<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect Gateway - Split-Tunnel Exluded Domains in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/322052#M82403</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40431"&gt;@Jake_Ryan&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;I found the example of how to configure split-tunneling for Office 365 apps using IPs &lt;A title="GlobalProtect: Optimizing Office 365 Traffic via VPN Split Tunnel Exclude Access Route" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-Optimizing-Office-365-Traffic/ta-p/319669" target="_self"&gt;here&lt;/A&gt;. Based on info in the section #4 of the instruction, Microsoft is going to use the same IPs during next few months.&lt;/P&gt;&lt;P data-unlink="true"&gt;Please note we could not to add Address Groups as Exclude Access Routes on the firewall that is running PAN-OS 8.1. It looks like this feature is available in 9.x version only.&lt;/P&gt;</description>
    <pubDate>Fri, 10 Apr 2020 02:25:46 GMT</pubDate>
    <dc:creator>DanilaKh</dc:creator>
    <dc:date>2020-04-10T02:25:46Z</dc:date>
    <item>
      <title>Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/320971#M82162</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to exclude some domain from coming through the gateway to improve user experience so they are not hair-pinning through our DC's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;at the moment I have no access route entered so I am running 0.0.0.0/0 out of our DC's - there are are certain domains for Microsoft updates, teams and hosted business services&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when I add them to exclude domain it seems to work correctly - for example if I add &lt;A href="http://www.bbc.co.uk" target="_blank"&gt;www.bbc.co.uk&lt;/A&gt;&amp;nbsp;this will browse local as expected but all other websites are stop working&lt;/P&gt;&lt;P&gt;I was hoping when I add excluded domains to browse local, what remains continues to hairpin via the DC;s&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been trying to find a wildcard I could enter in the include domain to continue to get the internet working but this does not seems to work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;are there some examples there people are using to I can see what I am doing wrong? I have been through the admin documents but maybe I am missing something&lt;/P&gt;&lt;P&gt;is there something I an doing wrong here or am I expecting more than is possible?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 15:29:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/320971#M82162</guid>
      <dc:creator>Jake_Ryan</dc:creator>
      <dc:date>2020-04-06T15:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321039#M82174</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do all other websites stop working? If yes, what website(s) did you test it with? Did you do a route print to see routes configured on the adapter(s)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 18:51:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321039#M82174</guid>
      <dc:creator>vathreya</dc:creator>
      <dc:date>2020-04-06T18:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321076#M82187</link>
      <description>&lt;P&gt;Hello Jake,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have a valid GlobalProtect lincense (subscription) installed on your firewall(s)?&lt;BR /&gt;As soon as you were able to exclude traffic by configuring domain based split-tunneling, I do not think that it is the case. But, it would be worth to check your GlobalProtect license, because of s&lt;SPAN&gt;plit tunneling based on destination domain, client process, and video streaming application is required valid subscription. See more details &lt;A title="About GlobalProtect Licenses" href="https://docs.paloaltonetworks.com/globalprotect/8-1/globalprotect-admin/globalprotect-overview/about-globalprotect-licenses.html#id872f095e-9476-47d8-b99d-271cfd315584" target="_self"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is a version of PAN OS you use?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Could you please share a part of your GlobalProtect configuration related to&amp;nbsp;split-tunneling?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is an output of the command 'route print' on a PC connected to VPN gateway?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As a good example of split domain and application feature configuration you can use the document &lt;A title="GlobalProtect: Implement Split Domain, Applications, Exclude Video Traffic Configuration" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-Implement-Split-Domain-and-Applications/ta-p/316929" target="_self"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Best regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Daniel&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2020 01:32:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321076#M82187</guid>
      <dc:creator>DanilaKh</dc:creator>
      <dc:date>2020-04-10T01:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321088#M82189</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I understood correct, you could access &lt;A href="http://www.bbc.co.uk" target="_blank"&gt;www.bbc.co.uk&lt;/A&gt;&amp;nbsp;via your ethernet/wireless adapter AND also all of the RFC 1918 or interested traffic is traversing your local adapter as opposed to go across the tunnel?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this is the case, did you try adding adding RF1918 to access route Include tab and non-interested traffic to exclude tab?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatively, you could just add the domains or app-id's under Domain and Application to specific's you need.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 00:20:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321088#M82189</guid>
      <dc:creator>ALLADASAINITIN</dc:creator>
