<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Breaking Out Specific Ports from a VPN Tunnel for a Client IP breaks INET in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359068#M87955</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am running a PA-850 in my data center.&amp;nbsp; All of our internet-destined traffic goes into a catchall VPN and goes off to a cloud security company called Zscaler for processing before it goes onto the internet.&amp;nbsp; However, for the IP of my machine, I do not want TCP ports 22 and 10443 going to Zscaler. I want any TCP 22 or TCP 10443 traffic sourced from my IP to go out the direct internet circuit (on a translated IP, as you'll see below) and not go into any VPN. However, when I set the NAT statement in the Palo to accomplish that, it completely breaks my internet connectivity.&amp;nbsp; The only way I can get it back is to either break out ALL traffic sourced from my PC (not just 22 and 10443), or remove the attempt to break out 22 and 10443 from the Zscaler VPN. Below are the rules. If I disable them, BAM!, internet is back. I don't understand why. Any help is appreciated.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Palo.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28386i0160298FA951E312/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Palo.PNG" alt="Palo.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Oct 2020 14:23:12 GMT</pubDate>
    <dc:creator>dromanelli</dc:creator>
    <dc:date>2020-10-27T14:23:12Z</dc:date>
    <item>
      <title>Breaking Out Specific Ports from a VPN Tunnel for a Client IP breaks INET</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359068#M87955</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am running a PA-850 in my data center.&amp;nbsp; All of our internet-destined traffic goes into a catchall VPN and goes off to a cloud security company called Zscaler for processing before it goes onto the internet.&amp;nbsp; However, for the IP of my machine, I do not want TCP ports 22 and 10443 going to Zscaler. I want any TCP 22 or TCP 10443 traffic sourced from my IP to go out the direct internet circuit (on a translated IP, as you'll see below) and not go into any VPN. However, when I set the NAT statement in the Palo to accomplish that, it completely breaks my internet connectivity.&amp;nbsp; The only way I can get it back is to either break out ALL traffic sourced from my PC (not just 22 and 10443), or remove the attempt to break out 22 and 10443 from the Zscaler VPN. Below are the rules. If I disable them, BAM!, internet is back. I don't understand why. Any help is appreciated.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Palo.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28386i0160298FA951E312/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Palo.PNG" alt="Palo.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 14:23:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359068#M87955</guid>
      <dc:creator>dromanelli</dc:creator>
      <dc:date>2020-10-27T14:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking Out Specific Ports from a VPN Tunnel for a Client IP breaks IN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359109#M87960</link>
      <description>&lt;P&gt;I don't know your eact architecture, but how are you forwarding traffic to Zsclaer, routing or PBF,&amp;nbsp;It won't be only NAT in play, if its done at the firewall. You probably would need a PBF rule with source from your system to be forwarded towards internet link.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 15:35:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359109#M87960</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-10-27T15:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking Out Specific Ports from a VPN Tunnel for a Client IP breaks IN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359110#M87961</link>
      <description>&lt;P&gt;Hi Raji,&lt;/P&gt;&lt;P&gt;We are using PBF.&lt;/P&gt;&lt;P&gt;So you're saying I would need to write in a rule for my client IP port 22 and 10443 and insert it into the PBR negates?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 15:37:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359110#M87961</guid>
      <dc:creator>dromanelli</dc:creator>
      <dc:date>2020-10-27T15:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking Out Specific Ports from a VPN Tunnel for a Client IP breaks IN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359132#M87967</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/141381"&gt;@dromanelli&lt;/a&gt;&amp;nbsp;you should try a new PBF rule higher in order with you ip in source and negate private ranges and use your specific ports and action as No PBF&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 17:47:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359132#M87967</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-10-27T17:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: Breaking Out Specific Ports from a VPN Tunnel for a Client IP breaks IN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359133#M87968</link>
      <description>&lt;P&gt;That worked. Thank you so much.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 18:02:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/breaking-out-specific-ports-from-a-vpn-tunnel-for-a-client-ip/m-p/359133#M87968</guid>
      <dc:creator>dromanelli</dc:creator>
      <dc:date>2020-10-27T18:02:37Z</dc:date>
    </item>
  </channel>
</rss>

