<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Split Tunnel Routing Config Help in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412615#M92844</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="E99D6AD8-F220-49BF-8065-1604A454073C.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34369i147F87ECD2549404/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="E99D6AD8-F220-49BF-8065-1604A454073C.png" alt="E99D6AD8-F220-49BF-8065-1604A454073C.png" /&gt;&lt;/span&gt;Not sure what of what is causing your issue but we have this on a test gateway. We just include all rfc private nets by using address objects and exclude nothing....... and we only see traffic to private network addresses traversing the vpn. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I assume you are not using a proxy???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Jun 2021 17:59:17 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2021-06-11T17:59:17Z</dc:date>
    <item>
      <title>Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412584#M92838</link>
      <description>&lt;P&gt;Looking for some help on split tunneling.&lt;/P&gt;&lt;P&gt;We are on PAN os 9.1.9 GP client 5.26, for our LAN we also use Cisco Umbrella to block sites.&lt;/P&gt;&lt;P&gt;What I want to do is when GlobalProtect connects I want all LAN traffic going through the VPN traffic, and all Internet traffic from the client going through their end, not the VPN&lt;/P&gt;&lt;P&gt;When I try and configure split tunneling on my gateway I follow the steps in the Split Tunneling doc, I include all my local LAN subnets in X.X.X.X/24 notation. In the Exclude I put 0.0.0.0/0&lt;/P&gt;&lt;P&gt;However when I connect and test with a known blocked site, I still get a blocked message. Looks like internet requests are still going through the GP client and our local LAN internet connection.&lt;/P&gt;&lt;P&gt;I am not sure what I am doing wrong here. Any one have any ideas?&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 15:23:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412584#M92838</guid>
      <dc:creator>Dan_Swartz</dc:creator>
      <dc:date>2021-06-11T15:23:04Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412598#M92839</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/148445"&gt;@Dan_Swartz&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you check the routes on the client (using "route print")?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 16:30:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412598#M92839</guid>
      <dc:creator>JoergSchuetter</dc:creator>
      <dc:date>2021-06-11T16:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412603#M92840</link>
      <description>&lt;P&gt;Did you enable access to the Local Network?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 17:22:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412603#M92840</guid>
      <dc:creator>Gareth.Doyle</dc:creator>
      <dc:date>2021-06-11T17:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412604#M92841</link>
      <description>&lt;P&gt;Yes I did and all the include routes are listed, as far as the 0.0.0.0/0 route that points at the local adapter. also if I do a trace route it goes out the local adapter and does not get passed through the VPN. I did a trace both connected and disconnected from the VPN&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 16:35:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412604#M92841</guid>
      <dc:creator>Dan_Swartz</dc:creator>
      <dc:date>2021-06-11T16:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412607#M92842</link>
      <description>&lt;P&gt;You mean beyond the LAN subnets in the include area of split tunneling?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 16:37:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412607#M92842</guid>
      <dc:creator>Dan_Swartz</dc:creator>
      <dc:date>2021-06-11T16:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412613#M92843</link>
      <description>&lt;P&gt;Yes, there is an option to enable/disable local network access when you are connected to the VPN. If you are not allowed LAN access then split-tunnel routes won't matter.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 17:23:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412613#M92843</guid>
      <dc:creator>Gareth.Doyle</dc:creator>
      <dc:date>2021-06-11T17:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412615#M92844</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="E99D6AD8-F220-49BF-8065-1604A454073C.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34369i147F87ECD2549404/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="E99D6AD8-F220-49BF-8065-1604A454073C.png" alt="E99D6AD8-F220-49BF-8065-1604A454073C.png" /&gt;&lt;/span&gt;Not sure what of what is causing your issue but we have this on a test gateway. We just include all rfc private nets by using address objects and exclude nothing....... and we only see traffic to private network addresses traversing the vpn. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I assume you are not using a proxy???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 17:59:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412615#M92844</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-11T17:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412616#M92845</link>
      <description>&lt;P&gt;No Proxy. But when I read the Palo Alto docs on split tunneling it said if you check the box "No direct access to local network" that in fact that disables split tunneling. Is that right?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 18:18:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412616#M92845</guid>
      <dc:creator>Dan_Swartz</dc:creator>
      <dc:date>2021-06-11T18:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412617#M92846</link>
      <description>&lt;P&gt;I have that box un checked per the Palo Alto directions&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 18:18:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412617#M92846</guid>
      <dc:creator>Dan_Swartz</dc:creator>
      <dc:date>2021-06-11T18:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412618#M92847</link>
      <description>&lt;P&gt;No, that does not disable split-tunneling, that just enabled direct LAN access. For instance, if you have that box checked, you cannot reach local printers on the same subnet.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 19:01:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412618#M92847</guid>
      <dc:creator>Gareth.Doyle</dc:creator>
      <dc:date>2021-06-11T19:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412622#M92848</link>
