GlobalProtect setup on Azure Palo Alto VM - No access to servers

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

GlobalProtect setup on Azure Palo Alto VM - No access to servers

L1 Bithead

Hi,

I have a Azure Palo Alto VM setup with GlobalProtect access.

I can successfully connect via GlobalProtect and connect to all resources on sites connected via IPSec Tunnels. However, I am not able to access anything on the local segment in Azure. 

Can someone please provide some thoughts as to why this could be?

 

Thanks!

CMoore927039_1-1744224684715.png

 

 

7 REPLIES 7

Cyber Elite
Cyber Elite

did you create a user-defined route (UDR) in a route table and associate it with the internal subnet?

You need to redirect the 'default route' towards the firewall's private IP address to establish connectivity (or use hide NAT for all GP ip-pool towards your vnet's subnet)

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

Thanks for the reply. I updated the drawing with some more detail.

I do have a Route Table poiting traffic to the Inside interface of the Firewall. My servers can get out the Internet and I can connect to all resources attached to the IPSec Tunnels to and from my servers from behind my Azure Palo. The only issue is when I connect via GlobalProtect, I am unable to reach my servers on my 10.3.1.0/24 subnet. I even matched my GlobalProtect Pool to 10.3.1.0/24 with the same result.

I appreciate any feedback.

Thanks!

CMoore927039_0-1744287474753.png

 

L1 Bithead

Here are my static routes on the PA. I don't have a next hop to point my return traffic to other than the INSIDE interface on the PA. Any chance that plays a role in the issue?

 

CMoore927039_1-1744299504920.png

 

 

Cyber Elite
Cyber Elite

Hello,

I typically make the VPN users a different zone to help limit access etc. I would check the unified logs to see where the traffic is getting blocked. Also put your GP users on a different subnet, could make for weird routing issues.

 

Regards,

L1 Bithead

How will the traffic return if I use a different subnet? I do not have any Layer 3 functionality. 

 

Thanks!

Cyber Elite
Cyber Elite

Hello,

The Palo Alto has this. Not sure what you mean by you dont have it?

Regards,

L1 Bithead

I should have been clearer. Typically, on-prem there is a next-hop Layer 3 device where I would send traffic to for my inside network from the PA when I have more than 1 Network (VLAN). Since I only have the Virtual PA and the Azure defined networks, I was trying to figure out how I could accomplish this. I ended up creating a 3rd Interface on the PA with the new subnet, put all the relevant routing on the PA and Azure in place and it is all working now. I suspect you were correct. Having my GlobalProtect pool the same as my Inside LAN was probably causing routing issues.

CMoore927039_0-1744409914138.png
CMoore927039_1-1744409979601.png



 

 

Is there perhaps another way I could have resolved this?

 

Thanks for the help!

  • 350 Views
  • 7 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!