<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect setup on Azure Palo Alto VM - No access to servers in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226198#M6669</link>
    <description>&lt;P&gt;&lt;SPAN&gt;did you create a user-defined route (UDR) in a route table and associate it with the internal subnet?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You need to redirect the 'default route' towards the firewall's private IP address to establish connectivity (or use hide NAT for all GP ip-pool towards your vnet's subnet)&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Apr 2025 10:25:12 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2025-04-10T10:25:12Z</dc:date>
    <item>
      <title>GlobalProtect setup on Azure Palo Alto VM - No access to servers</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226130#M6666</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I have a Azure Palo Alto VM setup with GlobalProtect access.&lt;/P&gt;
&lt;P&gt;I can successfully connect via GlobalProtect and connect to all resources on sites connected via IPSec Tunnels. However, I am not able to access anything on the local segment in Azure.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Can someone please provide some thoughts as to why this could be?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CMoore927039_1-1744224684715.png" style="width: 888px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67037i54521C9657E60E51/image-dimensions/888x533?v=v2" width="888" height="533" role="button" title="CMoore927039_1-1744224684715.png" alt="CMoore927039_1-1744224684715.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Apr 2025 18:52:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226130#M6666</guid>
      <dc:creator>C.Moore927039</dc:creator>
      <dc:date>2025-04-09T18:52:29Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect setup on Azure Palo Alto VM - No access to servers</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226198#M6669</link>
      <description>&lt;P&gt;&lt;SPAN&gt;did you create a user-defined route (UDR) in a route table and associate it with the internal subnet?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You need to redirect the 'default route' towards the firewall's private IP address to establish connectivity (or use hide NAT for all GP ip-pool towards your vnet's subnet)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 10:25:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226198#M6669</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-04-10T10:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect setup on Azure Palo Alto VM - No access to servers</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226216#M6671</link>
      <description>&lt;P&gt;Thanks for the reply. I updated the drawing with some more detail.&lt;BR /&gt;&lt;BR /&gt;I do have a Route Table poiting traffic to the &lt;STRONG&gt;Inside&lt;/STRONG&gt; interface of the Firewall. My servers can get out the Internet and I can connect to all resources attached to the IPSec Tunnels to and from my servers from behind my Azure Palo. The only issue is when I connect via GlobalProtect, I am unable to reach my servers on my 10.3.1.0/24 subnet. I even matched my GlobalProtect Pool to 10.3.1.0/24 with the same result.&lt;BR /&gt;&lt;BR /&gt;I appreciate any feedback.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CMoore927039_0-1744287474753.png" style="width: 931px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67045iD67557A1DFDB74E2/image-dimensions/931x624?v=v2" width="931" height="624" role="button" title="CMoore927039_0-1744287474753.png" alt="CMoore927039_0-1744287474753.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 12:26:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226216#M6671</guid>
      <dc:creator>C.Moore927039</dc:creator>
      <dc:date>2025-04-10T12:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect setup on Azure Palo Alto VM - No access to servers</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226234#M6674</link>
      <description>&lt;P&gt;Here are my static routes on the PA. I don't have a next hop to point my return traffic to other than the INSIDE interface on the PA. Any chance that plays a role in the issue?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CMoore927039_1-1744299504920.png" style="width: 864px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67052iDEBEE04E019B5AB7/image-dimensions/864x121?v=v2" width="864" height="121" role="button" title="CMoore927039_1-1744299504920.png" alt="CMoore927039_1-1744299504920.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 15:40:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226234#M6674</guid>
      <dc:creator>C.Moore927039</dc:creator>
      <dc:date>2025-04-10T15:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect setup on Azure Palo Alto VM - No access to servers</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226248#M6676</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I typically make the VPN users a different zone to help limit access etc. I would check the unified logs to see where the traffic is getting blocked. Also put your GP users on a different subnet, could make for weird routing issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 19:04:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226248#M6676</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2025-04-10T19:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect setup on Azure Palo Alto VM - No access to servers</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226278#M6677</link>
      <description>&lt;P&gt;How will the traffic return if I use a different subnet? I do not have any Layer 3 functionality.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2025 00:11:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226278#M6677</guid>
      <dc:creator>C.Moore927039</dc:creator>
      <dc:date>2025-04-11T00:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect setup on Azure Palo Alto VM - No access to servers</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226340#M6678</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The Palo Alto has this. Not sure what you mean by you dont have it?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2025 14:39:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226340#M6678</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2025-04-11T14:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect setup on Azure Palo Alto VM - No access to servers</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226382#M6680</link>
      <description>&lt;P&gt;I should have been clearer. Typically, on-prem there is a next-hop Layer 3 device where I would send traffic to for my inside network from the PA when I have more than 1 Network (VLAN). Since I only have the Virtual PA and the Azure defined networks, I was trying to figure out how I could accomplish this. I ended up creating a 3rd Interface on the PA with the new subnet, put all the relevant routing on the PA and Azure in place and it is all working now. I suspect you were correct. Having my GlobalProtect pool the same as my Inside LAN was probably causing routing issues.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CMoore927039_0-1744409914138.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67077iF6EEFDD8417654A0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="CMoore927039_0-1744409914138.png" alt="CMoore927039_0-1744409914138.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CMoore927039_1-1744409979601.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67078i1B4FFC3AACC86BE8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="CMoore927039_1-1744409979601.png" alt="CMoore927039_1-1744409979601.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there perhaps another way I could have resolved this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the help!&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2025 22:21:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-setup-on-azure-palo-alto-vm-no-access-to-servers/m-p/1226382#M6680</guid>
      <dc:creator>C.Moore927039</dc:creator>
      <dc:date>2025-04-11T22:21:18Z</dc:date>
    </item>
  </channel>
</rss>