      <dc:date>2020-04-07T00:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321239#M82235</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for the replies&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I have a mixture of problems here - I look to have the split-tunnel working in out test environment just when I move to production I hit issues so its defiantly my issue to resolve - and most likely related to out HIP/browsing rules we have in place so I need to dig this out now&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the new question I have now is if something is blocked by a policy, is that ignored if the exclusion is in? - I have not tested this yet so thought it might be easier to ask&lt;/P&gt;&lt;P&gt;for example - we block Netflix&amp;nbsp;&lt;/P&gt;&lt;P&gt;if I was to exclude *netflix.com&lt;/P&gt;&lt;P&gt;and also add it to the exclude video traffic from the tunnel as Netflix-base, Netflix-streaming&lt;/P&gt;&lt;P&gt;would it then be allowed to VPN users? and would it be logged anywhere if allowed or denied?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PanOS - 8.1.4&lt;/P&gt;&lt;P&gt;GP - 4.1.11&lt;/P&gt;&lt;P&gt;PA - 3020&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 15:09:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321239#M82235</guid>
      <dc:creator>Jake_Ryan</dc:creator>
      <dc:date>2020-04-07T15:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321262#M82243</link>
      <description>&lt;P&gt;Hi Jake,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any reason why you're still running 4.1.x? Take a look here to check out EOL summary:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/services/support/end-of-life-announcements/end-of-life-summary" target="_blank"&gt;https://www.paloaltonetworks.com/services/support/end-of-life-announcements/end-of-life-summary&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you've excluded that video traffic and excluded domain traffic, it will be routed using physical adapter and not via GP adapter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 15:56:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321262#M82243</guid>
      <dc:creator>vathreya</dc:creator>
      <dc:date>2020-04-07T15:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321269#M82244</link>
      <description>&lt;P&gt;thank you,&amp;nbsp;&lt;/P&gt;&lt;P&gt;yep I have been made aware of the EOL the problem I have is a have roughly 5000 users across multiple gateways all working from home due to COVID-19&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;our remote machines do not have admin rights granted and also do not have a local admin account direct on the machine so if we have any problems during upgrading these clients we could possibly disable remote working for multiple users as out support teams cannot install without the machine being directly on the domain for the correct rights&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so at the moment it is not a risk is way to high to consider&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will be testing my exclusions tonight - the best tests I can do it with whatismyip.com to see if the IP changes to the local breakout rather than a DCs&lt;/P&gt;&lt;P&gt;is there a better way to test?&lt;/P&gt;&lt;P&gt;I can start packet tracing but it seems a bit too far to proof it is working&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 16:21:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321269#M82244</guid>
      <dc:creator>Jake_Ryan</dc:creator>
      <dc:date>2020-04-07T16:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321274#M82245</link>
      <description>&lt;P&gt;Hi Jake,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please go through this document to troubleshoot split tunnel (domain) and exclude video traffic. Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 16:32:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321274#M82245</guid>
      <dc:creator>vathreya</dc:creator>
      <dc:date>2020-04-07T16:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321296#M82250</link>
      <description>&lt;P&gt;download and run currports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it can display running processes and show the source address.&amp;nbsp; this will determine if tunnelled or split.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;screen shot below&amp;nbsp;&amp;nbsp; ..&amp;nbsp; PS I have just added teams as a filter but you can see all or add whatever you like.&lt;/P&gt;&lt;P&gt;the 192.168 is my wifi and 172.17 GP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also...&amp;nbsp;&amp;nbsp; anything local will not be affected by your firewall policies.&amp;nbsp; if you need to block it then don't split it.&lt;/P&gt;&lt;P&gt;also2...&amp;nbsp;&amp;nbsp; lots of bugs in domain split tunnelling below 5.0.7...&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="currport.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24982i032252393369DB46/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="currport.png" alt="currport.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 18:17:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321296#M82250</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-04-07T18:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321454#M82267</link>
      <description>&lt;P&gt;thanks Mike&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will try that now&lt;/P&gt;&lt;P&gt;also how are the excusing teams? but application directory or the URLs they publish on the MS website?&lt;/P&gt;&lt;P&gt;are you able to share a screenshot?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the company want to start doing weekly announcements not to everyone via a live stream and looks like teams will be the preferred method - so its a new thing I need to now try and split&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 08:57:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321454#M82267</guid>
