- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
09-27-2018 07:21 AM - last edited on 07-10-2019 07:47 PM by Retired Member
We have had overlapping subnet scenarios where someone is connecting using GlobalProtect Cloud Services from a subnet that overlaps our internal subnet and, as they have a more specific route, access to internal resources is failing as the taffic is being routed via the local router instead of over the VPN due to the more specific route. Due to the size of our internal network, adding more specific routes for all of our subnets isn't really an option and this could be undone anyway with a more specific route.
Does anyone know a way to force all internal traffic down the VPN instead of following more specific routes?
NOTE: GlobalProtect Cloud Service has changed to Prisma Access.
09-27-2018 07:36 AM
Hmm.. no, but do they need local routing, seems a bit odd if your route takes precedence, or is it all the other routes that are local...
never had this issue as we do not allow split tunneling...
09-28-2018 01:28 AM
We mostly see the issue when users are connecting from hotel networks so have no control on their routes. We can manually remove the local route to get the traffic down the tunnel but not the easiest solution for users.
09-28-2018 01:36 AM
if you remove all routes from the gateway config on the palo alto it will auto force all traffic down the tunnel by default.
09-28-2018 04:59 AM - edited 09-28-2018 05:03 AM
Have removed all routes but traffic matching the local route still isn't going down the tunnel.
P.S. thanks for your helpful replies.
09-28-2018 05:22 AM - edited 09-28-2018 05:28 AM
It looks like we need to enable the option "No direct access to local network" to force all traffic down the tunnel but this would prevent access to local resources like printers. Guess thats a decision we'll have to make.
Thanks again for your help Mick.
09-28-2018 07:27 AM
Hello,
How about something like in the article:
Regards,
09-28-2018 08:29 AM
Sure, but the user could just disable GP to print, or use USB, you have a few options but if you deffo need access to both then specific host routes could be an option as you only need to set them once for all users.
luckily we have a strict no split tunnel policy so never been an issue and for a small group of users that must remote print they have a seperate portal config via AD group that allows GP disable.
09-28-2018 08:31 AM
Sorry @OtakarKlier, that was not a reply to you... i only just read your post. Is this doable on local kit or do you need to invest in cloud services.
09-28-2018 09:20 AM
Hello,
The PAN's can do this nativly, I should have read more rather than pasting :). Check this out:
Does this more closely resendble the scenario?
07-28-2022 12:03 PM
I think we have a fix for this issue of overlapping addresses for Mobile Users of Prisma Access. We applied the traditional GlobalProtect approach by updating the split-tunnel settings to include both the internal network which should be routed over the tunnel and the 0.0.0.0/0. By default (with no entries in this box), Prisma Access sends all traffic to the regional gateway. With the overlapping issue, we need the client to ignore the local network routing. The default route is needed in order to send client internet traffic to the regional gateway. Without the default route, internet is offloaded at the local network POP rather than the regional Prisma Access gateway.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!