<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GlobalProtect Always on Network Connection Forced in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-network-connection-forced/m-p/1217797#M6423</link>
    <description>&lt;P&gt;We are in the testing phase for GP Always on.&amp;nbsp; I currently have forced network connection with internal host detection and it is working fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did a quick search and did not find the configuration tweaks that would account for Always On / Forced Connection when the portal is unavailable.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use case...I have a user travelling abroad.&amp;nbsp; When they are at their destination , they will send me their public ip to whitelist for GlobalProtect access.&amp;nbsp;&amp;nbsp;&amp;nbsp; If she was in the Always On /Forced Network connection policy...does that mean that her lap would basically be bricked as far as network.&amp;nbsp; She is in a geo blocked country...so no access to Portal without a whitelist entry on my part.&amp;nbsp;&amp;nbsp; I am sure there is a configuration combination that would allow for this...I want to make sure that the users' Office 365 apps will at least work so they can communicate even if the GP app cannot reach the portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Thu, 30 Jan 2025 13:35:13 GMT</pubDate>
    <dc:creator>JoeBailey</dc:creator>
    <dc:date>2025-01-30T13:35:13Z</dc:date>
    <item>
      <title>GlobalProtect Always on Network Connection Forced</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-network-connection-forced/m-p/1217797#M6423</link>
      <description>&lt;P&gt;We are in the testing phase for GP Always on.&amp;nbsp; I currently have forced network connection with internal host detection and it is working fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did a quick search and did not find the configuration tweaks that would account for Always On / Forced Connection when the portal is unavailable.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use case...I have a user travelling abroad.&amp;nbsp; When they are at their destination , they will send me their public ip to whitelist for GlobalProtect access.&amp;nbsp;&amp;nbsp;&amp;nbsp; If she was in the Always On /Forced Network connection policy...does that mean that her lap would basically be bricked as far as network.&amp;nbsp; She is in a geo blocked country...so no access to Portal without a whitelist entry on my part.&amp;nbsp;&amp;nbsp; I am sure there is a configuration combination that would allow for this...I want to make sure that the users' Office 365 apps will at least work so they can communicate even if the GP app cannot reach the portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 13:35:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-network-connection-forced/m-p/1217797#M6423</guid>
      <dc:creator>JoeBailey</dc:creator>
      <dc:date>2025-01-30T13:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Always on Network Connection Forced</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-network-connection-forced/m-p/1218793#M6427</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/170734"&gt;@JoeBailey&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Correct. Do you have email hosted on-premise or are you using Exchange Online? You'll want to exclude the FQDNs as specified &lt;A href="https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/enforce-globalprotect-connections-with-fqdn-exclusions" target="_self"&gt;HERE&lt;/A&gt;. If you're using Exchange Online due to the number of dependencies required you'll want to look at Microsoft's 365 lists and select what FQDNs you'll need to allow from &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide" target="_self"&gt;HERE&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Personally when we encounter these sort of issues when people travel we don't allow them to bring their issued device. Depending on the country we either just send them with an unmanaged device for simple email access, or we send them with a cheaper device that is disposed of after they return.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2025 01:35:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-always-on-network-connection-forced/m-p/1218793#M6427</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-01-31T01:35:02Z</dc:date>
    </item>
  </channel>
</rss>

