<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect: Full Tunnel Enforcement in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/200283#M59266</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61729"&gt;@TBardIPsoft&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tagged here as was not aware of this issue.....&lt;/P&gt;&lt;P&gt;i have tried to do a route change of 0.0.0.0 via local gateway but traffic still flows via vpn.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in your GP gateway/agent/client settings, have you selected "no direct access to local network".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also,,, could you confirm the route change command you are using, are you including an interface or is just like the one i tried below...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route change 0.0.0.0 mask 0.0.0.0 192.168.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mick.&lt;/P&gt;</description>
    <pubDate>Tue, 13 Feb 2018 18:03:21 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2018-02-13T18:03:21Z</dc:date>
    <item>
      <title>Global Protect: Full Tunnel Enforcement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/200233#M59258</link>
      <description>&lt;P&gt;I have already contact Palo Alot Networks support about this issue and their comment back to me was "you need to protect the route preference/configuration from the host side."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue that I am facing is that we have third parties that are not managed by our company however need access to medical systems to support our customers.&amp;nbsp; In order to allow these individuals access they use our VPN to connect to the customer site. The current VPN solution that we have does this without any issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While testing full tunnel with GP-VPN we discovered that you are able to change your default route via the cmd command&amp;nbsp;&lt;SPAN&gt;&amp;lt; route change &amp;gt;.&amp;nbsp; This allows you to stay connected to the GP-VPN for network access (Even with&amp;nbsp;"Enforce GlobalProtect Connection for Network Access" = Yes) while having access to your local Internet connection effectivly changing the full tunnel to a split tunnel.&amp;nbsp; Since there are no other monitoring settings for the GP-VPN that can detect and prevent this change the only way to stop this action is via managing the client itself.&amp;nbsp; However this brings us back to the point that the support of of some of these devices is being done by third parties of which we do not manage.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does anyone have any suggestions or solutions? Maybe there is some magic check box that I am missing somewhere in GP that will prevent this action from working on the host? Anything would be helpfull at this point, but I have a feeling I will just have to tell them that we need to be able to manage all endpoints that are using this VPN connection for support.&amp;nbsp; Which in my openion should be the case already.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 16:04:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/200233#M59258</guid>
      <dc:creator>TBardIPsoft</dc:creator>
      <dc:date>2018-02-13T16:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect: Full Tunnel Enforcement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/200283#M59266</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61729"&gt;@TBardIPsoft&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tagged here as was not aware of this issue.....&lt;/P&gt;&lt;P&gt;i have tried to do a route change of 0.0.0.0 via local gateway but traffic still flows via vpn.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in your GP gateway/agent/client settings, have you selected "no direct access to local network".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also,,, could you confirm the route change command you are using, are you including an interface or is just like the one i tried below...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route change 0.0.0.0 mask 0.0.0.0 192.168.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mick.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 18:03:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/200283#M59266</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-02-13T18:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect: Full Tunnel Enforcement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/203389#M59924</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&lt;/P&gt;&lt;P&gt;If you set the metric to 1 it is like &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61729"&gt;@TBardIPsoft&lt;/a&gt;&amp;nbsp;wrote. You are still connected but the trafgic is routed outside the tunnel. At least without the setting "no direct access to local network". With this setting enabled I need to test again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But anyway, I kinda see it like TAC. A user without admin rights is not able to do route changes. Anf if a user has adminrights, there are way more security concerns than this route "issue".&lt;/P&gt;</description>
      <pubDate>Sat, 03 Mar 2018 09:41:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/203389#M59924</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-03-03T09:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect: Full Tunnel Enforcement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/203523#M59957</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I forgot about this post.&amp;nbsp; Yes, you are correct in the metric change.&amp;nbsp; We did also use the "no direct access to local network" setting and it had not worked before.&amp;nbsp; I had messed with this tunnel on my own time on a non-corporate system and it appears to work however.&amp;nbsp; I am still waiting on the other business unit to do additional testing but time tends to go slow here.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Something that is different between a non-corporate system and a corporate system is that the corporate systems use certificates to access another GP-VPN tunnel.&amp;nbsp; I am curious to know if this is somehow causing issues with our testing in some way.&amp;nbsp; I was able to validate that they had the right client config though.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You are also correct in having more issues by having users with admin access.&amp;nbsp; In our set up the assumption is that the end user has admin access since they are outside contractors.&amp;nbsp; I have actually discussed this with the business around requiring full-tunnel for this VPN since either way at some point they will have access to uncontrolled networks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Mar 2018 12:52:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/203523#M59957</guid>
      <dc:creator>TBardIPsoft</dc:creator>
      <dc:date>2018-03-05T12:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect: Full Tunnel Enforcement</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/385214#M90110</link>
      <description>&lt;P&gt;Just wanted to let everyone know that if they are having any GlobalProtect issues, and need to troubleshoot the issue, our Very own&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;has written a great blog all about troubleshooting GlobalProtect.&lt;/P&gt;
&lt;P&gt;Be sure to check it out here:&amp;nbsp;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/dotw-globalprotect-troubleshooting-tips/ba-p/383911" target="_blank"&gt;https://live.paloaltonetworks.com/t5/blogs/dotw-globalprotect-troubleshooting-tips/ba-p/383911&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 21:13:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-full-tunnel-enforcement/m-p/385214#M90110</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2021-02-10T21:13:36Z</dc:date>
    </item>
  </channel>
</rss>

