<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: global protect ssl-vpn and accessing the internet - v4.1 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-accessing-the-internet-v4-1/m-p/26074#M19025</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was able to figure out the problem. I believe the issue was related to my NAT policy and routing. My NAT policy was translating traffic to the IP address of the interface used for our primary ISP but routing it out the interface for our secondary ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ISP failover setup using PBF for the primary ISP and a virtual route for the secondary ISP. The PBF routes traffic from my trust to untrust zones. (There aren't any PBF rules configured with the source zone my VPN is using so the firewall should check the virtual router next.) I have a default route setup on the virtual router that is used in the event the PBF primary ISP route fails. I also had another default route for traffic that should already be routing traffic via the previously mentioned PBF policy, just with a lower priority metric (probably shouldn't even be there). I believe the NAT policy was translating traffic to the primary ISP interface IP address but the virtual route with a higher priority metric was sending that traffic out the secondary ISP interface. I removed the second "default" route and created another PBF policy that routes traffic from my VPN zone to the primary ISP interface. Tested and works great now! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this made sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 02 Jan 2013 22:37:15 GMT</pubDate>
    <dc:creator>mario11584</dc:creator>
    <dc:date>2013-01-02T22:37:15Z</dc:date>
    <item>
      <title>global protect ssl-vpn and accessing the internet - v4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-accessing-the-internet-v4-1/m-p/26071#M19022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have built access via global protect for remote users and all is working fine except that they cannot access the internet. &lt;/P&gt;&lt;P&gt;1. DNS is assigned (internal)&lt;/P&gt;&lt;P&gt;2. All internal network resources are accessable&lt;/P&gt;&lt;P&gt;3. accessable routes includes 0.0.0.0/32&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2012 17:41:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-accessing-the-internet-v4-1/m-p/26071#M19022</guid>
      <dc:creator>Marcum</dc:creator>
      <dc:date>2012-01-09T17:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: global protect ssl-vpn and accessing the internet - v4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-accessing-the-internet-v4-1/m-p/26072#M19023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Two things. In the gateway client config set the access route to 0.0.0.0/0. That eliminates split tunnel. &lt;BR /&gt; &lt;BR /&gt; Make sure there is a rule that allows the VPN zone to access the untrust zone. &lt;BR /&gt; &lt;BR /&gt; Also a NAT rule to NAT VPN users like you do for the inside or trusted network. &lt;BR /&gt; &lt;BR /&gt; Last thing, make sure VPN tunnel is part of the same virtual router as the outside layer 3 interface. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thank for the info Geovanni Morales&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2012 18:41:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-accessing-the-internet-v4-1/m-p/26072#M19023</guid>
      <dc:creator>Marcum</dc:creator>
      <dc:date>2012-01-09T18:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: global protect ssl-vpn and accessing the internet - v4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-accessing-the-internet-v4-1/m-p/26073#M19024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am running into this problem as well. I have the access route 0.0.0.0/0 configured. I have a security policy to allow traffic from my VPN zone to the untrust zone. I created a NAT policy identical to the one in place for traffic from untrust to trust with the exception being traffic is coming from the VPN zone. See the screen shots below. I only have one virtual router but how do I make sure it is part of the same outside layer 3 interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT Policy:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="NAT Policies.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4989_NAT Policies.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;Security Policies:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Security Policies.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4990_Security Policies.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;Access Route:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Access Route.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/5006_Access Route.png" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Dec 2012 23:16:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-accessing-the-internet-v4-1/m-p/26073#M19024</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2012-12-28T23:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: global protect ssl-vpn and accessing the internet - v4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-accessing-the-internet-v4-1/m-p/26074#M19025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was able to figure out the problem. I believe the issue was related to my NAT policy and routing. My NAT policy was translating traffic to the IP address of the interface used for our primary ISP but routing it out the interface for our secondary ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ISP failover setup using PBF for the primary ISP and a virtual route for the secondary ISP. The PBF routes traffic from my trust to untrust zones. (There aren't any PBF rules configured with the source zone my VPN is using so the firewall should check the virtual router next.) I have a default route setup on the virtual router that is used in the event the PBF primary ISP route fails. I also had another default route for traffic that should already be routing traffic via the previously mentioned PBF policy, just with a lower priority metric (probably shouldn't even be there). I believe the NAT policy was translating traffic to the primary ISP interface IP address but the virtual route with a higher priority metric was sending that traffic out the secondary ISP interface. I removed the second "default" route and created another PBF policy that routes traffic from my VPN zone to the primary ISP interface. Tested and works great now! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this made sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 22:37:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-accessing-the-internet-v4-1/m-p/26074#M19025</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2013-01-02T22:37:15Z</dc:date>
    </item>
  </channel>
</rss>