      <description>&lt;P&gt;OK, so I removed the 0.0.0.0/0 and I checked that box.&lt;/P&gt;&lt;P&gt;Internet Traffic is still trying to go through the firewall. Like I mentioned above, we use Cisco Umbrella. So prior to me putting that check "on" traffic would go through the firewall then hit Cisco Umbrella and be blocked. Now when I do it I get one of our firewall blocked screens, not a Cisco Umbrella block screen&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 19:33:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412622#M92848</guid>
      <dc:creator>Dan_Swartz</dc:creator>
      <dc:date>2021-06-11T19:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412623#M92849</link>
      <description>&lt;P&gt;Regarding no access to local cal net.. Well that was my understanding but with the config i posted i am able to admin my local router...&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 19:38:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412623#M92849</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-11T19:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412628#M92850</link>
      <description>&lt;P&gt;Ok are you refreshing GP after updating tunnel settings.. and can you post here split tunnel settings.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 19:40:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412628#M92850</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-11T19:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412633#M92851</link>
      <description>&lt;P&gt;Also can you post a route print output...?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 19:43:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412633#M92851</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-11T19:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412636#M92852</link>
      <description>&lt;P&gt;Yes I disconnect, and I go into my local user app data folder and delete certs etc.&lt;/P&gt;&lt;P&gt;Apologize for the long route print, we need multiple networks available to our users via vpn&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="split.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34374i0492525966C53803/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="split.png" alt="split.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Interface List&lt;BR /&gt;54...02 50 41 00 00 01 ......PANGP Virtual Ethernet Adapter #48&lt;BR /&gt;63...34 97 f6 89 bf 20 ......Intel(R) Ethernet Connection (2) I219-V&lt;BR /&gt;33...34 97 f6 89 bf 20 ......Hyper-V Virtual Ethernet Adapter #2&lt;BR /&gt;5...5c f3 70 7f 2f 75 ......Bluetooth Device (Personal Area Network)&lt;BR /&gt;1...........................Software Loopback Interface 1&lt;BR /&gt;82...00 15 5d 94 8a 00 ......Hyper-V Virtual Ethernet Adapter&lt;BR /&gt;===========================================================================&lt;/P&gt;&lt;P&gt;IPv4 Route Table&lt;BR /&gt;===========================================================================&lt;BR /&gt;Active Routes:&lt;BR /&gt;Network Destination Netmask Gateway Interface Metric&lt;BR /&gt;0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.244 281&lt;BR /&gt;0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.124 25&lt;BR /&gt;0.0.0.0 0.0.0.0 On-link 172.16.52.22 1&lt;BR /&gt;10.30.0.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.30.0.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.30.1.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.30.1.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.30.2.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.30.2.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.30.3.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.30.3.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.33.0.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.33.0.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.33.1.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.33.1.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.33.2.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.33.2.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.33.3.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.33.3.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.34.0.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.34.0.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.34.1.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.34.1.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.34.2.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.34.2.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.34.3.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.34.3.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.35.0.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.35.0.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.35.1.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.35.1.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.35.2.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.35.2.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.35.3.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.35.3.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.40.0.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.40.0.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.40.1.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.40.1.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.40.2.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.40.2.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.40.3.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.40.3.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.80.0.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.80.0.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.80.1.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.80.1.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.80.2.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.80.2.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.90.5.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.90.5.2 255.255.255.255 On-link 172.16.52.22 1&lt;BR /&gt;10.90.5.3 255.255.255.255 On-link 172.16.52.22 1&lt;BR /&gt;10.90.5.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.90.6.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.90.6.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.90.7.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.90.7.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.90.8.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.90.8.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.90.9.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.90.9.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;10.90.10.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;10.90.10.