<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inbound Listening Ports on GP Connected MAC's in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-listening-ports-on-gp-connected-mac-s/m-p/325773#M83056</link>
    <description>&lt;P&gt;Has anyone noticed the ability to make inbound connections to a GlobalProtect connected MAC OSX system?&amp;nbsp; We had recently enabled split-tunneling thanks to the big bad video conferencing applications. But quickly discovered that on MAC and Windows systems, when domain or application split-tunneling is enabled, all inbound access from the local network is allowed. In other words, another host on the users home WiFi could SSH or proxy through the GP connected system, gaining access to the corporate network. Sure defense in depth may help you here, but the this seems like a major oversight. So, we rolled back split-tunneling. The windows systems returned to what we considered to be the expected behavior when the "no direct access to local network" box is checked. Which is, no inbound or outbound connections are allowed from the GP connected system to the local network. The MAC systems did not behave as we had expected. The ability to SSH or Proxy through the GP connected MAC persisted. Curious if anyone could replicate the testing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Test States:&lt;/P&gt;&lt;P&gt;windows:&lt;/P&gt;&lt;P&gt;state: ndla-yes, no splits - no access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, no domain/app splits - no access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, domain split, no app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, no domain split, app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: once ndla-no&amp;nbsp; - inbound/outbound access from local network is permitted (splits don't change this)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MAC:&lt;/P&gt;&lt;P&gt;state: ndla-yes, no splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, no domain/app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, domain split, no app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, no domain split, app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: once ndla-no&amp;nbsp; - inbound/outbound access from local network is permitted&amp;nbsp;(splits don't change this)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 02 May 2020 02:40:38 GMT</pubDate>
    <dc:creator>recross</dc:creator>
    <dc:date>2020-05-02T02:40:38Z</dc:date>
    <item>
      <title>Inbound Listening Ports on GP Connected MAC's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-listening-ports-on-gp-connected-mac-s/m-p/325773#M83056</link>
      <description>&lt;P&gt;Has anyone noticed the ability to make inbound connections to a GlobalProtect connected MAC OSX system?&amp;nbsp; We had recently enabled split-tunneling thanks to the big bad video conferencing applications. But quickly discovered that on MAC and Windows systems, when domain or application split-tunneling is enabled, all inbound access from the local network is allowed. In other words, another host on the users home WiFi could SSH or proxy through the GP connected system, gaining access to the corporate network. Sure defense in depth may help you here, but the this seems like a major oversight. So, we rolled back split-tunneling. The windows systems returned to what we considered to be the expected behavior when the "no direct access to local network" box is checked. Which is, no inbound or outbound connections are allowed from the GP connected system to the local network. The MAC systems did not behave as we had expected. The ability to SSH or Proxy through the GP connected MAC persisted. Curious if anyone could replicate the testing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Test States:&lt;/P&gt;&lt;P&gt;windows:&lt;/P&gt;&lt;P&gt;state: ndla-yes, no splits - no access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, no domain/app splits - no access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, domain split, no app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, no domain split, app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: once ndla-no&amp;nbsp; - inbound/outbound access from local network is permitted (splits don't change this)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MAC:&lt;/P&gt;&lt;P&gt;state: ndla-yes, no splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, no domain/app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, domain split, no app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: ndla-yes, route split, no domain split, app splits - inbound access from local network is permitted&lt;/P&gt;&lt;P&gt;state: once ndla-no&amp;nbsp; - inbound/outbound access from local network is permitted&amp;nbsp;(splits don't change this)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 02:40:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-listening-ports-on-gp-connected-mac-s/m-p/325773#M83056</guid>
      <dc:creator>recross</dc:creator>
      <dc:date>2020-05-02T02:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound Listening Ports on GP Connected MAC's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-listening-ports-on-gp-connected-mac-s/m-p/326641#M83212</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/88457"&gt;@recross&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm unable to replicate this.&amp;nbsp; What's the versions you're testing this in ?&lt;/P&gt;
&lt;P&gt;Eitherway, the behaviour does not seem correct and I would recommend reaching out to support.&lt;/P&gt;
&lt;P&gt;Guessing some tunnel and physical interface PCAPs + GP dump level debug on split tunnel routing decisions need to be taken to further troubleshoot this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 07 May 2020 13:14:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-listening-ports-on-gp-connected-mac-s/m-p/326641#M83212</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2020-05-07T13:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound Listening Ports on GP Connected MAC's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-listening-ports-on-gp-connected-mac-s/m-p/326777#M83227</link>
      <description>&lt;P&gt;TAC has stated that from a MAC perspective it is behaving as expected. Their response below in red. If I had to guess your system firewall is enabled and blocking incoming connections. As for versions I have tested, firewall OS 8.1.10, 8.1.13, GP 5.0.5, 5.0.9, 5.1.2,5.1.3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;I've been researching on this and found some points on the DLSA behavior:&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;- The DLSA feature (No Direct Access to Local Subnet) only blocks outbound access based on the routing table.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;- For IPv4 on Windows OS, GP client modifies physical adapter setting to let access route take precedence over source IP so the response packets of the incoming connects also goes through tunnel.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;- For MacOS, inbound connection's response goes through the source IP of interface.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;- In general, the incoming connections should be controlled by the firewall of local device.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;As per research until this point, it looks like working as expected where:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;- Response to the inbound connections on Windows is going via GP Tunnel&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;- Response to the inbound connections on MacOS is going via the source IP of interface where the connection is made&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Additionally, we will check/confirm the WindowsOS vs MacOS behavior for DLSA related to Inbound Connections in the lab. If needed, we will involve engineering for confirmation and update you.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 19:02:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-listening-ports-on-gp-connected-mac-s/m-p/326777#M83227</guid>
      <dc:creator>recross</dc:creator>
      <dc:date>2020-05-07T19:02:09Z</dc:date>
    </item>
  </channel>
</rss>

