<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic from GP interface in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-from-gp-interface/m-p/293451#M77579</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101029"&gt;@Abdul_Razaq&lt;/a&gt;&amp;nbsp;If you don't use any 3rd party clients with X-Auth, it could also be your standard users. The global protect agent will try IPSec connection to the Gateway and only if it fails will use SSL. This is enabled by default and configurable under “Global Protect&amp;gt;Agent&amp;gt;Tunnel Settings”&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-0/globalprotect-admin/globalprotect-gateways/configure-a-globalprotect-gateway.html" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/9-0/globalprotect-admin/globalprotect-gateways/configure-a-globalprotect-gateway.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Oct 2019 08:44:38 GMT</pubDate>
    <dc:creator>BatD</dc:creator>
    <dc:date>2019-10-21T08:44:38Z</dc:date>
    <item>
      <title>Traffic from GP interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-from-gp-interface/m-p/293380#M77572</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am seeing some traffic initiated from GP interface to outside using source port udp/4500 to public IPs of clients( GP uses 4501 and I have xauth configured). Are these traffics are because of GP xauth configuration.. anybody has noticed it before ?.&lt;/P&gt;&lt;P&gt;I dont have any Ipsec tunnels configured from this interface.&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Oct 2019 15:45:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-from-gp-interface/m-p/293380#M77572</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-10-20T15:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic from GP interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-from-gp-interface/m-p/293451#M77579</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101029"&gt;@Abdul_Razaq&lt;/a&gt;&amp;nbsp;If you don't use any 3rd party clients with X-Auth, it could also be your standard users. The global protect agent will try IPSec connection to the Gateway and only if it fails will use SSL. This is enabled by default and configurable under “Global Protect&amp;gt;Agent&amp;gt;Tunnel Settings”&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-0/globalprotect-admin/globalprotect-gateways/configure-a-globalprotect-gateway.html" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/9-0/globalprotect-admin/globalprotect-gateways/configure-a-globalprotect-gateway.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 08:44:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-from-gp-interface/m-p/293451#M77579</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2019-10-21T08:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic from GP interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-from-gp-interface/m-p/293463#M77581</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74884"&gt;@BatD&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I am seeing these traffic only for third party clients, I am seeing traffic initiated from PA with source udp/4500 to client public IPs (it is blocked by policy ).&lt;/P&gt;&lt;P&gt;As it is port 4500, I can make sure that it is because of third party client as GP uses 4501 in tunnel mode. I am wondering what is inside that packets, what PA is trying to send, is it the tunnel initiation? ( even though the policy is denying it, the IPSec connection is fine in responder mode).&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 09:00:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-from-gp-interface/m-p/293463#M77581</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-10-21T09:00:02Z</dc:date>
    </item>
  </channel>
</rss>

