We have had overlapping subnet scenarios where someone is connecting using GlobalProtect Cloud Services from a subnet that overlaps our internal subnet and, as they have a more specific route, access to internal resources is failing as the taffic is being routed via the local router instead of over the VPN due to the more specific route. Due to the size of our internal network, adding more specific routes for all of our subnets isn't really an option and this could be undone anyway with a more specific route.
Does anyone know a way to force all internal traffic down the VPN instead of following more specific routes?
NOTE: GlobalProtect Cloud Service has changed to Prisma Access.
Sure, but the user could just disable GP to print, or use USB, you have a few options but if you deffo need access to both then specific host routes could be an option as you only need to set them once for all users.
luckily we have a strict no split tunnel policy so never been an issue and for a small group of users that must remote print they have a seperate portal config via AD group that allows GP disable.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!