<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Split DNS Stoped working in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356796#M513</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83896"&gt;@TheRealAndrewBrown&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So far never saw this behaviour.&lt;/P&gt;
&lt;P&gt;Which GP version you are running.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;first thing I will do is pull the logs from the agent and check the GPS logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Oct 2020 17:40:03 GMT</pubDate>
    <dc:creator>MP18</dc:creator>
    <dc:date>2020-10-16T17:40:03Z</dc:date>
    <item>
      <title>Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356767#M512</link>
      <description>&lt;P&gt;Hi All!&lt;/P&gt;&lt;P&gt;Last week I was able to roll out split DNS to our production firewalls. This was tested successfully on a firewall in pre-prod and then moved to prod firewalls with same result.&lt;/P&gt;&lt;P&gt;Suddenly this morning queries to explicitly excluded domains are no longer being split. I've verified the configuration is good. I went back to pre-prod firewall and the same situation! This was a previously working config and no changes have been made since. I've verified this by using Wireshark on my local machine while connected to Global Protect. I don't see any DNS queries exiting the local adapter for excluded domains.&lt;/P&gt;&lt;P&gt;Previous to today I was able to see all DNS queries to excluded domains come through Wireshark when monitoring the local NIC.&lt;/P&gt;&lt;P&gt;Has anyone else experienced this problem?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 15:28:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356767#M512</guid>
      <dc:creator>TheRealAndrewBrown</dc:creator>
      <dc:date>2020-10-16T15:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356796#M513</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83896"&gt;@TheRealAndrewBrown&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So far never saw this behaviour.&lt;/P&gt;
&lt;P&gt;Which GP version you are running.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;first thing I will do is pull the logs from the agent and check the GPS logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 17:40:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356796#M513</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-10-16T17:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356797#M514</link>
      <description>&lt;P&gt;Thanks MP18. I reviewed them this morning. While I see all the domains that are supposed to be excepted from the tunnel, I also see a lot of errors stating;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(T10796)Debug(1844): 10/15/20 00:33:28:575 Retry DnsQuery.&lt;BR /&gt;(T10796)Debug(1862): 10/15/20 00:33:28:575 Already takes 90 seconds for all dns queries.&lt;BR /&gt;(T10796)Debug(1864): 10/15/20 00:33:28:575 Exceeds 1 minute. Do not retry DnsQuery&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm also seeing a lot of;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(T26916)Debug( 914): 10/15/20 08:25:19:427 HandleDnsCallback: failed to parse dns req packet.&lt;BR /&gt;(T26916)Debug( 914): 10/15/20 08:25:20:031 HandleDnsCallback: failed to parse dns req packet.&lt;BR /&gt;(T26916)Debug( 914): 10/15/20 08:25:46:423 HandleDnsCallback: failed to parse dns req packet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However I have not been able to see in the logs what DNS server is unreachable or why it could not parse DNS packet. Still combing through the logs and I've logged a ticket with PA Support&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 17:50:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356797#M514</guid>
      <dc:creator>TheRealAndrewBrown</dc:creator>
      <dc:date>2020-10-16T17:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356799#M516</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83896"&gt;@TheRealAndrewBrown&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you do nslookup for the gateway FQDN from the GP user.&lt;/P&gt;
&lt;P&gt;External Gateway DNS server should be reachable and it should resolve from the FQDN for portal &amp;nbsp;once GP agent is connected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 18:00:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356799#M516</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-10-16T18:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356800#M517</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When connected to GP Gateway and I perform an nslookup to the external FQDN of the gateway (vpn.example.com). It doesn't resolve. Example.com is one of the domains that we tunnel through the VPN for resolution. However we don't have an internal DNS record on our AD servers for vpn.example.com I am a little unclear as to what you are asking for so I hope this was the right answer.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 18:06:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356800#M517</guid>
      <dc:creator>TheRealAndrewBrown</dc:creator>
      <dc:date>2020-10-16T18:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356801#M518</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83896"&gt;@TheRealAndrewBrown&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are pushing &amp;nbsp;DNS server info via Gateway to Agent then it should resolve the names for the FQDN and also for domains which you&lt;/P&gt;
&lt;P&gt;wanna access via tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our setup we have infoblox &amp;nbsp;in our internal DNS zone and we have configured Gateway with Internal DNS server IP.&lt;/P&gt;
