<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Upgrading GlobalProtect while on corp network in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229155#M65891</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71649"&gt;@ce1028&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I noticed that the icon sometimes is way behind the actual status of global protect. But as long as you don't configure the setting "enforce global protect for network access" this isn't a problem, when exactly the internal host detection happens.&lt;/P&gt;</description>
    <pubDate>Sun, 02 Sep 2018 19:31:22 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-09-02T19:31:22Z</dc:date>
    <item>
      <title>Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229108#M65871</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a client who said every time they try to upgrade globalprotect, they have mixed results. The issue seems to be that they'll set the GP App to "Allow with prompt". However, the users will never get the prompt while they are on the corporate network. It seems possibly, when the users go home, they'll get the prompt to download and then install, but maybe they shutdown or restart their machines while the install is happening, which then causes issues.&amp;nbsp; This is an assumption of what might possibly be happening.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The real question is, what is the best way to allow the upgrade to happen in the office?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Public DNS record -&amp;nbsp; gp.domainname.com pointing to public IP of firewall e1/1 interface&amp;nbsp; (ex 2.2.2.2)&lt;/P&gt;&lt;P&gt;e1/1 - untrust zone&amp;nbsp; IP 2.2.2.2/24&lt;/P&gt;&lt;P&gt;e1/2 - trust zone&amp;nbsp; IP 10.10.10.1/24&lt;/P&gt;&lt;P&gt;Client on corp network 10.10.10.100/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Sep 2018 19:29:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229108#M65871</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-09-01T19:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229116#M65873</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71649"&gt;@ce1028&lt;/a&gt;&lt;/P&gt;&lt;P&gt;What about configuring the setting "Allow users to upgrade global protect app" to "Internal"?&lt;/P&gt;&lt;P&gt;This will update the agent transparently but only when the client is in the internal network and not connected by VPN.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Sep 2018 21:04:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229116#M65873</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-01T21:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229125#M65876</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;I believe an Internal gateway is required for this option?&amp;nbsp; I'd also have to consider the remote workers who are never in the office&lt;/P&gt;</description>
      <pubDate>Sun, 02 Sep 2018 00:36:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229125#M65876</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-09-02T00:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229127#M65878</link>
      <description>&lt;P&gt;No, internal gateway isn't required. Only internal host detection. But yes when you have remote workers who are never in the office then this option does not work. Maybe if it is clear who always works from remote, then you could put them into a group and give them another portal config than your default configuration which then would be to allow the update only internally.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Sep 2018 01:13:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229127#M65878</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-02T01:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229128#M65879</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;That's a good suggestion, as an alternative.&amp;nbsp; Is there anyway for transparent or allow with prompt to work, while on the corporate LAN?&lt;/P&gt;</description>
      <pubDate>Sun, 02 Sep 2018 01:19:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229128#M65879</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-09-02T01:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229141#M65885</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71649"&gt;@ce1028&lt;/a&gt;&amp;nbsp;so far I am not aware of problems that the upgrade does not work from internal. Did you test it yourself? Are there any specific version updates that did fail or is the problem in general? Are the clients able to successfully connect to the portal from internal? Is TLS decryption enabled that may be breaks this connection? There could be multiple reasons causing this to fail... the client logs are probably a good place to start the search for a reason.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Sep 2018 12:43:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229141#M65885</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-02T12:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229148#M65886</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;I'm going to spin up a lab soon to try it. I did see the problem at their site.&amp;nbsp;This has always been an issue for them. &amp;nbsp;When internal host detection detects they are internal, they will never receive the prompt.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They do have TLS Decryption enabled.&amp;nbsp; That's a good suggestion to check.&amp;nbsp; I wasn't sure if it was the outbound NATrule causing the issue. Their internet outbound nat rule translates their internal IP to the same public IP of the GP Portal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also noticed it takes well over 1 minute before GP detects that it's on an internal network.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Sep 2018 14:53:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229148#M65886</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-09-02T14:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229150#M65887</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71649"&gt;@ce1028&lt;/a&gt;&lt;/P&gt;&lt;P&gt;In this case it is more likely the NAT rule which causes this problem. After you configure a no NAT rule above the existing one it probably looks better, but TLS decryption might still be the next step to check.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what time do you count this minute and more? Start of computer, loginscreen, after successful login when the desktop is shown? And what is the connection method: always-on pre-logon, always-on user-logon, ...?&lt;/P&gt;</description>
      <pubDate>Sun, 02 Sep 2018 15:15:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229150#M65887</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-02T15:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229153#M65890</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;I was able to reproduce in my test lab. It&amp;nbsp;was the NAT rule causing the issue!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;GP is set to always on.&amp;nbsp;I start counting once&amp;nbsp;GP starts spinning.&amp;nbsp; They have not reported this problem, just something I noticed on all of their machines.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Sep 2018 18:57:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229153#M65890</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-09-02T18:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Upgrading GlobalProtect while on corp network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229155#M65891</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71649"&gt;@ce1028&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I noticed that the icon sometimes is way behind the actual status of global protect. But as long as you don't configure the setting "enforce global protect for network access" this isn't a problem, when exactly the internal host detection happens.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Sep 2018 19:31:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/upgrading-globalprotect-while-on-corp-network/m-p/229155#M65891</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-02T19:31:22Z</dc:date>
    </item>
  </channel>
</rss>

