03-17-2020 03:24 AM
We have been trying to exclude all Zoom-related traffic from the GlobalProtect VPN tunnel.
So far we have tried with: "*.zoom.us" exclusion configured directly on the GP gateway as a domain in:
Network --> GlobalProtect --> Gateways --> GW NAME --> Agent --> CLient Settings --> Split tunnel --> Domain and Application
But this seems to not completely do the trick as Zoom use some AWS default domains, not under *.zoom.us.
What approaches will work that does not involve having to manually exclude all the IP ranges as defined here?
The Zoom binary path seems to be this one, but I'm not sure PA supports wildcards on the path like this:
C:\Users\*\AppData\Roaming\Zoom\bin\Zoom.exe
03-08-2021 04:09 AM
Hi just curious how you created the address group.
I'll tried in on PAN-OS 9.1x (Panorama and firewalls) and got a validation error, when I tried to push the changes to the firewall.
Which PAN-OS and GP versions are you using?
03-15-2021 05:13 PM
Facing the same issue.
However, just 'allow listing' zoom.us and zoom.com along with /Applications/zoom.us.app/Contents/MacOS/zoom.us for MAC work. It's sad that I can't use the predefined application for video-conferencing to exclude in the spit-tunnelling.
03-17-2021 01:32 PM
Needs Global Protect license for optimized split tunnel to work correctly.
03-18-2021 08:28 AM
Like @Brandonyawn mentioned here is the referenced link to that information:
09-02-2021 02:22 AM
Also facing same issue,
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!