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;68.225.134.162 255.255.255.255 192.168.1.1 192.168.1.124 25&lt;BR /&gt;127.0.0.0 255.0.0.0 On-link 127.0.0.1 331&lt;BR /&gt;127.0.0.1 255.255.255.255 On-link 127.0.0.1 331&lt;BR /&gt;127.255.255.255 255.255.255.255 On-link 127.0.0.1 331&lt;BR /&gt;172.16.52.22 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;172.17.192.0 255.255.240.0 On-link 172.17.192.1 5256&lt;BR /&gt;172.17.192.0 255.255.240.0 On-link 172.16.52.22 1&lt;BR /&gt;172.17.192.1 255.255.255.255 On-link 172.17.192.1 5256&lt;BR /&gt;172.17.207.255 255.255.255.255 On-link 172.17.192.1 5256&lt;BR /&gt;172.17.207.255 255.255.255.255 On-link 172.16.52.22 1&lt;BR /&gt;192.168.1.0 255.255.255.0 On-link 192.168.1.124 281&lt;BR /&gt;192.168.1.0 255.255.255.0 On-link 192.168.1.244 281&lt;BR /&gt;192.168.1.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;192.168.1.124 255.255.255.255 On-link 192.168.1.124 281&lt;BR /&gt;192.168.1.244 255.255.255.255 On-link 192.168.1.244 281&lt;BR /&gt;192.168.1.255 255.255.255.255 On-link 192.168.1.124 281&lt;BR /&gt;192.168.1.255 255.255.255.255 On-link 192.168.1.244 281&lt;BR /&gt;192.168.1.255 255.255.255.255 On-link 172.16.52.22 1&lt;BR /&gt;192.168.4.0 255.255.254.0 On-link 172.16.52.22 1&lt;BR /&gt;192.168.5.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;192.168.107.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;192.168.107.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;192.168.204.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;192.168.204.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;192.168.206.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;192.168.206.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;192.168.207.0 255.255.255.0 On-link 172.16.52.22 1&lt;BR /&gt;192.168.207.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;224.0.0.0 240.0.0.0 On-link 127.0.0.1 331&lt;BR /&gt;224.0.0.0 240.0.0.0 On-link 192.168.1.244 281&lt;BR /&gt;224.0.0.0 240.0.0.0 On-link 192.168.1.124 281&lt;BR /&gt;224.0.0.0 240.0.0.0 On-link 172.17.192.1 5256&lt;BR /&gt;224.0.0.0 240.0.0.0 On-link 172.16.52.22 257&lt;BR /&gt;255.255.255.255 255.255.255.255 On-link 127.0.0.1 331&lt;BR /&gt;255.255.255.255 255.255.255.255 On-link 192.168.1.244 281&lt;BR /&gt;255.255.255.255 255.255.255.255 On-link 192.168.1.124 281&lt;BR /&gt;255.255.255.255 255.255.255.255 On-link 172.17.192.1 5256&lt;BR /&gt;255.255.255.255 255.255.255.255 On-link 172.16.52.22 257&lt;BR /&gt;===========================================================================&lt;BR /&gt;Persistent Routes:&lt;BR /&gt;Network Address Netmask Gateway Address Metric&lt;BR /&gt;0.0.0.0 0.0.0.0 192.168.1.1 Default&lt;BR /&gt;===========================================================================&lt;/P&gt;&lt;P&gt;IPv6 Route Table&lt;BR /&gt;===========================================================================&lt;BR /&gt;Active Routes:&lt;BR /&gt;If Metric Network Destination Gateway&lt;BR /&gt;1 331 ::1/128 On-link&lt;BR /&gt;33 281 fe80::/64 On-link&lt;BR /&gt;82 5256 fe80::/64 On-link&lt;BR /&gt;33 281 fe80::b128:13fb:51d7:6ebb/128&lt;BR /&gt;On-link&lt;BR /&gt;82 5256 fe80::fc39:13dc:f5c7:59a8/128&lt;BR /&gt;On-link&lt;BR /&gt;1 331 ff00::/8 On-link&lt;BR /&gt;33 281 ff00::/8 On-link&lt;BR /&gt;82 5256 ff00::/8 On-link&lt;BR /&gt;54 276 ff00::/8 On-link&lt;BR /&gt;===========================================================================&lt;BR /&gt;Persistent Routes:&lt;BR /&gt;None&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 19:59:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412636#M92852</guid>
      <dc:creator>Dan_Swartz</dc:creator>
      <dc:date>2021-06-11T19:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412700#M92864</link>
      <description>&lt;P&gt;apologies&amp;nbsp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80358"&gt;@Gareth.Doyle&lt;/a&gt;&amp;nbsp;. the access to local network does need to be allowed when using windows.&amp;nbsp; Not needed though for IOS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/148445"&gt;@Dan_Swartz&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;still works fine for me on windows.&amp;nbsp; screen dump below with firefox filter shows BBC traffic going via local adapter and works admin server via PAngp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_0-1623482221172.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34377iE247E48FAA7C0B7C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_0-1623482221172.jpeg" alt="MickBall_0-1623482221172.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jun 2021 07:17:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412700#M92864</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-12T07:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412703#M92866</link>
      <description>&lt;P&gt;also.... you seem to have a few default routes, have you added manually to local Nic's.&lt;/P&gt;&lt;P&gt;you have 3 default routes and the GP tunnel has the lowest metric of 1.&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is what I get...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_1-1623482784677.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34378i69150739CF5E402C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_1-1623482784677.png" alt="MickBall_1-1623482784677.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jun 2021 07:26:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412703#M92866</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-12T07:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412721#M92869</link>
      <description>&lt;P&gt;I think the extra default routes are from AnyDesk. I use that to remote into that machine outside our corporate network so I can test the VPN&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jun 2021 16:29:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412721#M92869</guid>
      <dc:creator>Dan_Swartz</dc:creator>
      <dc:date>2021-06-12T16:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412903#M92894</link>
      <description>&lt;P&gt;you need to see what is adding this route with metric 1 as this will cause default route via GP as a higher priority.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_0-1623657532077.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34385iE6FEC585EFB3510E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_0-1623657532077.png" alt="MickBall_0-1623657532077.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 07:59:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412903#M92894</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-14T07:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel Routing Config Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412976#M92900</link>
      <description>&lt;P&gt;Odd, that is the IP address the Palo Alto Assigns me when I connect to the VPN&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 14:17:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/split-tunnel-routing-config-help/m-p/412976#M92900</guid>
      <dc:creator>Dan_Swartz</dc:creator>
      <dc:date>2021-06-14T14:17:06Z</dc:date>
    </item>
  </channel>
</rss>

