<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow OpenVPN while not allowing access to local network in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/allow-openvpn-while-not-allowing-access-to-local-network/m-p/1230739#M6819</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The only way I can see it being done is to do it on the OpenVPN systems individually. A more drastic approach would be to force all users to VPN into your environment and control traffic flow that way.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://skrzsecurity.net/zero-trust" target="_blank"&gt;https://skrzsecurity.net/zero-trust&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;</description>
    <pubDate>Mon, 02 Jun 2025 19:33:35 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2025-06-02T19:33:35Z</dc:date>
    <item>
      <title>Allow OpenVPN while not allowing access to local network</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/allow-openvpn-while-not-allowing-access-to-local-network/m-p/1230716#M6818</link>
      <description>&lt;P&gt;Hello, we have the need to stop split-tunneling all networks, and send all through GlobalProtect. However we notice when we connect, the local network a device is on is still added to the route table on a mac, and is accessible. We do see the option in GP to "No direct access to local network", and that works. However we have a business case to allow some sanctioned OpenVPN profiles outside of GlobalProtect. However with that "no direct access to local network" checked, all routing for those OpenVPN's when joined, are added to the GlobalProtect interface in our MAC routing tables.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a solution where we do not allow even local network traffic, but can allow a user to join a VPN outside of GlobalProtect, or within GlobalProtect, and allow that traffic to occur?&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 16:57:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/allow-openvpn-while-not-allowing-access-to-local-network/m-p/1230716#M6818</guid>
      <dc:creator>TravisFleming</dc:creator>
      <dc:date>2025-06-02T16:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allow OpenVPN while not allowing access to local network</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/allow-openvpn-while-not-allowing-access-to-local-network/m-p/1230739#M6819</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The only way I can see it being done is to do it on the OpenVPN systems individually. A more drastic approach would be to force all users to VPN into your environment and control traffic flow that way.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://skrzsecurity.net/zero-trust" target="_blank"&gt;https://skrzsecurity.net/zero-trust&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 19:33:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/allow-openvpn-while-not-allowing-access-to-local-network/m-p/1230739#M6819</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2025-06-02T19:33:35Z</dc:date>
    </item>
  </channel>
</rss>

