Connect with us

Hi, what are you looking for?

Internet

GlobalProtect client stuck on connection when workstation is on local network

GlobalProtect client stuck on connection when workstation is on local network

👨‍💻

64845

Created on 09/26/2018 21:06 PM – Last modified 04/20/09 19:50 PM

sign of illness

When users whose computers with the GlobalProtect Client are installed are on the internal network, they will not be able to successfully connect to the GlobalProtect Gateway or Portal. The users trying to connect from the internet are working fine.

environment

a reason

The most common situation is when GlobalProtect Client users on the internal network try to connect to the portal or portal on the external interface. The connection fails because the firewall defines the connection as an internal connection to an external area and the firewall chooses an outbound NAT rule that translates the packet source address into the external interface’s IP address. Since the destination in the packet is already the IP address of the external interface, it now appears that the packet has the same source and destination IP address which could lead to an unintended LAN attack, thus Palo Alto Networks firewalls drop these sessions.

See the following link for more information: Unable to connect or ping a firewall interface

Precision

If GlobalProtect Portal licensing is enabled on the firewall, a better option may be to set up internal gateways and enable GlobalProtect Client to discover and connect to the internal gateway so that traffic is not tunneled when the user is already on the internal network.

To understand how internal portals work, see: GlobalProtect Administrator’s Guide

However, the above does not enable the internal user to connect to the external GlobalProtect portal. If access to the portal is still required, or if there is no authorization, a NAT policy can be configured that works as an exception for the outbound default NAT interface when the connection is on the firewall’s external interface only:

  1. Make a copy of the outgoing NAT rule.
  2. Place it over the current outgoing NAT rule.
  3. Change the name of the rule.
  4. Add the external interface IP address to the original packet destination address field.
  5. Change the translation source field to None.

This allows internal users to connect to the external portal or portal without going through source translation and fallout. If users connect to an external gateway, their tunnel traffic remains encrypted and sent over the internal network towards the external interface.

Owner: Astanton

attachments

[ad_1]
Don’t forget to share this post with friends !

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related

Internet

AnyConnect certificate-based authentication. Cisco community 👨‍💻 The information in this document is based on the following software and hardware versions: ASA 5510 running software...

Internet

AnyConnect: Install a self-signed certificate as a trusted source 👨‍💻 kmgmt-2879-cbs-220-config-security-port objective The goal of this article is to walk you through creating and...

Internet

ITProPortal . Portal 👨‍💻 We live in a dynamic moment in terms of technology. Even criminals are becoming more technically savvy and are using...

Internet

Top 5 Free AV Packages – 👌 Bitdefender Antivirus Free Edition best interface Positives Works on Windows 7 and 8.1 Very easy to use...