<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enhanced split tunnel configuration tips in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/enhanced-split-tunnel-configuration-tips/m-p/1205403#M1061</link>
    <description>&lt;P&gt;If the CA name matches and it still needs SAN it is strange.&lt;/P&gt;</description>
    <pubDate>Sat, 25 Jan 2025 20:14:23 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2025-01-25T20:14:23Z</dc:date>
    <item>
      <title>Enhanced split tunnel configuration tips</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/enhanced-split-tunnel-configuration-tips/m-p/1086579#M1053</link>
      <description>&lt;P&gt;Guys,&lt;/P&gt;
&lt;P&gt;I was finally able to confirm that split tunnel config file on a web server works, so I would like to share some tips with you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-gateways/host-a-split-tunnel-configuration-file-on-a-web-server" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-gateways/host-a-split-tunnel-configuration-file-on-a-web-server&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This is an explanation for the link above.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Mutual TLS is under the same CA.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Initially, I used let's encrypt for the server certificate, but it doesn't provide a client certificate, so I used a client certificate that I created on local linux. This resulted in an error in PanGPS.log.(AdvancetST: downloaded content is not authenticated)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The engineers at paloalto helped me by giving me some useful links to understand mtls.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://medium.com/@nisanth.m.s/guide-setting-up-mtls-authentication-with-openssl-for-client-server-communication-38c0a5cbfa05" target="_blank"&gt;https://medium.com/@nisanth.m.s/guide-setting-up-mtls-authentication-with-openssl-for-client-server-communication-38c0a5cbfa05&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Just to add a little bit, this link does not include the SAN, and when you check the operation with the client's browser, you will get a server certificate error.&lt;BR /&gt;When creating a CSR and issuing a certificate, it was necessary to add a few commands to include the SAN. Like this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;openssl req -new -key server.key.pem -out server.csr&amp;nbsp;&lt;/SPAN&gt;-addext "subjectAltName = DNS:example.com"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;openssl ca -config /root/mtls/openssl.cnf -extfile san.txt -days 1650 -notext -batch -in server.csr -out serve&lt;BR /&gt;r.cert.pem&lt;/P&gt;
&lt;P&gt;san.txt contains&amp;nbsp;subjectAltName = DNS:example.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Any private key can be used to sign the file. It has nothing to do with mtls. Register the corresponding public key in Prisma Access.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Even after looking at the setup guide, I'm still confused as to which private key to use.&lt;BR /&gt;However, the palo engineer told me that ``anything is fine,'' and the problem became clear.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm looking forward to this, as it allows for more flexible route control than internal host detection.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 16:52:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/enhanced-split-tunnel-configuration-tips/m-p/1086579#M1053</guid>
      <dc:creator>M.Kitano449950</dc:creator>
      <dc:date>2025-01-16T16:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Enhanced split tunnel configuration tips</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/enhanced-split-tunnel-configuration-tips/m-p/1205403#M1061</link>
      <description>&lt;P&gt;If the CA name matches and it still needs SAN it is strange.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 20:14:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/enhanced-split-tunnel-configuration-tips/m-p/1205403#M1061</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2025-01-25T20:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Enhanced split tunnel configuration tips</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/enhanced-split-tunnel-configuration-tips/m-p/1205478#M1062</link>
      <description>&lt;P&gt;Hi Nikoolayy1,&lt;/P&gt;
&lt;P&gt;Thank you for your reply.&lt;BR /&gt;Starting with Chrome 58, a certificate error will occur if you do not use SAN instead of common name.&lt;BR /&gt;I didn't like this error because I first tested it in a browser, but the GP agent may not care.&lt;/P&gt;
&lt;P&gt;Please let me know if you can get the split tunnel config using only Common Name.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 13:03:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/enhanced-split-tunnel-configuration-tips/m-p/1205478#M1062</guid>
      <dc:creator>M.Kitano449950</dc:creator>
      <dc:date>2025-01-27T13:03:47Z</dc:date>
    </item>
  </channel>
</rss>