&lt;P&gt;All our servers or domains have records in the Internal zone.&lt;/P&gt;
&lt;P&gt;Also Portal FQDN has DNS host record in Internal Zone of Infoblox.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When we connect to Gateway we can resolve all the domains and also Gateway address as our DNS server in Internal zone has all the records.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 18:16:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356801#M518</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-10-16T18:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356816#M520</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Used infoblox in the past it was a neat tool...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for Global Protect that's how I have it configured as well. All internal domains are set to be resolved by our internal AD servers. The only item we don't have configured is an internal record for vpn.example.com. However I fail to see how this could suddenly break the split tunnel DNS resolution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Side note: I'm very surprised that GP only has an opt-out mechanism for DNS queries and it maxes at 300. Just to exclude all DNS entires for Office365 traffic is currently 111 entries. Generally I prefer to exclude all domains except internal corporate domains to save on bandwidth and provide better geo-location for DNS&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 18:32:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/356816#M520</guid>
      <dc:creator>TheRealAndrewBrown</dc:creator>
      <dc:date>2020-10-16T18:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/359663#M536</link>
      <description>&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After investigation we deemed this to be a licensing issue. After speaking our PA rep, he forwarded some documentation stating that split tunnel DNS is a licensed feature. In order to use it, you need to purchase the "Global Protect Gateway" License.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However after installing the appropriate license we attempted to roll forward last night and are still experiencing the same issues as initially noted. I have confirmed this is working on a PA-220 Lab unit but not a failover pair of PA-3050.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll continue to post updates as we progress.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone else seen this same behaviour?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 13:44:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/359663#M536</guid>
      <dc:creator>TheRealAndrewBrown</dc:creator>
      <dc:date>2020-10-29T13:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/359669#M537</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83896"&gt;@TheRealAndrewBrown&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the update.&lt;/P&gt;
&lt;P&gt;So far never seen this behaviour.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 14:15:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/359669#M537</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-10-29T14:15:27Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/360308#M543</link>
      <description>&lt;P&gt;Thanks MP,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apparently Palo Alto support has yet to see this problem either. They have been reviewing the configuration and tech support files as well as global protect log files from both the production environment and the lab environment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also had PA Support create a separate GP profile from scratch in the prod environment and it still failed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Side note: it IS working in the lab environment. I had made a mistake in testing the lab environment last week.)&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 18:40:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/360308#M543</guid>
      <dc:creator>TheRealAndrewBrown</dc:creator>
      <dc:date>2020-11-02T18:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/360890#M548</link>
      <description>&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;Palo Alto support has confirmed the same behaviour in their lab environment. DNS requests to specific domains that are configured to be explicitly excluded from the VPN tunnel are still being tunnelled across Global Protect to the firewall.&lt;/P&gt;&lt;P&gt;This has been escalated within PA support for further investigation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for those of you fighting the same problem, this may be a bug. I will post another update as soon as I know more.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 18:11:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/360890#M548</guid>
      <dc:creator>TheRealAndrewBrown</dc:creator>
      <dc:date>2020-11-05T18:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/381316#M818</link>
