<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enforcing Global Protect Connection Issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382901#M89893</link>
    <description>&lt;P&gt;Ok, that makes sense. I'll deploy a later compatible version and test again. Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jan 2021 16:19:27 GMT</pubDate>
    <dc:creator>Josh990</dc:creator>
    <dc:date>2021-01-29T16:19:27Z</dc:date>
    <item>
      <title>Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/380969#M89713</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone who's implemented the Enforce Global Protect connection option had issues permitting remote support applications?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried adding the required wildcarded FQDN's to the Global Protect Portal under App Configurations but no joy yet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just wondering if anyone else has had a similar issue?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 13:28:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/380969#M89713</guid>
      <dc:creator>Josh990</dc:creator>
      <dc:date>2021-01-20T13:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/381001#M89715</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136688"&gt;@Josh990&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;What exactly are you trying to do, have it bypass the tunnel?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 14:53:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/381001#M89715</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-01-20T14:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/381003#M89717</link>
      <description>&lt;P&gt;Correct, my thinking is that if an end user cannot connect to the Gateway for whatever reason but the Global Protect Client is still preventing internet access we'd be unable to provide them with remote support unless we used the static disable passcode.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 15:11:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/381003#M89717</guid>
      <dc:creator>Josh990</dc:creator>
      <dc:date>2021-01-20T15:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382152#M89808</link>
      <description>&lt;P&gt;Commenting here to follow.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 17:17:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382152#M89808</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2021-01-26T17:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382212#M89822</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136688"&gt;@Josh990&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;So I've only done this in my lab, but it appears to work as I would expect without any issues and I can access allowed resources without issue. I think the difference here though is that you're trying to access the machine remotely through this method right? So you're trying to allow access to some service such as logmein or something like that so you can then remote into the machine?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 21:59:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382212#M89822</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-01-26T21:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382217#M89823</link>
      <description>&lt;P&gt;The connect to FQDN while enforcing is a 5.2 feature isn't it?&amp;nbsp; &amp;nbsp;Are there any catches/issues to that?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 22:22:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382217#M89823</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2021-01-26T22:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382331#M89837</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Correct, so the remote support client app needs to pull down a code on the impacted endpoint for use by the admin on their host software, who then establishes the remote connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under my current testing using a pilot Portal Agent config, the connection doesn't work and a code isn't even pulled down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have the required FQDNs added into App Configurations but there is also an additional TCP port that may be required (I think we'll need to permit this on the Windows Firewall).&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2021 10:07:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382331#M89837</guid>
      <dc:creator>Josh990</dc:creator>
      <dc:date>2021-01-27T10:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382522#M89854</link>
      <description>&lt;P&gt;I think it's also available and working in earlier versions too - although in very old versions (e.g. &amp;lt;5) it doesn't work properly.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 09:26:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382522#M89854</guid>
      <dc:creator>Josh990</dc:creator>
      <dc:date>2021-01-28T09:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382620#M89867</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136688"&gt;@Josh990&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Just FYI, the FQDN exclusions aren't supported in anything prior to 5.2, the only exclusions you can configure prior to 5.2 is IP based exclusions.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 16:47:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382620#M89867</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-01-28T16:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382833#M89886</link>
      <description>&lt;P&gt;Ah I think that might be the issue then, so despite the option being present in PAN-OS on the GP Portal, it won't work whatsoever for versions of Global Protect older than 5.2?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 09:24:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382833#M89886</guid>
      <dc:creator>Josh990</dc:creator>
      <dc:date>2021-01-29T09:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382898#M89890</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136688"&gt;@Josh990&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Correct. The options are tied to your PAN-OS version and your content-update release; the firewall doesn't take your deployed agent version into account when listing options.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 16:03:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382898#M89890</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-01-29T16:03:31Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382901#M89893</link>
      <description>&lt;P&gt;Ok, that makes sense. I'll deploy a later compatible version and test again. Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 16:19:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/382901#M89893</guid>
      <dc:creator>Josh990</dc:creator>
      <dc:date>2021-01-29T16:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing Global Protect Connection Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/384101#M90018</link>
      <description>&lt;P&gt;Works fine now since upgrading to 5.2.4. Cheers&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2021 13:06:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/enforcing-global-protect-connection-issue/m-p/384101#M90018</guid>
      <dc:creator>Josh990</dc:creator>
      <dc:date>2021-02-05T13:06:30Z</dc:date>
    </item>
  </channel>
</rss>

