<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [SOLVED] GPUDATE /FORCE DOESN'T WORK WITH GLOBAL PROTECT in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/solved-gpudate-force-doesn-t-work-with-global-protect/m-p/1253712#M7373</link>
    <description>&lt;P&gt;Hello LiveCommunity Team!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I created this post to share my experience regarding an issue involving GlobalProtect users from Prisma Access who attempt to run &lt;STRONG&gt;gpupdate /force&lt;/STRONG&gt; to update GPO policies from the DC server, and who encounter the following error:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;CMD ERROR GPUPDATE /FORCE&lt;BR /&gt;&lt;/STRONG&gt;C:\WINDOWS\system32&amp;gt;gpupdate /force&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Updating policy...&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;User policy cannot be updated successfully due to the following errors:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Group policy cannot be processed because it cannot connect to a domain controller over the network. This condition may be temporary. A success message may be generated once the computer connects to the domain controller and the group policy is processed successfully. Contact your administrator.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Given this error, I checked the GlobalProtect source IP logs and everything appeared to be allowed.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Then, I tried pinging from an affected endpoint with a custom length and the DF "&lt;STRONG&gt;Don't Fragment&lt;/STRONG&gt;" bit active set to 1350 bytes, and the ping was dropped by fragmentation needed. as shown below:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;PING TEST WITH 1350 BYTES&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DanielSRomero_1-1778369596055.png" style="width: 756px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71375iF1CDDCF26D31AF08/image-dimensions/756x170?v=v2" width="756" height="170" role="button" title="DanielSRomero_1-1778369596055.png" alt="DanielSRomero_1-1778369596055.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Then I try it with 1300 Bytes as the payload and the ping works!&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;PING TEST WITH 1300 BYTES&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DanielSRomero_2-1778369715172.png" style="width: 755px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71376iCAD9B072C08BDF16/image-dimensions/755x234?v=v2" width="755" height="234" role="button" title="DanielSRomero_2-1778369715172.png" alt="DanielSRomero_2-1778369715172.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;So, as a test, I changed the Prisma Access GlobalProtect tunnel MTU to 1300 bytes (&lt;STRONG&gt;default is 1400 bytes&lt;/STRONG&gt;) and the &lt;STRONG&gt;gpupdate /force&lt;/STRONG&gt; command works!&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;PRISMA ACCESS GLOBAL PROTECT CONNECTION MTU ADJUSTMENT FROM 1400 TO 1300 BYTES&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DanielSRomero_4-1778370034165.png" style="width: 755px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71378iD073ABA1DAFA9A0F/image-dimensions/755x251?v=v2" width="755" height="251" role="button" title="DanielSRomero_4-1778370034165.png" alt="DanielSRomero_4-1778370034165.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;CMD GPUPDATE /FORCE SUCCESFULLY&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;C:\Users\pcmolinaa&amp;gt;gpupdate /force&lt;BR /&gt;Updating policy...&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The computer policy update completed successfully.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Conclusions:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;- Some device in the path, most likely the on-premises NGFW, was dropping the LDAP packets because it has a lower MTU and the packets are sent with the DF bit set, disabling IP fragmentation and forcing the drop by some peer.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your time, and I hope this information is helpful in your daily cybersecurity work. I would greatly appreciate your support by liking or accepting this as a useful post; it would help me a lot in becoming a CyberElite!&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Best Regards,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Daniel Romero&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Senior Network/Security Engineer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;PANW Partner&lt;BR /&gt;&lt;BR /&gt;&lt;LI-PRODUCT title="Prisma Access" id="Prisma_Access"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;LI-PRODUCT title="NGFW" id="NGFW"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;LI-PRODUCT title="GlobalProtect" id="GlobalProtect"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 May 2026 00:08:09 GMT</pubDate>
    <dc:creator>DanielS.Romero</dc:creator>
    <dc:date>2026-05-10T00:08:09Z</dc:date>
    <item>
