🔧 GlobalProtect VPN: Troubleshooting Access to Internal Resources

1. Verify Routing Configuration

Ensure that the virtual router associated with the GlobalProtect tunnel interface has appropriate routes to internal networks. For example:

Destination: 10.0.0.0/8
Next Hop: Appropriate interface or IP address

If using multiple virtual routers, configure 'next-vr' routes to facilitate inter-VR communication.

2. Check Security Policies

Confirm that security policies permit traffic from the GlobalProtect zone to internal zones. The policy should include:

3. