<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem VPN Split-Tunneling in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40568#M29802</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;Thank you Jacek. Finally I've created a shell script using vpnc command to connect and add the routes. It works.&lt;/P&gt;&lt;P&gt;In my opinion, PaloAlto should offer a solution for GlobalProtect VPN on Linux platforms, in case they want to take advantage over their competitors.&lt;/P&gt;&lt;P&gt;Bye!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 31 Aug 2012 10:41:33 GMT</pubDate>
    <dc:creator>jmrodriguez</dc:creator>
    <dc:date>2012-08-31T10:41:33Z</dc:date>
    <item>
      <title>Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40556#M29790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi everybody.&lt;/P&gt;&lt;P&gt;I've got a strange problem related to split tunneling in PAN configuration. The situation is:&lt;/P&gt;&lt;P&gt;- Portal and Gateway configuration in PAN-2050 with PANOS 4.1.7 (same results with 4.1.6 and 4.1.5).&lt;/P&gt;&lt;P&gt;- VPN client Cisco compatible (Windows and Linux, same results)&lt;/P&gt;&lt;P&gt;- IP Pool: 192.168.46.0/24&lt;/P&gt;&lt;P&gt;- Access routes: 10.0.0.0/8 and 172.16.0.0/12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is the following one (X.X.X.X is the public ip address of the VPN gateway):&lt;/P&gt;&lt;P&gt;- If I configure one access route, 10.0.0.0/8, it works well, the client routing table is correct and I have connectivity through the tunnel:&lt;/P&gt;&lt;P&gt;root@vangogh:/home/juan# route -n&lt;/P&gt;&lt;P&gt;Kernel IP routing table&lt;/P&gt;&lt;P&gt;Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Genmask&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags Metric Ref&amp;nbsp;&amp;nbsp;&amp;nbsp; Use Iface&lt;/P&gt;&lt;P&gt;192.168.46.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 UH&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 tun0&lt;/P&gt;&lt;P&gt;X.X.X.X&amp;nbsp;&amp;nbsp; 192.168.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 UGH&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 wlan0&lt;/P&gt;&lt;P&gt;192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; U&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 wlan0&lt;/P&gt;&lt;P&gt;10.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; U&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 tun0&lt;/P&gt;&lt;P&gt;0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UG&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 wlan0&lt;/P&gt;&lt;P&gt;root@vangogh:/home/juan#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- If I configure one access route, 172.16.0.0/12, it works well, the client routing table is correct and I have connectivity through the tunnel:&lt;/P&gt;&lt;P&gt;root@vangogh:/home/juan# route -n&lt;/P&gt;&lt;P&gt;Kernel IP routing table&lt;/P&gt;&lt;P&gt;Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Genmask&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags Metric Ref&amp;nbsp;&amp;nbsp;&amp;nbsp; Use Iface&lt;/P&gt;&lt;P&gt;192.168.46.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 UH&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 tun0&lt;/P&gt;&lt;P&gt;X.X.X.X&amp;nbsp;&amp;nbsp; 192.168.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 UGH&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 wlan0&lt;/P&gt;&lt;P&gt;192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; U&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 wlan0&lt;/P&gt;&lt;P&gt;172.16.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.240.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; U&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 tun0&lt;/P&gt;&lt;P&gt;0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UG&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 wlan0&lt;/P&gt;&lt;P&gt;root@vangogh:/home/juan#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- But if I configure both access routes (desired configuration), it seems that the VPN client "summarize" both access routes and create a kind of default route, losing Internet connection:&lt;/P&gt;&lt;P&gt;root@vangogh:/home/juan# route -n&lt;/P&gt;&lt;P&gt;Kernel IP routing table&lt;/P&gt;&lt;P&gt;Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Genmask&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags Metric Ref&amp;nbsp;&amp;nbsp;&amp;nbsp; Use Iface&lt;/P&gt;&lt;P&gt;192.168.46.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 UH&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 tun0&lt;/P&gt;&lt;P&gt;X.X.X.X&amp;nbsp;&amp;nbsp; 192.168.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 UGH&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 wlan0&lt;/P&gt;&lt;P&gt;192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; U&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 wlan0&lt;/P&gt;&lt;P&gt;0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; U&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 tun0&lt;/P&gt;&lt;P&gt;root@vangogh:/home/juan#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas? Any similar problems?&lt;/P&gt;&lt;P&gt;Thank you very much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 11:21:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40556#M29790</guid>
      <dc:creator>jmrodriguez</dc:creator>
      <dc:date>2012-08-13T11:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40557#M29791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a similar problem with PANOS 4.1.6 and 4.1.7 , but also with only one access-route. It summarize in a strange manner.&amp;nbsp; If I specify an access-route like 192.168.11.0/24 it summarize like 192.0.0.0/254.0.0.0, but if I specify an access-route like 172.16.0.0/12 it summarize like 128.0.0.0/128.0.0.0, if I specify an access-route like 10.0.0.0/8 it summarize like 0.0.0.0/0.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 16:45:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40557#M29791</guid>
      <dc:creator>lauro7</dc:creator>
      <dc:date>2012-08-13T16:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40558#M29792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a similar setup in lab where I am allowing two networks through access routes and my routes are NOT being summarized:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;100.1.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.16.0.252&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.16.0.252&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P&gt;100.1.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.16.0.252&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.16.0.252&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access routes are only summarized on iOS devices and should be listed as individual networks on Windows/Linux machines. Please open a Support case so that we can further look into the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sri&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 21:00:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40558#M29792</guid>
      <dc:creator>zarina</dc:creator>
      <dc:date>2012-08-13T21:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40559#M29793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi everybody.&lt;/P&gt;&lt;P&gt;Sri, I've configured our firewall with your two access routes: 100.1.1.0/24 and 100.1.2.0/24 and this is the client routing table:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IPv4 Tabla de enrutamiento&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;===========================================================================&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Rutas activas:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Destino de red&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Máscara de red&amp;nbsp;&amp;nbsp; Puerta de enlace&amp;nbsp;&amp;nbsp; Interfaz&amp;nbsp; Métrica&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100.1.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.252.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.46.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.46.2&amp;nbsp;&amp;nbsp;&amp;nbsp; 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, it summarizes the routes. I'm using Cisco VPN Client version 5.0.&lt;/P&gt;&lt;P&gt;Please, could you tell me your configuration? I'll try to open a case.&lt;/P&gt;&lt;P&gt;Thank you very much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 07:30:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40559#M29793</guid>
      <dc:creator>jmrodriguez</dc:creator>
      <dc:date>2012-08-14T07:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40560#M29794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;in my lab with a PAN2020 and PANOS 4.1.7, I have inserted two access-route like yours,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="FireShot Screen Capture #011 - " pa-2020="" /&gt;&lt;/P&gt;&lt;P&gt;but in my Cisco VPN client v. 5.0.0.7 on Windows XP, secured routes shows this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="CiscoClient.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/3778_CiscoClient.png" /&gt;&lt;/P&gt;&lt;P&gt;If I insert only one access-route like 192.168.11.0/24, secured routes shows 192.0.0.0 254.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Lauro&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 08:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40560#M29794</guid>
      <dc:creator>lauro7</dc:creator>
      <dc:date>2012-08-14T08:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40561#M29795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;Thanks&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Lauro.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;It is&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;very strange behavior&lt;/SPAN&gt;. &lt;SPAN class="hps"&gt;Let's see&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;if together&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;we can&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;find&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the solution&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 09:35:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40561#M29795</guid>
      <dc:creator>jmrodriguez</dc:creator>
      <dc:date>2012-08-14T09:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40562#M29796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have done some tests in my lab and my idea is following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;it depends by insertion of primary/secondary DNS and the combination of access routes&lt;/LI&gt;&lt;LI&gt;the system tries to summarize the networks from the DNS, if present, and the access routes inserted. If exists a super network that summarizes all, than this network is tunneled, otherwise the split-tunnel is 0.0.0.0/0&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;my opinion is that is not correct, because I should have the possibility to split single networks and single DNS. In my routing table I should have all the single networks that I specified in access routes (in the help row below the panel configuration is written "&lt;SPAN style="color: #888888; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 9px; font-style: normal; font-weight: normal; text-align: left; text-indent: 0px; background-color: #ebedee;"&gt;These routes will be added to the client's routing table"&amp;nbsp; &lt;/SPAN&gt;plural: these routes &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&amp;nbsp; )&lt;SPAN style="color: #888888; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 9px; font-style: normal; font-weight: normal; text-align: left; text-indent: 0px; background-color: #ebedee;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="color: #888888; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 9px; font-style: normal; font-weight: normal; text-align: left; text-indent: 0px; background-color: #ebedee;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Lauro&lt;/SPAN&gt;&lt;SPAN style="color: #888888; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 9px; font-style: normal; font-weight: normal; text-align: left; text-indent: 0px; background-color: #ebedee;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG id="smallDivTip" src="https://live.paloaltonetworks.com/" style="z-index: 90; border: 0px solid blue; position: absolute; left: 759px; top: 169px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 09:57:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40562#M29796</guid>
      <dc:creator>lauro7</dc:creator>
      <dc:date>2012-08-14T09:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40563#M29797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lauro.&lt;/P&gt;&lt;P&gt;You're right. I've carried out some tests by changing DNS configuration in GlobalProtect Gateway. As you say, it tries to summarize all the networks: DNS networks and access routes networks........ what a folly!!!&lt;/P&gt;&lt;P&gt;It'd be a good idea that Sri could specify here his GlobalProtect configuration.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 10:23:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40563#M29797</guid>
      <dc:creator>jmrodriguez</dc:creator>
      <dc:date>2012-08-14T10:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40564#M29798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using GP client 1.1.5. I have not tested this with a Cisco VPN client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sri&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 18:01:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40564#M29798</guid>
      <dc:creator>zarina</dc:creator>
      <dc:date>2012-08-14T18:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40565#M29799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sri.&lt;/P&gt;&lt;P&gt;I've tested this with a Cisco VPN client in a Windows machine, Cisco VPN Client in a Linux Machine, vpnc daemon in a Linux Machine, Shrew software in a Linux machine and Shrew software in a Windows Machine, with the same result....&lt;/P&gt;&lt;P&gt;Is it a compatibility problem of PaloAlto devices? I think IPSec connections are based on a RFC standard..............&lt;/P&gt;&lt;P&gt;Thank you very much...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2012 12:20:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40565#M29799</guid>
      <dc:creator>jmrodriguez</dc:creator>
      <dc:date>2012-08-16T12:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40566#M29800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are using 2 injected routes - they were summarized to network 128.0.0.0 128.0.0.0 :-).&lt;/P&gt;&lt;P&gt;Workaround&amp;nbsp; - in the vpnc we have&amp;nbsp; configured to ignore routes sent by PA, and manually added routes (without setting default route (only net/mask)).&lt;/P&gt;&lt;P&gt;And it works &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I think the same option is possible in Shrew client&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2012 08:19:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40566#M29800</guid>
      <dc:creator>jacek.urban</dc:creator>
      <dc:date>2012-08-17T08:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40567#M29801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We support only GP client with Windows and MAC OS. We do not officially support the Cisco VPN Client. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2012 17:41:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40567#M29801</guid>
      <dc:creator>zarina</dc:creator>
      <dc:date>2012-08-17T17:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40568#M29802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;Thank you Jacek. Finally I've created a shell script using vpnc command to connect and add the routes. It works.&lt;/P&gt;&lt;P&gt;In my opinion, PaloAlto should offer a solution for GlobalProtect VPN on Linux platforms, in case they want to take advantage over their competitors.&lt;/P&gt;&lt;P&gt;Bye!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2012 10:41:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40568#M29802</guid>
      <dc:creator>jmrodriguez</dc:creator>
      <dc:date>2012-08-31T10:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40569#M29803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://blog.davidvassallo.me/2012/11/22/connecting-to-a-palo-alto-network-globalprotect-gateway-from-linux/" title="http://blog.davidvassallo.me/2012/11/22/connecting-to-a-palo-alto-network-globalprotect-gateway-from-linux/"&gt;http://blog.davidvassallo.me/2012/11/22/connecting-to-a-palo-alto-network-globalprotect-gateway-from-linux/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 17:28:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40569#M29803</guid>
      <dc:creator>eputnam</dc:creator>
      <dc:date>2013-04-17T17:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Problem VPN Split-Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40570#M29804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jacek, &lt;/P&gt;&lt;P&gt;Have you tried testing VPNC client against Cisco 2900s vpn ? Do you need to manually add routes to VPNC client for split tunneling to work ? or it was just needed while using VPNC clients against PAN FWs ? &lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 05:24:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-vpn-split-tunneling/m-p/40570#M29804</guid>
      <dc:creator>Mystique</dc:creator>
      <dc:date>2013-06-25T05:24:25Z</dc:date>
    </item>
  </channel>
</rss>

