<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo Alto Global Protect clients failing to connect intermittently in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/palo-alto-global-protect-clients-failing-to-connect/m-p/1250467#M7317</link>
    <description>&lt;P&gt;We have Global Protect installed on all of our corporate laptops and our users fall into one of two scenarios:&lt;BR /&gt;1. They are a remote user; cannot reach the host we have defined for Internal Host Detection and are required to authenticate to the Gateway with DUO.&lt;BR /&gt;2. They are an "on-site" and can reach the host we set for Internal Host Detection and Internal Host Detection should disable the Global Protect services.&lt;/P&gt;
&lt;P&gt;The issue we are seeing is that "on-site" users are able to reach the host we have set for Internal Host Detection but are being prompted to authenticate to the Global Protect Gateway to establish the tunnel. The Internal Host detection should be preventing this as I understand it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;The issue was observed only for a small subset of users, not all on‑site users.&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;The impact is that "on-site" users are not enrolled for our Gateway Authentication via Duo and will not be able to authenticate. In the field this shows that at times the host will successfully detect it is Internal and then intermittently fail to detect and prompt for a certificate and credentials to Authenticate to the tunnel.&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Mar 2026 18:38:22 GMT</pubDate>
    <dc:creator>R.Singh384240</dc:creator>
    <dc:date>2026-03-18T18:38:22Z</dc:date>
    <item>
      <title>Palo Alto Global Protect clients failing to connect intermittently</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/palo-alto-global-protect-clients-failing-to-connect/m-p/1250467#M7317</link>
      <description>&lt;P&gt;We have Global Protect installed on all of our corporate laptops and our users fall into one of two scenarios:&lt;BR /&gt;1. They are a remote user; cannot reach the host we have defined for Internal Host Detection and are required to authenticate to the Gateway with DUO.&lt;BR /&gt;2. They are an "on-site" and can reach the host we set for Internal Host Detection and Internal Host Detection should disable the Global Protect services.&lt;/P&gt;
&lt;P&gt;The issue we are seeing is that "on-site" users are able to reach the host we have set for Internal Host Detection but are being prompted to authenticate to the Global Protect Gateway to establish the tunnel. The Internal Host detection should be preventing this as I understand it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;The issue was observed only for a small subset of users, not all on‑site users.&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;The impact is that "on-site" users are not enrolled for our Gateway Authentication via Duo and will not be able to authenticate. In the field this shows that at times the host will successfully detect it is Internal and then intermittently fail to detect and prompt for a certificate and credentials to Authenticate to the tunnel.&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 18:38:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/palo-alto-global-protect-clients-failing-to-connect/m-p/1250467#M7317</guid>
      <dc:creator>R.Singh384240</dc:creator>
      <dc:date>2026-03-18T18:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Global Protect clients failing to connect intermittently</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/palo-alto-global-protect-clients-failing-to-connect/m-p/1250473#M7318</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/433906391"&gt;@R.Singh384240&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1386" data-start="1300"&gt;Could you share the &lt;STRONG data-end="1334" data-start="1320"&gt;PanGPS.log&lt;/STRONG&gt; from an affected user while the issue is occurring?&lt;/P&gt;
&lt;P data-end="1386" data-start="1300"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1662" data-start="1388"&gt;I’d first like to confirm whether IHD is succeeding consistently during the failure. In the logs, there may be &lt;STRONG data-end="1541" data-start="1529"&gt;DnsQuery&lt;/STRONG&gt; entries and return codes that can help show whether the client is intermittently failing to identify itself as internal.&lt;/P&gt;
&lt;P data-end="1662" data-start="1388"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1722" data-start="1664"&gt;Also, could you confirm a couple of configuration details:&lt;/P&gt;
&lt;P data-end="1722" data-start="1664"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1722" data-start="1664"&gt;Do you have any internal gateways configured?&lt;/P&gt;
&lt;P data-end="1722" data-start="1664"&gt;Is the app set to Always-On?&lt;/P&gt;
&lt;P data-end="1722" data-start="1664"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="2077" data-start="1811"&gt;I ask because internal gateways are optional. If IHD succeeds, the client can either connect to an internal gateway if one is configured, or simply remain in an internal state without bringing up the external VPN tunnel.&lt;/P&gt;
&lt;P data-end="2077" data-start="1811"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="2555" data-start="2079"&gt;If Always-On is enabled, there is also a documented behavior where, if a user moves from an external network back to the internal network before the Automatic Restoration of VPN Connection Timeout expires, GlobalProtect may restore the last known external gateway without re-running network discovery immediately. In that case, having the user select Refresh Connection / Rediscover Network can help force a new IHD check.&lt;/P&gt;
&lt;P data-end="2555" data-start="2079"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="2788" data-start="2557"&gt;If the logs show that IHD itself is working normally, then it may be worth testing whether reducing or setting the Automatic Restoration of VPN Connection Timeout to 0 changes the behavior.&lt;/P&gt;
&lt;DIV id="tinyMceEditor_12e026e7fdb516JayGolf_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 22:54:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/palo-alto-global-protect-clients-failing-to-connect/m-p/1250473#M7318</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2026-03-18T22:54:18Z</dc:date>
    </item>
  </channel>
</rss>

