<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Having GlobalProtect Users Access Webserver NAT Address Instead of Internal Address in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/having-globalprotect-users-access-webserver-nat-address-instead/m-p/204026#M60050</link>
    <description>&lt;P&gt;I'm very very new to Palo Alto.&amp;nbsp; For the few weeks that I've been using it, I've been very impressed with its ease of use, and functionality.&amp;nbsp; I have a question when it comes to GlobalProtect.&amp;nbsp; We have a webserver that we want to exclude from the GlobalProtect VPN tunnel.&amp;nbsp; Let's say the site is test.testcompany.com.&amp;nbsp; In the Client settings, in GlobalProtect, I see that you can exclude addresses from going through the tunnel. Since this website is part of a round robin, is there a way to exclude by FQDN instead of by IP?&amp;nbsp; From the looks of it, you can't.&amp;nbsp; The second question I have is let's say that the internal IP address for test.testcompany.com is 10.10.10.10.&amp;nbsp; If I want GlobalProtect users to route to this servers public address, let's say 30.30.30.30, instead of 10.10.10.10, is there a way to do this through the Palo Alto?&amp;nbsp; I've tried researching, but haven't come up with anything concrete.&amp;nbsp; Appreciate your help!&lt;/P&gt;</description>
    <pubDate>Wed, 07 Mar 2018 07:17:50 GMT</pubDate>
    <dc:creator>szannikos</dc:creator>
    <dc:date>2018-03-07T07:17:50Z</dc:date>
    <item>
      <title>Having GlobalProtect Users Access Webserver NAT Address Instead of Internal Address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/having-globalprotect-users-access-webserver-nat-address-instead/m-p/204026#M60050</link>
      <description>&lt;P&gt;I'm very very new to Palo Alto.&amp;nbsp; For the few weeks that I've been using it, I've been very impressed with its ease of use, and functionality.&amp;nbsp; I have a question when it comes to GlobalProtect.&amp;nbsp; We have a webserver that we want to exclude from the GlobalProtect VPN tunnel.&amp;nbsp; Let's say the site is test.testcompany.com.&amp;nbsp; In the Client settings, in GlobalProtect, I see that you can exclude addresses from going through the tunnel. Since this website is part of a round robin, is there a way to exclude by FQDN instead of by IP?&amp;nbsp; From the looks of it, you can't.&amp;nbsp; The second question I have is let's say that the internal IP address for test.testcompany.com is 10.10.10.10.&amp;nbsp; If I want GlobalProtect users to route to this servers public address, let's say 30.30.30.30, instead of 10.10.10.10, is there a way to do this through the Palo Alto?&amp;nbsp; I've tried researching, but haven't come up with anything concrete.&amp;nbsp; Appreciate your help!&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 07:17:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/having-globalprotect-users-access-webserver-nat-address-instead/m-p/204026#M60050</guid>
      <dc:creator>szannikos</dc:creator>
      <dc:date>2018-03-07T07:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Having GlobalProtect Users Access Webserver NAT Address Instead of Internal Address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/having-globalprotect-users-access-webserver-nat-address-instead/m-p/204085#M60061</link>
      <description>&lt;P&gt;split tunneling manipulates the routing table, so there's no possibility to do this based on FQDN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you have an internal DNS server you can have it serve up different dns entries based on the source of the query. alternatively you can set up a dns proxy and have your GP clients use this as their dns server. You can set the external ip as the dns record for your site&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 14:50:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/having-globalprotect-users-access-webserver-nat-address-instead/m-p/204085#M60061</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-03-07T14:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: Having GlobalProtect Users Access Webserver NAT Address Instead of Internal Address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/having-globalprotect-users-access-webserver-nat-address-instead/m-p/204086#M60062</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78776"&gt;@szannikos&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;SO first things first lets look at the webserver exlusion.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) If you followed best practices and the GlobalProtect terminates on it's own security zone, then you would simply create a security policy that says that anything from the zone 'GP' or whatever you named it, cannot access the webserver. Alternatively if you have a rule allowing all traffic simply add the IP that you don't want them visiting to the 'destination' field and then utilize the 'Negate' option. This will continue to allow all traffic unless the IP is listed in the destination field.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) If you didn't terminate GlobalProtect in it's own zone you'll need to add the IP into the 'Excludes' Split Tunnel configuration on the GP Gateway Client Settings. Since you can't take advantage of FQDN you'll need to include all of the IPs of the servers particiapting in the round-robin configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your second question gets a little more complicated. What you'd need to do is actually setup a destination NAT. Essentially stating that if something comes from the GlobalProtect zone with the GP IP range to 10.10.10.10, the translated packet is going to be setup as a destination address translation to 30.30.30.30 to a translated port of 443.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;'s suggestion is by far easier to configure &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 14:56:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/having-globalprotect-users-access-webserver-nat-address-instead/m-p/204086#M60062</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-03-07T14:56:02Z</dc:date>
    </item>
  </channel>
</rss>

