<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global protect excluded networks in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-excluded-networks/m-p/30852#M22580</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@fcellini:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your requirement looks like it is not currently supported by the available GP configuration options. I would suggest talking to your sales team to have them file a feature request for this use case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a workaround you could defined all networks in the access routes with the exclusion of the 10.150.0.0/24 subnet. This should work as a short term band-aid for your use case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Feb 2012 03:00:16 GMT</pubDate>
    <dc:creator>bpappas</dc:creator>
    <dc:date>2012-02-23T03:00:16Z</dc:date>
    <item>
      <title>Global protect excluded networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-excluded-networks/m-p/30849#M22577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there is a method on global protect to send all my traffic into the tunnel, but exclude the subnet range of the customer to remain connected with the office network and browse the web protected from office infrastructure, but with the possibility to work on all customer network and not only on the same lan?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Feb 2012 10:35:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-excluded-networks/m-p/30849#M22577</guid>
      <dc:creator>fcellini</dc:creator>
      <dc:date>2012-02-17T10:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect excluded networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-excluded-networks/m-p/30850#M22578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you want to remain connectd to the local LAN and have only the traffic intended for the remote office tunneled? If so, you'd want to configure split tunneling on the PAN FW&amp;nbsp; such that the Global Protect Clients access the remote Office LAN via the tunnel and all other traffic (to the Internet and local LAN) via their own ISP and local connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, you cannot configure this on the Global Prorect Client itself - Access Routes (split tunneling) are configured on the PAN FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your requirement is different from what is explained here, please explain further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 16:12:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-excluded-networks/m-p/30850#M22578</guid>
      <dc:creator>sjamaluddin</dc:creator>
      <dc:date>2012-02-22T16:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect excluded networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-excluded-networks/m-p/30851#M22579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats not exactly what i said... i want all traffic from my pc when i'm from a customer goes by tunnel to my office, included my internet connection, and exclude from the tunnell only the subnet who i have to the customer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EX all 0.0.0.0/0 Pa-500 to office...(all traffic internet included)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.50.0.0 Network customer excluded from tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i can reach all that i want inside my customer network without disconnect vpn connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vpn split as i see on PA i can specify the network to tunnel but i can't exclude a specific network, but is a things possible on small router with cisco vpn integrated isn't possible on Paloalto FW?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 16:26:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-excluded-networks/m-p/30851#M22579</guid>
      <dc:creator>fcellini</dc:creator>
      <dc:date>2012-02-22T16:26:31Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect excluded networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-excluded-networks/m-p/30852#M22580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@fcellini:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your requirement looks like it is not currently supported by the available GP configuration options. I would suggest talking to your sales team to have them file a feature request for this use case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a workaround you could defined all networks in the access routes with the exclusion of the 10.150.0.0/24 subnet. This should work as a short term band-aid for your use case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 03:00:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-excluded-networks/m-p/30852#M22580</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2012-02-23T03:00:16Z</dc:date>
    </item>
  </channel>
</rss>