      <dc:creator>Jake_Ryan</dc:creator>
      <dc:date>2020-04-08T08:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321459#M82269</link>
      <description>&lt;P&gt;we have tried all...&lt;/P&gt;&lt;P&gt;application directory was unreliable as this is installed under the users profile, also...&amp;nbsp; the use of "%LOCALAPPDATA%\Microsoft\Teams\Teams.exe" is not currently supported by Palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Domain Split Tunnel was also unreliable as we have a few thousand users under version 5.01.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so we now use IP addresses.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can make your own choice about which ones to use from here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-gb/office365/enterprise/urls-and-ip-address-ranges#skype-for-business-online-and-microsoft-teams" target="_blank"&gt;https://docs.microsoft.com/en-gb/office365/enterprise/urls-and-ip-address-ranges#skype-for-business-online-and-microsoft-teams&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 09:27:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/321459#M82269</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-04-08T09:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/322050#M82402</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40431"&gt;@Jake_Ryan&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found the example of split-tunneling configuration based on IPs for Office 365 apps &lt;A title="GlobalProtect: Optimizing Office 365 Traffic via VPN Split Tunnel Exclude Access Route" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-Optimizing-Office-365-Traffic/ta-p/319669" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on information in the section # 4 we can use IPs for the next few months:&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Per the information provided by Microsoft team, &lt;STRONG&gt;the current intent is to hold these subnets/IP addresses static for the next few months&lt;/STRONG&gt; in order to allow for quick customer deployments related to the COVID-19 situation. In long term, customers would need to either build automation to keep this configuration up to date, or follow the suggestions and subscribe to update notifications at:&amp;nbsp;&lt;A title="Office 365 IP Web Service | Microsoft" href="https://urldefense.proofpoint.com/v2/url?u=https-3A__nam06.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fdocs.microsoft.com-252Fen-2Dus-252Foffice365-252Fenterprise-252Foffice-2D365-2Dip-2Dweb-2Dservice-2523update-2Dnotifications-26data-3D04-257C01-257CKonstantin.Ryvkin-2540microsoft.com-257C829f439b69d948366a6308d7d0736796-257C72f988bf86f141af91ab2d7cd011db47-257C1-257C0-257C637207066401983974-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C-2D1-26sdata-3D8-252BjGfPWFDDZ-252FT9Ad7vY7h7pAkDy39US7D7zFLNheGeg-253D-26reserved-3D0&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=xgvrO3u-FEkJ2m5K1QoJncw__cNYSUjHZFBf7OTJTRY&amp;amp;m=srLK3p-zjdfHWxTk0uj9dSo0y7OQ852UQ8asU1cmubw&amp;amp;s=zLHcFHwd3B_1IrGDsAqDzKjTz4Q1yRWdDjCd0Hv1DV0&amp;amp;e=" target="_blank" rel="noopener nofollow noopener noreferrer"&gt;https://docs.microsoft.com/en-us/office365/enterprise/office-365-ip-web-service#update-notifications&lt;/A&gt;&lt;/SPAN&gt;".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please note we could not add Address Group as an Exclude Access Route to the firewall that is running PAN-OS 8.1. It looks like this feature is available in 9.x only. We just added Addresses.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2020 02:11:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/322050#M82402</guid>
      <dc:creator>DanilaKh</dc:creator>
      <dc:date>2020-04-10T02:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/322052#M82403</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40431"&gt;@Jake_Ryan&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;I found the example of how to configure split-tunneling for Office 365 apps using IPs &lt;A title="GlobalProtect: Optimizing Office 365 Traffic via VPN Split Tunnel Exclude Access Route" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-Optimizing-Office-365-Traffic/ta-p/319669" target="_self"&gt;here&lt;/A&gt;. Based on info in the section #4 of the instruction, Microsoft is going to use the same IPs during next few months.&lt;/P&gt;&lt;P data-unlink="true"&gt;Please note we could not to add Address Groups as Exclude Access Routes on the firewall that is running PAN-OS 8.1. It looks like this feature is available in 9.x version only.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2020 02:25:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/322052#M82403</guid>
      <dc:creator>DanilaKh</dc:creator>
      <dc:date>2020-04-10T02:25:46Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Gateway - Split-Tunnel Exluded Domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/327142#M83269</link>
      <description>&lt;P&gt;I ran into this issue once SIP was issued on March 15th and most employees started to work from home. Although we had domains such as *.zoom.us, youtube.com, 8x8 etc defined in GP to NOT use the tunnel, traffic kept accessing via the tunnel even though configuration was correct . We are on Pan0S 9.0.5. I spent several days with support. When we switched from using domain names to IP address ranges the issue went away.&amp;nbsp; This issue was not DNS related as internally we use the same DNS servers VPN clients use and internally we had no issues resolving DNS. Fix was to use IP addresses in the split-tunnel config until PAN figures out the bug.&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2020 05:04:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-gateway-split-tunnel-exluded-domains/m-p/327142#M83269</guid>
      <dc:creator>luigid</dc:creator>
      <dc:date>2020-05-09T05:04:55Z</dc:date>
    </item>
  </channel>
</rss>

