Ensure that the virtual router associated with the GlobalProtect tunnel interface has appropriate routes to internal networks. For example:
Destination: 10.0.0.0/8
Next Hop: Appropriate interface or IP address
If using multiple virtual routers, configure 'next-vr' routes to facilitate inter-VR communication.
Confirm that security policies permit traffic from the GlobalProtect zone to internal zones. The policy should include:
Review NAT policies to ensure that traffic from VPN clients to internal resources is not being unintentionally translated. Typically, NAT is not required for internal traffic.
Ensure that VPN clients receive correct DNS server information to resolve internal hostnames. This can be configured in the GlobalProtect gateway settings under 'Client Settings' > 'Network Settings'.
On the client machine:
ipconfig /all
(Windows) or
ifconfig
(macOS/Linux) to verify IP address assignment and DNS settings.
On the Palo Alto firewall:
show session all filter source <VPN client IP>
to inspect active sessions.