GlobalProtect Cloud Services Route Precedence

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

GlobalProtect Cloud Services Route Precedence

L1 Bithead

We have had overlapping subnet scenarios where someone is connecting using GlobalProtect Cloud Services from a subnet that overlaps our internal subnet and, as they have a more specific route, access to internal resources is failing as the taffic is being routed via the local router instead of over the VPN due to the more specific route. Due to the size of our internal network, adding more specific routes for all of our subnets isn't really an option and this could be undone anyway with a more specific route.

 

Does anyone know a way to force all internal traffic down the VPN instead of following more specific routes?

 

NOTE: GlobalProtect Cloud Service has changed to Prisma Access.

11 REPLIES 11

L7 Applicator

Hmm.. no, but do they need local routing, seems a bit odd if your route takes precedence, or is it all the other routes that are local...

never had this issue as we do not allow split tunneling...

L7 Applicator

well i say "No" but watch this space...

We mostly see the issue when users are connecting from hotel networks so have no control on their routes. We can manually remove the local route to get the traffic down the tunnel but not the easiest solution for users.

if you remove all routes from the gateway config on the palo alto it will auto force all traffic down the tunnel by default.

Have removed all routes but traffic matching the local route still isn't going down the tunnel.

 

P.S. thanks for your helpful replies.

It looks like we need to enable the option "No direct access to local network" to force all traffic down the tunnel but this would prevent access to local resources like printers. Guess thats a decision we'll have to make.

 

Thanks again for your help Mick.

Sure, but the user could just disable GP to print, or use USB, you have a few options but if you deffo need access to both then specific host routes could be an option as you only need to set them once for all users.

 

luckily we have a strict no split tunnel policy so never been an issue and for a small group of users that must remote print they have a seperate portal config via AD group that allows GP disable.

Sorry @OtakarKlier, that was not a reply to you... i only just read your post. Is this doable on local kit or do you need to invest in cloud services.

Hello,

The PAN's can do this nativly, I should have read more rather than pasting :). Check this out:

 

https://live.paloaltonetworks.com/t5/Featured-Articles/DotW-Help-with-IPSec-Proxy-IDs-with-overlappi...

 

Does this more closely resendble the scenario?

L2 Linker

I think we have a fix for this issue of overlapping addresses for Mobile Users of Prisma Access.  We applied the traditional GlobalProtect approach by updating the split-tunnel settings to include both the internal network which should be routed over the tunnel and the 0.0.0.0/0.  By default (with no entries in this box), Prisma Access sends all traffic to the regional gateway.  With the overlapping issue, we need the client to ignore the local network routing.  The default route is needed in order to send client internet traffic to the regional gateway.  Without the default route, internet is offloaded at the local network POP rather than the regional Prisma Access gateway.

jasonrakers_0-1659034453315.png

 

  • 6528 Views
  • 11 replies
  • 1 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!