      <title>[SOLVED] GPUDATE /FORCE DOESN'T WORK WITH GLOBAL PROTECT</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/solved-gpudate-force-doesn-t-work-with-global-protect/m-p/1253712#M7373</link>
      <description>&lt;P&gt;Hello LiveCommunity Team!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I created this post to share my experience regarding an issue involving GlobalProtect users from Prisma Access who attempt to run &lt;STRONG&gt;gpupdate /force&lt;/STRONG&gt; to update GPO policies from the DC server, and who encounter the following error:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;CMD ERROR GPUPDATE /FORCE&lt;BR /&gt;&lt;/STRONG&gt;C:\WINDOWS\system32&amp;gt;gpupdate /force&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Updating policy...&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;User policy cannot be updated successfully due to the following errors:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Group policy cannot be processed because it cannot connect to a domain controller over the network. This condition may be temporary. A success message may be generated once the computer connects to the domain controller and the group policy is processed successfully. Contact your administrator.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Given this error, I checked the GlobalProtect source IP logs and everything appeared to be allowed.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Then, I tried pinging from an affected endpoint with a custom length and the DF "&lt;STRONG&gt;Don't Fragment&lt;/STRONG&gt;" bit active set to 1350 bytes, and the ping was dropped by fragmentation needed. as shown below:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;PING TEST WITH 1350 BYTES&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DanielSRomero_1-1778369596055.png" style="width: 756px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71375iF1CDDCF26D31AF08/image-dimensions/756x170?v=v2" width="756" height="170" role="button" title="DanielSRomero_1-1778369596055.png" alt="DanielSRomero_1-1778369596055.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Then I try it with 1300 Bytes as the payload and the ping works!&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;PING TEST WITH 1300 BYTES&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DanielSRomero_2-1778369715172.png" style="width: 755px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71376iCAD9B072C08BDF16/image-dimensions/755x234?v=v2" width="755" height="234" role="button" title="DanielSRomero_2-1778369715172.png" alt="DanielSRomero_2-1778369715172.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;So, as a test, I changed the Prisma Access GlobalProtect tunnel MTU to 1300 bytes (&lt;STRONG&gt;default is 1400 bytes&lt;/STRONG&gt;) and the &lt;STRONG&gt;gpupdate /force&lt;/STRONG&gt; command works!&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;PRISMA ACCESS GLOBAL PROTECT CONNECTION MTU ADJUSTMENT FROM 1400 TO 1300 BYTES&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DanielSRomero_4-1778370034165.png" style="width: 755px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71378iD073ABA1DAFA9A0F/image-dimensions/755x251?v=v2" width="755" height="251" role="button" title="DanielSRomero_4-1778370034165.png" alt="DanielSRomero_4-1778370034165.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;CMD GPUPDATE /FORCE SUCCESFULLY&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;C:\Users\pcmolinaa&amp;gt;gpupdate /force&lt;BR /&gt;Updating policy...&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The computer policy update completed successfully.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Conclusions:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;- Some device in the path, most likely the on-premises NGFW, was dropping the LDAP packets because it has a lower MTU and the packets are sent with the DF bit set, disabling IP fragmentation and forcing the drop by some peer.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your time, and I hope this information is helpful in your daily cybersecurity work. I would greatly appreciate your support by liking or accepting this as a useful post; it would help me a lot in becoming a CyberElite!&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Best Regards,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Daniel Romero&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Senior Network/Security Engineer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;PANW Partner&lt;BR /&gt;&lt;BR /&gt;&lt;LI-PRODUCT title="Prisma Access" id="Prisma_Access"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;LI-PRODUCT title="NGFW" id="NGFW"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;LI-PRODUCT title="GlobalProtect" id="GlobalProtect"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2026 00:08:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/solved-gpudate-force-doesn-t-work-with-global-protect/m-p/1253712#M7373</guid>
      <dc:creator>DanielS.Romero</dc:creator>
      <dc:date>2026-05-10T00:08:09Z</dc:date>
    </item>
  </channel>
</rss>

