creator>
      <dc:date>2020-03-25T18:03:19Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318563#M48</link>
      <description>&lt;P&gt;Thanks for that.. I am curious have you tried doing split tunnel based on process name&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;exclude-applications [ "%PROGRAMFILES(X86)%\VMware\VMware Horizon View Client\vmware-view.exe" "%PROGRAMFILES(X86)%\VMware\VMware Horizon View Client\x64\vmware-remotemks.exe" "%PROGRAMFILES%\Microsoft Office\root\Office16\OUTLOOK.EXE" %LOCALAPPDATA%\Microsoft\Teams\current\Teams.exe];&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 18:25:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318563#M48</guid>
      <dc:creator>rajjair</dc:creator>
      <dc:date>2020-03-25T18:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318574#M49</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/119812"&gt;@rajjair&lt;/a&gt;&amp;nbsp;, yes we use&amp;nbsp;&lt;SPAN&gt;%LOCALAPPDATA%\Microsoft\Teams\current\Teams.exe as an exception but some teams traffic is still sent via the tunnel&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 19:32:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318574#M49</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-03-25T19:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318641#M50</link>
      <description>&lt;P&gt;Hi MickBall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is what I had and observed also, in the palo traffic logs i could see ms-teams app coming for VPN users. Before I found this forum I had also opened a ticket with support on this issue as wanted a way to confirm traffic for sure is being split or not. What they informed me applications sitting in user context is not supported at this time. I would prefer to use Process ID then IPs as IPs can change and keep config up to date without any automation and checking for changes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---- Here is what the TAC mentioned to me ----&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;The full path of the application to be included from the tunnel is currently only resolvable in PanGPS context for windows it is system service context.&lt;BR /&gt;While for Mac, it is root context in prelogon and user context after user logon.&lt;BR /&gt;&lt;BR /&gt;Currently you have the following path&lt;BR /&gt;%USERPROFILE%\AppData\Local\Microsoft\Teams\current\Teams.exe&lt;BR /&gt;&lt;BR /&gt;In order for PanGPS to resolve the path you will need to shift the path to a system service context as opposed to a user context as shown in the example below,&lt;BR /&gt;"%ProgramFiles(x86)%\Google\Chrome\Application\chrome.exe"&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Other customer requested us to improve this path issue and submitted it as a feature request.&lt;BR /&gt;But it has not been implemented yet.&lt;BR /&gt;So we suggest to avoid this issue by routing.&lt;BR /&gt;Add routes to exclude from the VPN tunnel. These routes are sent through the physical adapter on endpoints rather than through the virtual adapter (the tunnel).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 05:32:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318641#M50</guid>
      <dc:creator>rajjair</dc:creator>
      <dc:date>2020-03-26T05:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318653#M51</link>
      <description>&lt;P&gt;Hi Rajjair, Mickball,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't have Global Protect license, and therefor can't use split tunnel based on application/service.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I mentioned in previous comment, version 9.0.x seems to support destination domain, even with no license.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We use MS Flow as described in next link, in order to get alerted on any changes of IP ranges or domains.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/office-365-networking/use-microsoft-flow-to-receive-an-email-for-changes-to-office-365/m-p/240651" target="_blank"&gt;https://techcommunity.microsoft.com/t5/office-365-networking/use-microsoft-flow-to-receive-an-email-for-changes-to-office-365/m-p/240651&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 08:09:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/318653#M51</guid>
      <dc:creator>goran.katava</dc:creator>
      <dc:date>2020-03-26T08:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/319901#M52</link>
      <description>&lt;P&gt;yes static routes are working well...&amp;nbsp;&amp;nbsp; do you know the cli for this...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have started with "set network tunnel global-protect-gateway"&amp;nbsp; I can add the gateway name but cannot see how to add the client config name.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the documentation sends me here set network tunnel global-protect-site-to-site &amp;lt;name&amp;gt; client split-tunneling access-route [ &amp;lt;access-route1&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but not working on 8.1.9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am going to create a new post for this.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 10:42:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/319901#M52</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-04-01T10:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/319903#M53</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is what I use for O365 (optimized option):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set global-protect global-protect-gateway GATEWAY-NAME remote-user-tunnel-configs CONFIG-NAME split-tunneling exclude-access-route [ 13.107.18.10/31 13.107.6.152/31 13.107.64.0/18 13.107.128.0/22 13.107.136.0/22 23.103.160.0/20 40.96.0.0/13 40.104.0.0/15 40.108.128.0/17 52.96.0.0/14 52.104.0.0/14 52.112.0.0/14 104.146.128.0/17 131.253.33.215/32 132.245.0.0/16 150.171.32.0/22 150.171.40.0/22 191.234.140.0/22 204.79.197.215/32 ]&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 10:49:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/319903#M53</guid>
      <dc:creator>goran.katava</dc:creator>
      <dc:date>2020-04-01T10:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling based on the domain is not working.</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/320023#M54</link>
      <description>&lt;P&gt;Hey All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the application process is located in the user profile directory and would like the ability to use that application for exclude and include then please have your SE vote for this feature request&amp;nbsp;&amp;nbsp;FR#11579&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently GP client does not support the ability to white-list process id located in the user profile directory. Example application is Microsoft teams&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;RJ&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 15:10:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-tunneling-based-on-the-domain-is-not-working/m-p/320023#M54</guid>
      <dc:creator>rajjair</dc:creator>
      <dc:date>2020-04-01T15:10:48Z</dc:date>
    </item>
  </channel>
</rss>

