<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enabling S2S VPN based tools accessible on Global Protect VPN in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enabling-s2s-vpn-based-tools-accessible-on-global-protect-vpn/m-p/1229557#M6785</link>
    <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/208054281"&gt;@PA_User10&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I would recommend to use non-overlapping IP pools for your S2S,GlobalProtect client pool, and office. If you need to stay within the 172.21.0.0/16 range, you can break up the /16 as follows:&lt;BR /&gt;&lt;BR /&gt;Office Subnet: 172.16.0.0/23&lt;/P&gt;
&lt;P&gt;GlobalProtect client pool: 172.16.10.0/24&lt;/P&gt;
&lt;P&gt;S2S Subnet: 172.16.20.0/24&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This keeps your design within your 172.16.0.0/16 block while giving you dedicated subnets for each function.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 21 May 2025 00:16:30 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2025-05-21T00:16:30Z</dc:date>
    <item>
      <title>Enabling S2S VPN based tools accessible on Global Protect VPN</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enabling-s2s-vpn-based-tools-accessible-on-global-protect-vpn/m-p/1229270#M6781</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to use the same subnet used in the office(on which S2S VPN is configured) to be configured for Global Protect VPN so that users will be able to access the S2S VPN tools.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For ex:- Office subnet- 172.21.0.0/16&lt;/P&gt;&lt;P&gt;S2S VPN Subnet- 172.21.10.0/24&lt;/P&gt;&lt;P&gt;Global Protect VPN-172.21.10.100-172.21.10.200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly suggest regarding the possibilities.&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2025 16:34:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enabling-s2s-vpn-based-tools-accessible-on-global-protect-vpn/m-p/1229270#M6781</guid>
      <dc:creator>PA_User10</dc:creator>
      <dc:date>2025-05-16T16:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling S2S VPN based tools accessible on Global Protect VPN</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enabling-s2s-vpn-based-tools-accessible-on-global-protect-vpn/m-p/1229557#M6785</link>
      <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/208054281"&gt;@PA_User10&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I would recommend to use non-overlapping IP pools for your S2S,GlobalProtect client pool, and office. If you need to stay within the 172.21.0.0/16 range, you can break up the /16 as follows:&lt;BR /&gt;&lt;BR /&gt;Office Subnet: 172.16.0.0/23&lt;/P&gt;
&lt;P&gt;GlobalProtect client pool: 172.16.10.0/24&lt;/P&gt;
&lt;P&gt;S2S Subnet: 172.16.20.0/24&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This keeps your design within your 172.16.0.0/16 block while giving you dedicated subnets for each function.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 00:16:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enabling-s2s-vpn-based-tools-accessible-on-global-protect-vpn/m-p/1229557#M6785</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-05-21T00:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling S2S VPN based tools accessible on Global Protect VPN</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enabling-s2s-vpn-based-tools-accessible-on-global-protect-vpn/m-p/1229756#M6794</link>
      <description>&lt;P&gt;This is perfectly possible but does come with a bunch of caveats&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you'll need to have the tunnel interface in the trust zone so the ip pool can be part of the same broadcast domain as the physical network (the firewall will take care of that if the interface is in the same zone)&lt;/P&gt;
&lt;P&gt;your on-prem DHCP (firewall or AD typically) will need to have a blank reservation for the entire IP pool so it does not assign those IPs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;alternatively: have you considered source NAT ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That way you can have the ip pool be a non-verlapping subnet, put the tunnel interface in a different zone, and simply source-NAT outbound S2S connections behind an office IP&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 08:22:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enabling-s2s-vpn-based-tools-accessible-on-global-protect-vpn/m-p/1229756#M6794</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-05-22T08:22:29Z</dc:date>
    </item>
  </channel>
</rss>

