Exclude all Zoom traffic from GlobalProtect VPN

Showing results for 
Search instead for 
Did you mean: 

Exclude all Zoom traffic from GlobalProtect VPN

L3 Networker

We have been trying to exclude all Zoom-related traffic from the GlobalProtect VPN tunnel.


So far we have tried with: "*.zoom.us" exclusion configured directly on the GP gateway as a domain in:

Network --> GlobalProtect --> Gateways --> GW NAME --> Agent --> CLient Settings --> Split tunnel --> Domain and Application


But this seems to not completely do the trick as Zoom use some AWS default domains, not under *.zoom.us.


What approaches will work that does not involve having to manually exclude all the IP ranges as defined here?



The Zoom binary path seems to be this one, but I'm not sure PA supports wildcards on the path like this:






I upgraded the clients to 5.1.3 GP version. but we still see traffic logs for zoom ips in port 443. Why? 



I have the same problem - GP 5.1.3 and exclude zoom app but some flows are still on gateway and in tunnel to the internal company network. Why? Somebody does know solid and stable solution how to exclude zoom traffic from tunnel on GP?





We still see connections in port 8801 in FW. someone worked split for zoom?

Split on gateway per user group domain zoom.us and zoom.com, split on gateway application zoom-base nad zoominfo (lack of application zoom-meeting which is main application!!!) or exclude process of zoom exe - all of them solutions don't work. Traffic still is sending via firewall and internal network despite of direct from client GP to the Internet/to the zoom cloud. Nobody resolved this issue?

Make sure you have the GlobalProtect license installed on that Gateway, as license is required for some advanced features like split tunneling.

Hi just curious how you created the address group.

I'll tried in on PAN-OS 9.1x (Panorama and firewalls) and got a validation error, when I tried to push the changes to the firewall.

Which PAN-OS and GP versions are you using?

L1 Bithead

Facing the same issue.


However, just 'allow listing' zoom.us and zoom.com along with /Applications/zoom.us.app/Contents/MacOS/zoom.us for MAC work. It's sad that I can't use the predefined application for video-conferencing to exclude in the spit-tunnelling.

L0 Member

Needs Global Protect license for optimized split tunnel to work correctly. 

L1 Bithead

Also facing same issue,

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!