<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Azure Virtual Desktops integration with Global Protect nightmare in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-virtual-desktops-integration-with-global-protect-nightmare/m-p/1237319#M7002</link>
    <description>&lt;P&gt;Having an enormously hard time implementing Global Protect on Azure.&amp;nbsp; No matter what happens, after installing and executing Global Protect on Azure virtual desktop, VPN tunnel 100% severs RDP communication to the Azure virtual desktop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Had Palo Alto check routing and network and it appears to be sound.&amp;nbsp; Recommendations were: 1) Network =&amp;gt;Global Protect =&amp;gt;Gateways =&amp;gt; Authentication (Allow authentication with&amp;nbsp; User credentials or client certificate) changed to Yes (User Credentials or Client certificate required) 2) Network =&amp;gt; global Protect =&amp;gt; Portals =&amp;gt; Agent =&amp;gt; Agent config =&amp;gt; Pre-Logon Tunnel Rename Timeout (sec) (Windows Only) changed to -1, and 3) Network =&amp;gt; Global Protect =&amp;gt; Gateways =&amp;gt; Agent =&amp;gt; Client Settings =&amp;gt; Config =&amp;gt; Split Tunnel entered the /24 subnet of the client&amp;nbsp; &amp;nbsp;workstation&amp;nbsp; inorder to&amp;nbsp; RDP to the Azure Virtual desktop in the &amp;lt;EXCLUDE&amp;gt;&amp;nbsp; section.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, far all recommendations are not appearing to work and everytime the tunnel is executed by excluding the /24 subnet that the client workstation is trying to RDP to Azure Virtual desktop, the tunnel but kills the RDP connection.&amp;nbsp; Only way to recover Azure Virtual Desktop is to totally destroy the Virtual Desktop and recreate it.&amp;nbsp; In addition, instead of putting the subnet of where the workstation RDP'ing to the Azure Virtual Desktop, also tried to use 0.0.0.0/0 default gateway as another alternative in the &amp;lt;EXCLUDE&amp;gt; section to no avail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any advice and or recommendations would be enormously appreciated!!!!!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Sep 2025 02:29:42 GMT</pubDate>
    <dc:creator>wechang</dc:creator>
    <dc:date>2025-09-05T02:29:42Z</dc:date>
    <item>
      <title>Azure Virtual Desktops integration with Global Protect nightmare</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-virtual-desktops-integration-with-global-protect-nightmare/m-p/1237319#M7002</link>
      <description>&lt;P&gt;Having an enormously hard time implementing Global Protect on Azure.&amp;nbsp; No matter what happens, after installing and executing Global Protect on Azure virtual desktop, VPN tunnel 100% severs RDP communication to the Azure virtual desktop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Had Palo Alto check routing and network and it appears to be sound.&amp;nbsp; Recommendations were: 1) Network =&amp;gt;Global Protect =&amp;gt;Gateways =&amp;gt; Authentication (Allow authentication with&amp;nbsp; User credentials or client certificate) changed to Yes (User Credentials or Client certificate required) 2) Network =&amp;gt; global Protect =&amp;gt; Portals =&amp;gt; Agent =&amp;gt; Agent config =&amp;gt; Pre-Logon Tunnel Rename Timeout (sec) (Windows Only) changed to -1, and 3) Network =&amp;gt; Global Protect =&amp;gt; Gateways =&amp;gt; Agent =&amp;gt; Client Settings =&amp;gt; Config =&amp;gt; Split Tunnel entered the /24 subnet of the client&amp;nbsp; &amp;nbsp;workstation&amp;nbsp; inorder to&amp;nbsp; RDP to the Azure Virtual desktop in the &amp;lt;EXCLUDE&amp;gt;&amp;nbsp; section.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, far all recommendations are not appearing to work and everytime the tunnel is executed by excluding the /24 subnet that the client workstation is trying to RDP to Azure Virtual desktop, the tunnel but kills the RDP connection.&amp;nbsp; Only way to recover Azure Virtual Desktop is to totally destroy the Virtual Desktop and recreate it.&amp;nbsp; In addition, instead of putting the subnet of where the workstation RDP'ing to the Azure Virtual Desktop, also tried to use 0.0.0.0/0 default gateway as another alternative in the &amp;lt;EXCLUDE&amp;gt; section to no avail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any advice and or recommendations would be enormously appreciated!!!!!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 02:29:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-virtual-desktops-integration-with-global-protect-nightmare/m-p/1237319#M7002</guid>
      <dc:creator>wechang</dc:creator>
      <dc:date>2025-09-05T02:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Virtual Desktops integration with Global Protect nightmare</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-virtual-desktops-integration-with-global-protect-nightmare/m-p/1237420#M7005</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/146535"&gt;@wechang&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Can you detail a little bit more what the traffic flow actually looks like? If I understand things properly:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You're installing GlobalProtect as an agent on the Azure VDI machines.&lt;/LI&gt;
&lt;LI&gt;You have another client machine that is&amp;nbsp;&lt;EM&gt;already&amp;nbsp;&lt;/EM&gt;using GlobalProtect to the same portal/gateway?&lt;/LI&gt;
&lt;LI&gt;When you attempt to RDP to the Azure VDI machine (which is connected to GlobalProtect) from a client machine (which is connected to GlobalProtect) you cannot form a VPN session?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't have experience using Azure Virtual Desktop, but just looking at the configuration briefly it looks like your actual session hosts are placed on a traditional VNet. Is there a reason that you aren't just using a tunnel on either a VM-series or a simple VPN Gateway?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 20:37:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-virtual-desktops-integration-with-global-protect-nightmare/m-p/1237420#M7005</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-09-05T20:37:54Z</dc:date>
    </item>
  </channel>
</rss>

