<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Always-ON VPN in the internal network. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-vpn-in-the-internal-network/m-p/221601#M63795</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&amp;nbsp;am looking to configure an always-on VPN with full tunnel access and enable"Enforce Global protect for Network access".&lt;/P&gt;&lt;P&gt;This basically means that users have to connect GP portal to access network when logging in to their machine when off-prem. Giving us the ability to filter the traffic 24x7 even when off-prem. But, I am now facing a challenge where I need to have them connected to wired network when internal and donot want them to intiate vpn tunnel.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd gone through numerous internal host detection docs but all say that if reverse dns is successful,it will try to connect to Internal gateway and then external. But I need a scenario where it has to&amp;nbsp;stop trying&amp;nbsp; VPN process when connected to LAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please provide me your inputs on thisissue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;</description>
    <pubDate>Tue, 10 Jul 2018 17:40:48 GMT</pubDate>
    <dc:creator>SThatipelly</dc:creator>
    <dc:date>2018-07-10T17:40:48Z</dc:date>
    <item>
      <title>Always-ON VPN in the internal network.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-vpn-in-the-internal-network/m-p/221601#M63795</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&amp;nbsp;am looking to configure an always-on VPN with full tunnel access and enable"Enforce Global protect for Network access".&lt;/P&gt;&lt;P&gt;This basically means that users have to connect GP portal to access network when logging in to their machine when off-prem. Giving us the ability to filter the traffic 24x7 even when off-prem. But, I am now facing a challenge where I need to have them connected to wired network when internal and donot want them to intiate vpn tunnel.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd gone through numerous internal host detection docs but all say that if reverse dns is successful,it will try to connect to Internal gateway and then external. But I need a scenario where it has to&amp;nbsp;stop trying&amp;nbsp; VPN process when connected to LAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please provide me your inputs on thisissue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jul 2018 17:40:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/always-on-vpn-in-the-internal-network/m-p/221601#M63795</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2018-07-10T17:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: Always-ON VPN in the internal network.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-vpn-in-the-internal-network/m-p/221611#M63796</link>
      <description>If you do not configure an internal gateway, but enable internal host detection, then it will not connect to the external gateway and it will achieve what you are trying to accomplish</description>
      <pubDate>Tue, 10 Jul 2018 18:08:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/always-on-vpn-in-the-internal-network/m-p/221611#M63796</guid>
      <dc:creator>welly_59</dc:creator>
      <dc:date>2018-07-10T18:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: Always-ON VPN in the internal network.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-vpn-in-the-internal-network/m-p/221622#M63799</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91200"&gt;@welly_59&lt;/a&gt;&amp;nbsp;Thank you so much for the quick response. How does an agent lookup the hostname&amp;amp; IP? From all the docs, it seems like the IP is reverse-DNS queried for the hostname. Is there any way I can make the agent to do the other way around meaning Hostname should be resolved to specific IP? That way I can forge the response with firewall sinkhole capability and make only specific zone/traffic to be considered as internal.&lt;/P&gt;&lt;P&gt;Apologies If my question seem unclear.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jul 2018 20:09:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/always-on-vpn-in-the-internal-network/m-p/221622#M63799</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2018-07-10T20:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: Always-ON VPN in the internal network.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/always-on-vpn-in-the-internal-network/m-p/221627#M63801</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Internal Host Detection relies soly on a reverse DNS lookup for the internal host. If the agent is unable to find the internal host the agent assumes that it's outside the network and establishes a tunnel to the external gateway. There isn't a way to modify this behavior.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jul 2018 20:54:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/always-on-vpn-in-the-internal-network/m-p/221627#M63801</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-07-10T20:54:06Z</dc:date>
    </item>
  </channel>
</rss>

