<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect VPN &amp;quot;Always On&amp;quot; in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245530#M69952</link>
    <description>&lt;P&gt;The tunnel will always establish if the gateway is reachable, which it is since the host sits in Azure. We have modified DNS to not resolve the gateway when on the LAN, but the client will display an error message stating it cannot connect. I am not seeing anything within the configuration to state only connect if not on the domain/local network. Am I missing something? Again any help is appreciated.&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jan 2019 13:41:06 GMT</pubDate>
    <dc:creator>inclusa-admin</dc:creator>
    <dc:date>2019-01-10T13:41:06Z</dc:date>
    <item>
      <title>GlobalProtect VPN "Always On"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245517#M69949</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently migrating from Cisco AnyConnect to a GlobalProtect solution that is hosted on an Azure cloud VM and really like the "Always On" feature. The only set back we have noticed is there is no way to manipulate it to only connect when not on an internal LAN. We had manipulated DNS in the past to disable internal users from connecting to our VPN, but with the GlobalProtect client it will display an error message. We are trying to avoid having our end users notice this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you any assistance is appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 12:57:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245517#M69949</guid>
      <dc:creator>inclusa-admin</dc:creator>
      <dc:date>2019-01-10T12:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect VPN "Always On"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245528#M69951</link>
      <description>&lt;P&gt;you can set an external gateway in the agent config.&lt;/P&gt;&lt;P&gt;A tunnel will be only established, if you are outside of your lan.&lt;/P&gt;&lt;P&gt;As an internal gateway you can configure Globalprotect to act as an user-id collector&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 13:33:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245528#M69951</guid>
      <dc:creator>Chacko42</dc:creator>
      <dc:date>2019-01-10T13:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect VPN "Always On"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245530#M69952</link>
      <description>&lt;P&gt;The tunnel will always establish if the gateway is reachable, which it is since the host sits in Azure. We have modified DNS to not resolve the gateway when on the LAN, but the client will display an error message stating it cannot connect. I am not seeing anything within the configuration to state only connect if not on the domain/local network. Am I missing something? Again any help is appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 13:41:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245530#M69952</guid>
      <dc:creator>inclusa-admin</dc:creator>
      <dc:date>2019-01-10T13:41:06Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect VPN "Always On"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245532#M69954</link>
      <description>&lt;P&gt;can you post/describe your agent config on the portal?&lt;/P&gt;&lt;P&gt;Do you tried to define the internal host detection to connect to an internal gateway instead?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 13:44:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245532#M69954</guid>
      <dc:creator>Chacko42</dc:creator>
      <dc:date>2019-01-10T13:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect VPN "Always On"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245533#M69955</link>
      <description>&lt;P&gt;Thank you for your replies, it is much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As of right now we have done nothing to tweak the agent configuration and is using the default setup with SSO authentication.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do not actually have any PaloAlto gateways internally at the moment. As of right now we only have the 1 Azure VM firewall. From what I understand we would need an interface from a PaloAlto internally to achieve this correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Forgive me for any ignorance on this. My past experience has been mainly with Pulse and Cisco and am a bit green with GlobalProtect.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 13:59:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245533#M69955</guid>
      <dc:creator>inclusa-admin</dc:creator>
      <dc:date>2019-01-10T13:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect VPN "Always On"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245538#M69957</link>
      <description>&lt;P&gt;Right, you can enable internal host detection (e.g. your domain controller).&lt;/P&gt;&lt;P&gt;If your client is connected to your internal network, you can tell him to connect to an internal global protect gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There you can define e.g. user id and no tunnel configuration.&lt;/P&gt;&lt;P&gt;That is more secure than doing WMI probing or AD logs&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 14:22:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245538#M69957</guid>
      <dc:creator>Chacko42</dc:creator>
      <dc:date>2019-01-10T14:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect VPN "Always On"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245540#M69958</link>
      <description>&lt;P&gt;I think I understand now. I really appreciate your responses on this and pointing me to the correct path.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 14:25:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-vpn-quot-always-on-quot/m-p/245540#M69958</guid>
      <dc:creator>inclusa-admin</dc:creator>
      <dc:date>2019-01-10T14:25:48Z</dc:date>
    </item>
  </channel>
</rss>