      <description>&lt;P&gt;The issue was finally resolved in December and Split DNS is working as it should. However there was more than fix that was involved. For anyone stuck in the same situation I was, hopefully the information below will help.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;First problem was licensing. while licensing is not required for the basic features of Global Protect to work, split DNS requires the Global Protect Gateway license. Without it, all DNS entries are forward to whatever DNS servers you configure on the gateway. No error is given when you configure it without a license and I could find no documentation about this license via google, or internal PA support documents. I had to speak to our rep who then sent me a document.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;There is a bug in Global Protect 5.2.2. The bug was sending causes the Global Protect client to send DNS queries out all local adapters including the VPN tunnel adapter on the user's computer. Upgrading to 5.2.3 resolved this problem&lt;/LI&gt;&lt;LI&gt;If you want to exclude all traffic from the VPN tunnel with the exception of your internal IP ranges and internal DNS records, include those items in your "included" items for both the Access Route and "Include Domain". Next, leave the exclude columns empty for both Access route and "Include Domain". This will ensure all public Internet traffic and DNS lookups will go out the local NIC on the user's computer.&lt;/LI&gt;&lt;LI&gt;If you're not using IPv6, disable it on the end user's computer. Global Protect will prefer IPv6 for DNS lookups. Some of our user's had IPv6 enabled on their internal home network and Global Protect began sending DNS queries for internal corporate records over IPv6 on the local NIC instead of over the VPN tunnel to the corporate DNS servers&lt;/LI&gt;&lt;LI&gt;Ensure in the "App config" in the portal that "Resolve All FQDNs Using DNS Servers Assigned by the Tunnel (Windows Only)" option is set to "no".&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Palo Alto has thus far done a poor job on the documentation to implement split DNS. About 1/3 of information is spread out across multiple documents which can be hard to track down. The remaining 2/3s of the information needed to configure this required a support ticket to Palo Alto in order to get he full picture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If anyone from PA reads this forum please publish a complete guide on how to completely configure this feature. It would have saved me a lot of frustration and phone calls to support.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 21:04:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/381316#M818</guid>
      <dc:creator>TheRealAndrewBrown</dc:creator>
      <dc:date>2021-01-21T21:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/381317#M819</link>
      <description>&lt;P&gt;The issue was finally resolved in December and Split DNS is working as it should. However there was more than fix that was involved. For anyone stuck in the same situation I was, hopefully the information below will help.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;First problem was licensing. while licensing is not required for the basic features of Global Protect to work, split DNS requires the Global Protect Gateway license. Without it, all DNS entries are forward to whatever DNS servers you configure on the gateway. No error is given when you configure it without a license and I could find no documentation about this license via google, or internal PA support documents. I had to speak to our rep who then sent me a document.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;There is a bug in Global Protect 5.2.2. The bug was sending causes the Global Protect client to send DNS queries out all local adapters including the VPN tunnel adapter on the user's computer. Upgrading to 5.2.3 resolved this problem&lt;/LI&gt;&lt;LI&gt;If you want to exclude all traffic from the VPN tunnel with the exception of your internal IP ranges and internal DNS records, include those items in your "included" items for both the Access Route and "Include Domain". Next, leave the exclude columns empty for both Access route and "Include Domain". This will ensure all public Internet traffic and DNS lookups will go out the local NIC on the user's computer.&lt;/LI&gt;&lt;LI&gt;If you're not using IPv6, disable it on the end user's computer. Global Protect will prefer IPv6 for DNS lookups. Some of our user's had IPv6 enabled on their internal home network and Global Protect began sending DNS queries for internal corporate records over IPv6 on the local NIC instead of over the VPN tunnel to the corporate DNS servers&lt;/LI&gt;&lt;LI&gt;Ensure in the "App config" in the portal that "Resolve All FQDNs Using DNS Servers Assigned by the Tunnel (Windows Only)" option is set to "no".&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Palo Alto has thus far done a poor job on the documentation to implement split DNS. About 1/3 of information is spread out across multiple documents which can be hard to track down. The remaining 2/3s of the information needed to configure this required a support ticket to Palo Alto in order to get he full picture.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 21:06:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/381317#M819</guid>
      <dc:creator>TheRealAndrewBrown</dc:creator>
      <dc:date>2021-01-21T21:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: Split DNS Stoped working</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/402637#M1243</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the detailed steps in getting Split Tunnel working, I am stuck at the same part but I am running OSX on Macbooks and this option does state (windows only) do you know how this is achieved with OSX.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've configured everything as you mentioned (except the App feature for all FQDNS,since it's Windows Only)&lt;/P&gt;&lt;P&gt;But when connected to VPN, I see that all public queries done with nslookup are done by the configured DNS Servers in the GP Settings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you and best regards&lt;/P&gt;&lt;P&gt;Duque&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 08:52:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/split-dns-stoped-working/m-p/402637#M1243</guid>
      <dc:creator>AlexNC</dc:creator>
      <dc:date>2021-04-28T08:52:29Z</dc:date>
    </item>
  </channel>
</rss>

