<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exclude Video Traffic - Global Protect in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/exclude-video-traffic-global-protect/m-p/352316#M453</link>
    <description>&lt;P&gt;For the exclude video feature to work, SSL decryption is required. Please make sure that the sessions are being decrypted via the traffic logs.&lt;BR /&gt;I also noticed that this is an HTTP2 parent session that timed out. Is this happening with HTTP2 sessions only?&amp;nbsp;&lt;BR /&gt;If the session is being decrypted, have you tried to strip ALPN under Client Extensions under the decryption profile? This will force the session to use HTTP1.1&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Please have a look at this doc:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/ta-p/321075" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/ta-p/321075&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You can also check the PanGPS.log on the client-side to see if exclude video feature is being applied. Look for the line below&lt;/P&gt;&lt;PRE&gt;&amp;lt;exclude-video-redirect&amp;gt;yes&amp;lt;/exclude-video-redirect&amp;gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;Hope that helps!&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 25 Sep 2020 23:36:26 GMT</pubDate>
    <dc:creator>khans</dc:creator>
    <dc:date>2020-09-25T23:36:26Z</dc:date>
    <item>
      <title>Exclude Video Traffic - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/exclude-video-traffic-global-protect/m-p/351357#M435</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've setup our global protect to exclude all video traffic, using this guide:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/globalprotect-gateways/split-tunnel-traffic-on-globalprotect-gateways/exclude-video-traffic-from-the-globalprotect-vpn-tunnel.html" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/globalprotect-gateways/split-tunnel-traffic-on-globalprotect-gateways/exclude-video-traffic-from-the-globalprotect-vpn-tunnel.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall has all the relevant licenses required (GP Portal/Gateway license)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a session that should have been excluded but as you can see by the 'tracker stage firewall: Age out', this should be 'tracker stage firewall: split tunnel' to my knowledge. All reference to 'anon' below is because i desensitized the content.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;anon@PA-3020-ha1(active)&amp;gt; show session id 223050

Session          223050

        c2s flow:
                source:      172.16.6.7 [global-protect]
                dst:         anon
                proto:       6
                sport:       1079            dport:      443
                state:       INIT            type:       INNR
                src user:    anon
                dst user:    unknown
                qos node:    ethernet1/3, qos member N/A Qid 0

        s2c flow:
                source:      anon [anon]
                dst:         anon
                proto:       6
                sport:       443             dport:      22186
                state:       INIT            type:       INNR
                src user:    unknown
                dst user:    anon
                qos node:    tunnel.5, qos member N/A Qid 0

        start time                           : Tue Sep 22 15:05:12 2020
        timeout                              : 3600 sec
        total byte count(c2s)                : 2470
        total byte count(s2c)                : 899
        layer7 packet count(c2s)             : 2
        layer7 packet count(s2c)             : 3
        vsys                                 : vsys1
        application                          : youtube-base
        rule                                 : Allow-Safe-Streaming-Services
        service timeout override(index)      : False
        session to be logged at end          : True
        session in session ager              : False
        session updated by HA peer           : False
        http/2 stream                        : True
        address/port translation             : source
        nat-rule                             : (vsys1)
        layer7 processing                    : enabled
        URL filtering enabled                : True
        URL category                         : streaming-media, low-risk
        parent session                       : 222905
        refresh parent session               : True
        session via syn-cookies              : False
        session terminated on host           : False
        session traverses tunnel             : True
        session terminate tunnel             : False
        captive portal session               : False
        ingress interface                    : tunnel.5
        egress interface                     : ethernet1/3
        session QoS rule                     : GP-Users-Streaming-Temp-Bypass-1 (class 2)
        tracker stage firewall               : Aged out
        end-reason                           : aged-out&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;Does anyone have any ideas on why this traffic isnt being excluded? From what I can tell the configuration is correct, but when we try to watch a youtube video for example, it simply attempts to load and never finishes.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2020 09:37:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/exclude-video-traffic-global-protect/m-p/351357#M435</guid>
      <dc:creator>KyranMendoza</dc:creator>
      <dc:date>2020-09-23T09:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude Video Traffic - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/exclude-video-traffic-global-protect/m-p/352316#M453</link>
      <description>&lt;P&gt;For the exclude video feature to work, SSL decryption is required. Please make sure that the sessions are being decrypted via the traffic logs.&lt;BR /&gt;I also noticed that this is an HTTP2 parent session that timed out. Is this happening with HTTP2 sessions only?&amp;nbsp;&lt;BR /&gt;If the session is being decrypted, have you tried to strip ALPN under Client Extensions under the decryption profile? This will force the session to use HTTP1.1&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Please have a look at this doc:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/ta-p/321075" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-articles/troubleshoot-split-tunnel-domain-amp-applications-and-exclude/ta-p/321075&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You can also check the PanGPS.log on the client-side to see if exclude video feature is being applied. Look for the line below&lt;/P&gt;&lt;PRE&gt;&amp;lt;exclude-video-redirect&amp;gt;yes&amp;lt;/exclude-video-redirect&amp;gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;Hope that helps!&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2020 23:36:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/exclude-video-traffic-global-protect/m-p/352316#M453</guid>
      <dc:creator>khans</dc:creator>
      <dc:date>2020-09-25T23:36:26Z</dc:date>
    </item>
  </channel>
</rss>

