@yannogrodowicz- Thank you very much for giving good material for research. Please see my results below: @yannogrodowicz wrote: The %variable% method definitely works if you have a GlobalProtect license, but you need to make sure your GP client version and your PAN OS version support it. (https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/globalprotect-features/split-tunnel-for-public-applications) I did multiple tests and it does NOT work. I also confirmed it with support and they acknowledged what was repeated many times of forums here - GP is running under SYSTEM space and unable to resolve variables from the USER space. Use curports tool on the endpoint or (( addr.dst in 22.214.171.124/18) or ( addr.dst in 126.96.36.199/14) or ( addr.dst in 188.8.131.52/14 )) and (bytes geq 100000000) on the gateway to see sessions still hammering the GP tunnel. @yannogrodowicz wrote: I finally tested the split-tunneling based on Microsoft subnet list published here https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges#skype-for-business-online-and-microsoft-teams I excluded the routes to the following subnets: 184.108.40.206/18, 220.127.116.11/14, 18.104.22.168/14, and this was working great! This dives some better result comparing with excluding app by name but very temperamental. On most of the cases, Teams.exe ignores local routes and goes to tunnel! But there is remedy! Add this on the gateway: Source_zore: GP_RAS Source_IP:ANY Dest_zore:ANY Destination_IP: 22.214.171.124/18 126.96.36.199/14 188.8.131.52/14 Protocol and App: Not configured (e.g. any) Action:Deny Once added, I can see 4-5 UDP sessions blocked in rapid succession on the PAN every time Team call user starts the Voice or Video call but then user has great experience (local split tunnel exclude) and curports report UDP sessions using real machine IP @yannogrodowicz wrote: Another interesting topic is Microsoft Stream and Microsoft Teams Live events, which are often used for virtual townhall meetings. Here my tests and wireshark captures showed the following: For MS Stream Live events: you'll need to exclude traffic to the following domain: *.azureedge.net port tcp/443 For MS Teams Live events: you'll need to exclude traffic to the following domain: *.streaming.mediaservices.windows.net port tcp/443 I did research on MS documentation and came to similar conclusions, the number of IP subnets for underlying CDNs is too big to exclude, and DNS exclusion is the way forward. added domains to exclusion and this killed video links on https://stream.microsoft.com used for distance learning. As a result I to roll-back the change. The error is "stream%Region%%Number%.azureedge.net can not be reached" (where %Region% and %Number% is some stuff) I did not yet understand if this is an issue with Conditional Access because customer setup limiting o365 access from trusted locations only.
... View more
Seems like there will be many more people interested to graph GlobalProtect capacity due to COVID-9 and WFH I checked past forum posts, seems like there is no simple option to do it onboard. Perhaps good old SNMP will be of help here. We are planning to try out panGPGWUtilizationActiveTunnels.0. Please share your progress in this post MIB detials at https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClaSCAS GlobalProtect gateway utilization panGPGatewayUtilization 184.108.40.206.4.1.254220.127.116.11.5.1 PAN-COMMON-MIB GlobalProtect gateway % utilization panGPGWUtilizationPct.0 18.104.22.168.4.1.25422.214.171.124.5.1.1 PAN-COMMON-MIB GlobalProtect gateway max tunnels panGPGWUtilizationMaxTunnels.0 126.96.36.199.4.1.254188.8.131.52.5.1.2 PAN-COMMON-MIB GlobalProtect gateway active tunnels panGPGWUtilizationActiveTunnels.0 184.108.40.206.4.1.254220.127.116.11.5.1.3 PAN-COMMON-MIB
... View more