<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect IOS split tunnel routing incorrect traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ios-split-tunnel-routing-incorrect-traffic/m-p/386367#M90240</link>
    <description>&lt;P&gt;yes, I have seen vendor's IP stacks on their devices not follow the standards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is very little we can do to prevent this and I share your frustrations.&lt;/P&gt;</description>
    <pubDate>Wed, 17 Feb 2021 13:54:16 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2021-02-17T13:54:16Z</dc:date>
    <item>
      <title>GlobalProtect IOS split tunnel routing incorrect traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ios-split-tunnel-routing-incorrect-traffic/m-p/384839#M90079</link>
      <description>&lt;P&gt;PanOS 9.1.4, GP client 5.2.7-6.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a split tunnel configuration with only 2 internal /32 addresses added to the access route include list. We regularly see traffic from GP clients destined for Internet IP addresses hit the Palo over the client tunnel. This is from several IOS clients - we don't have any other client O/S'es to test with. Is there any reason destinations not included in the include list would sometimes route over the tunnel?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PANGps.log shows the correct routes being installed on the client. The incorrect packets don't seem to coincide with any issues in the client log like a reconnection.&amp;nbsp; We have a fairly basic configuration. Connection method - On Demand, "No direct access to local network" option not ticked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Researching the destination addresses and ports seem to indicate these are related to messaging clients and some are to apple's range on 17.x.x.x. I have also specifically added 17.0.0.0/8 to the&amp;nbsp; Exclude access rule but still receive traffic destined there.&amp;nbsp; Is it possible that some apps don't use the routing table on IOS and sometimes use the tunnel interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 18:02:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ios-split-tunnel-routing-incorrect-traffic/m-p/384839#M90079</guid>
      <dc:creator>Andy123B</dc:creator>
      <dc:date>2021-02-09T18:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect IOS split tunnel routing incorrect traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ios-split-tunnel-routing-incorrect-traffic/m-p/386367#M90240</link>
      <description>&lt;P&gt;yes, I have seen vendor's IP stacks on their devices not follow the standards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is very little we can do to prevent this and I share your frustrations.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 13:54:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ios-split-tunnel-routing-incorrect-traffic/m-p/386367#M90240</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-02-17T13:54:16Z</dc:date>
    </item>
  </channel>
</rss>

