<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: global protect remote vpn unable to reach internal network? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/260871#M73949</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112589"&gt;@chuckles&lt;/a&gt;: The GlobalProtect gateway is related to the vpn tunnel interface and so are the routes for the client ip pools.&lt;/P&gt;&lt;P&gt;You can do a traceroute from the switch (or a client behind the switch) to a vpn client and vice versa.&lt;/P&gt;&lt;P&gt;Then you got a clue, where the packets are misrouted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will have a transfer network between PA and your coreswitch - the transfernet address of the PA is the next hop for the VPN network from router view.&lt;/P&gt;&lt;P&gt;Do you use different virtual routers in your PA?&lt;/P&gt;</description>
    <pubDate>Tue, 14 May 2019 07:01:11 GMT</pubDate>
    <dc:creator>Chacko42</dc:creator>
    <dc:date>2019-05-14T07:01:11Z</dc:date>
    <item>
      <title>global protect remote vpn unable to reach internal network?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/260837#M73935</link>
      <description>&lt;P&gt;im having big problem , after my remote vpn connects i cannot reach my internal network even though my core switch is directly connected to palo alto , i checked i set the access range for the vpn for 0.0.0.0/0 and i set a security rule from vpn zone to inside zone , also i can ping the inside interface on the firewall itself but not the directly connected core switch , when i check the traffic under monitor it all shows "aged out" , i even set a ip route to the vpn ip pool pointing to the inside of the firewall but with no use , im at a lose here&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 21:38:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/260837#M73935</guid>
      <dc:creator>chuckles</dc:creator>
      <dc:date>2019-05-13T21:38:27Z</dc:date>
    </item>
    <item>
      <title>Re: global protect remote vpn unable to reach internal network?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/260847#M73939</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Its a routing issue from the sounds of it. In the switch make sure it has a route to the PAN regarding the VPN subnet. Also in the PAN make sure you have routes for the VPN subnet as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 21:52:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/260847#M73939</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-05-13T21:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: global protect remote vpn unable to reach internal network?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/260850#M73942</link>
      <description>&lt;P&gt;the switch can reach the inside interface of the PAN as the inside network can reach the internet , but i dont understand how do i make route in the pan for the vpn subnet? like the vpn ip pool have no interface? do you mean like give the tunnel interface an ip address in the same vpn ip pool addresses and set a static route for the vpn ip pool through the tunnel ip address?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 22:05:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/260850#M73942</guid>
      <dc:creator>chuckles</dc:creator>
      <dc:date>2019-05-13T22:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: global protect remote vpn unable to reach internal network?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/260871#M73949</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112589"&gt;@chuckles&lt;/a&gt;: The GlobalProtect gateway is related to the vpn tunnel interface and so are the routes for the client ip pools.&lt;/P&gt;&lt;P&gt;You can do a traceroute from the switch (or a client behind the switch) to a vpn client and vice versa.&lt;/P&gt;&lt;P&gt;Then you got a clue, where the packets are misrouted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will have a transfer network between PA and your coreswitch - the transfernet address of the PA is the next hop for the VPN network from router view.&lt;/P&gt;&lt;P&gt;Do you use different virtual routers in your PA?&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 07:01:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/260871#M73949</guid>
      <dc:creator>Chacko42</dc:creator>
      <dc:date>2019-05-14T07:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: global protect remote vpn unable to reach internal network?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/421892#M94018</link>
      <description>&lt;P&gt;Can somebody check this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;admin@PA850-FW1(active)&amp;gt; show session id 117862&lt;/P&gt;&lt;P&gt;Session 117862&lt;/P&gt;&lt;P&gt;c2s flow:&lt;BR /&gt;source: 10.0.1.51 [SNS_VPN]&lt;BR /&gt;dst: 10.0.0.2&lt;BR /&gt;proto: 1&lt;BR /&gt;sport: 1 dport: 12088&lt;BR /&gt;state: INIT type: FLOW&lt;BR /&gt;src user: vpn_user1&lt;BR /&gt;dst user: unknown&lt;/P&gt;&lt;P&gt;s2c flow:&lt;BR /&gt;source: 10.0.0.2 [SNS Trust]&lt;BR /&gt;dst: 10.0.1.51&lt;BR /&gt;proto: 1&lt;BR /&gt;sport: 12088 dport: 1&lt;BR /&gt;state: INIT type: FLOW&lt;BR /&gt;src user: unknown&lt;BR /&gt;dst user: vpn_user1&lt;BR /&gt;pbf rule: Web Access 1&lt;/P&gt;&lt;P&gt;start time : Sun Jul 25 13:27:24 2021&lt;BR /&gt;timeout : 6 sec&lt;BR /&gt;total byte count(c2s) : 74&lt;BR /&gt;total byte count(s2c) : 74&lt;BR /&gt;layer7 packet count(c2s) : 1&lt;BR /&gt;layer7 packet count(s2c) : 1&lt;BR /&gt;vsys : vsys1&lt;BR /&gt;application : ping&lt;BR /&gt;rule : GPZone_to_SNS_Zone&lt;BR /&gt;service timeout override(index) : False&lt;BR /&gt;session to be logged at end : True&lt;BR /&gt;session in session ager : False&lt;BR /&gt;session updated by HA peer : False&lt;BR /&gt;layer7 processing : enabled&lt;BR /&gt;URL filtering enabled : False&lt;BR /&gt;session via syn-cookies : False&lt;BR /&gt;session terminated on host : False&lt;BR /&gt;session traverses tunnel : True&lt;BR /&gt;session terminate tunnel : False&lt;BR /&gt;captive portal session : False&lt;BR /&gt;ingress interface : tunnel.1&lt;BR /&gt;egress interface : ae1&lt;BR /&gt;session QoS rule : N/A (class 4)&lt;BR /&gt;tracker stage firewall : Aged out&lt;BR /&gt;end-reason : aged-out&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I am missing here?&lt;BR /&gt;I can ping internal (trust) PA interface IP (10.0.0.254) from VPN connected host, but any host from the 10.0.0.x network is unreachable. 10.0.0.254 is the default GW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jul 2021 08:56:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/421892#M94018</guid>
      <dc:creator>xuserjam</dc:creator>
      <dc:date>2021-07-25T08:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: global protect remote vpn unable to reach internal network?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/421902#M94022</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/188563"&gt;@xuserjam&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you see arp entries for these hosts in the 10.0.0.0/24 subnet on the firewall? Do these IPs respond to ping? Are you able to ping these IPs directly from the firewall?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jul 2021 11:30:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-remote-vpn-unable-to-reach-internal-network/m-p/421902#M94022</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-07-25T11:30:14Z</dc:date>
    </item>
  </channel>
</rss>

