<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSec tunnel to Azure - Strange issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-to-azure-strange-issue/m-p/459210#M101975</link>
    <description>&lt;P&gt;HI all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an active ticket with PA but struggling to get through to anyone atm. We have recently made some routing changes and moved the Azure IPSec tunnel from an SRX to a PA. The tunnel came up fine but we are having a weird issue with RDP. It's like the tunnel is only allowing so many sessions across. Some users have to try about 10 times to get RDP to work. When RDP fails there is no sign of the traffic in PA logs so it's like its not leaving AZ. System/VPN logs look fine. Ping and traceroutes from both side are fine as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have never come across anything like this with a tunnel before.. The only thing I am thinking of changing next is the SKU on the tunnel to see if it's a throughput issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any input appreciated.&lt;/P&gt;&lt;P&gt;Luke | PCNSE&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jan 2022 11:47:07 GMT</pubDate>
    <dc:creator>LukeRath</dc:creator>
    <dc:date>2022-01-18T11:47:07Z</dc:date>
    <item>
      <title>IPSec tunnel to Azure - Strange issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-to-azure-strange-issue/m-p/459210#M101975</link>
      <description>&lt;P&gt;HI all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an active ticket with PA but struggling to get through to anyone atm. We have recently made some routing changes and moved the Azure IPSec tunnel from an SRX to a PA. The tunnel came up fine but we are having a weird issue with RDP. It's like the tunnel is only allowing so many sessions across. Some users have to try about 10 times to get RDP to work. When RDP fails there is no sign of the traffic in PA logs so it's like its not leaving AZ. System/VPN logs look fine. Ping and traceroutes from both side are fine as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have never come across anything like this with a tunnel before.. The only thing I am thinking of changing next is the SKU on the tunnel to see if it's a throughput issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any input appreciated.&lt;/P&gt;&lt;P&gt;Luke | PCNSE&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 11:47:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-to-azure-strange-issue/m-p/459210#M101975</guid>
      <dc:creator>LukeRath</dc:creator>
      <dc:date>2022-01-18T11:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel to Azure - Strange issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-to-azure-strange-issue/m-p/459247#M101978</link>
      <description>&lt;P&gt;You can check the link below if it helps:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;%%%%%%%%%%%%%5&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;UL&gt;
&lt;LI class="li step"&gt;
&lt;DIV&gt;
&lt;DIV&gt;Specify whether remote desktop connections are permitted over existing VPN tunnels by specifying the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;DIV&gt;User Switch Tunnel Rename Timeout&lt;/DIV&gt;
. When a new user connects to a Windows machine using Remote Desktop Protocol (RDP), the gateway reassigns the VPN tunnel to the new user. The gateway can then enforce security policies on the new user.&lt;/DIV&gt;
&lt;DIV class="itemgroup info" data-label="ADDITIONAL INFORMATION"&gt;
&lt;DIV&gt;
&lt;DIV class="p"&gt;
&lt;DIV&gt;Allowing remote desktop connections over VPN tunnels can be useful in situations where an IT administrator needs to access a remote end-user system using RDP.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="p"&gt;
&lt;DIV&gt;By default, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;DIV&gt;User Switch Tunnel Rename Timeout&lt;/DIV&gt;
&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;value is set to 0, meaning the GlobalProtect gateway terminates the connection if a new user authenticates over the VPN tunnel. To modify this behavior, configure a timeout value from 1 to 600 seconds. If the new user does not log in to the gateway before the timeout value expires, the GlobalProtect gateway terminates the VPN tunnel assigned to the first user.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="note " data-label="NOTE"&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV class="p"&gt;
&lt;DIV&gt;Changing the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;DIV&gt;User Switch Tunnel Rename Timeout&lt;/DIV&gt;
&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;value only affects the RDP tunnel and does not rename a pre-logon tunnel when configured.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;%%%%%%%%%%%%%%%%&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/globalprotect-portals/define-the-globalprotect-client-authentication-configurations/customize-the-globalprotect-app.html" target="_blank"&gt;Customize the GlobalProtect App (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For clientless VPN you can see:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRaCAK" target="_blank"&gt;RDP, VNC, SSH Access through GlobalProtect Clientless VPN - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good thing to know about RDP and usernames:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CleBCAS" target="_blank"&gt;What Login Credentials Does Palo Alto Networks User-ID Agent Se... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also check for known rdp bugs with your version for example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-release-notes/globalprotect-known-and-addressed-issues/known-issues-related-to-gp-app.html" target="_blank"&gt;GlobalProtect App 5.2 Known Issues (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-release-information/known-issues.html" target="_blank"&gt;Known Issues (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 15:04:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-to-azure-strange-issue/m-p/459247#M101978</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-01-18T15:04:34Z</dc:date>
    </item>
  </channel>
</rss>

