<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Globalprotect split tunneling in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554501#M4301</link>
    <description>&lt;P&gt;Yes but by design the GP client adds your DNS as a /32 to the routing table, as below I added a /32 exclusion from the tunnel but the GP modifies the metric to force DNS via the tunnel..&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Mick_Ball_0-1692617230749.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52952iD22BBF6DF12FD12E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Mick_Ball_0-1692617230749.png" alt="Mick_Ball_0-1692617230749.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So i added 10.250.1.41/32 to be excluded from the tunnel, it has been added to the routing table but with a metric of 36 so the metric of 1 will be used for your requests.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Aug 2023 11:34:05 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2023-08-21T11:34:05Z</dc:date>
    <item>
      <title>Globalprotect split tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554195#M4293</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I got a question regarding GlobalProtect and DNS. We currently have a setup where the users have an always-on-vpn. We also have some split tunneling enabled, so 10.10.10.0/24 does not enter the tunnel when the users are on-prem (when they are 'on the read', everything is tunneled). The split tunneling is working fine, when visiting a website, connecting to a NAS that lives in this subnet from an onprem workstation, the traffic does not enter the tunnel. However, our DNS server is also in this 10.10.10.0/24 range. We still see the traffic going into the tunnel. Is that expected behaviour? I see there is a form of split dns tunneling: &lt;A href="https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/split-dns" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/split-dns&lt;/A&gt; but it uses split tunneling based on domains if I see that correctly... We use only 'access route' split tunneling right now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would imagine if we want to have all the DNS queries outside of the tunnel, I would write a 'domain based split tunnel' rule for the 'on-premise users', to include all domains, so: *&lt;/P&gt;
&lt;P&gt;But this also has effect on http(s) traffic etc if I understand correctly...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, long story short, is there a way to route DNS traffic also outside the tunnel when on-premise?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers!&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 16:14:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554195#M4293</guid>
      <dc:creator>wazaka</dc:creator>
      <dc:date>2023-08-17T16:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect split tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554327#M4299</link>
      <description>&lt;P&gt;Hi Wazaka... quick question, by what method do you determine split tunnel or full tunnel, is it via different gateways or gateway configs??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a similar setup for our users and we just use forwarders on our local DNS to external DNSwhich works fine as not much overhead in a DNS request...&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 15:31:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554327#M4299</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2023-08-18T15:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect split tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554464#M4300</link>
      <description>&lt;P&gt;In the GW, under agent, client settings; we do a check on what hide NAT address the user has to determine if they are onprem or at home.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For our usecase the internal DNS should be used in all cases. But it would make sense to me to not send the DNS queries/replies through the tunnel when onprem, as the DNS servers are also onprem...&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 06:24:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554464#M4300</guid>
      <dc:creator>wazaka</dc:creator>
      <dc:date>2023-08-21T06:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect split tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554501#M4301</link>
      <description>&lt;P&gt;Yes but by design the GP client adds your DNS as a /32 to the routing table, as below I added a /32 exclusion from the tunnel but the GP modifies the metric to force DNS via the tunnel..&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Mick_Ball_0-1692617230749.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52952iD22BBF6DF12FD12E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Mick_Ball_0-1692617230749.png" alt="Mick_Ball_0-1692617230749.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So i added 10.250.1.41/32 to be excluded from the tunnel, it has been added to the routing table but with a metric of 36 so the metric of 1 will be used for your requests.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 11:34:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554501#M4301</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2023-08-21T11:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect split tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554502#M4302</link>
      <description>&lt;P&gt;So specifying an 'exclude /32 route' for the DNS, does the trick?&lt;/P&gt;
&lt;P&gt;I wonder why it is nowhere mentioned? I mean, if Palo forces the DNS to always go through the tunnel even why excluding the larger block, isn't this then a bad idea to mess with the split tunneling for DNS by adding that /32 route?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 11:41:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554502#M4302</guid>
      <dc:creator>wazaka</dc:creator>
      <dc:date>2023-08-21T11:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect split tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554525#M4304</link>
      <description>&lt;P&gt;no sorry it doesn't work that way...&amp;nbsp;&amp;nbsp; GP client sets a lower metric so traffic still goes via tunnel&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 15:04:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554525#M4304</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2023-08-21T15:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect split tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554537#M4306</link>
      <description>&lt;P&gt;The only way I can get this to remain outside of the tunnel is by modifying the windows routing table.&lt;/P&gt;
&lt;P&gt;route delete 10.10.10.&amp;lt;DNS Server&amp;gt; mask 255.255.255.255&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can be done via a gp post script&amp;nbsp; but see no harm in tunneling such requests via the tunnel so may not be worth bothering.&lt;/P&gt;
&lt;P&gt;pretty sure you could also use an alias ip routed address and nat to real server as it traverses the Palo.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But at least we know that the reason it remains within the tunnel is because GlobalProtect adds it as a host address to the routing table which because of the metric... overides your split tunnel rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 16:30:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554537#M4306</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2023-08-21T16:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: Globalprotect split tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554546#M4307</link>
      <description>&lt;P&gt;Hello there, thank you for helping on this, I really appreciate it. If it is not possible easily then that’s the answer I guess! Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 17:01:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-split-tunneling/m-p/554546#M4307</guid>
      <dc:creator>wazaka</dc:creator>
      <dc:date>2023-08-21T17:01:48Z</dc:date>
    </item>
  </channel>
</rss>

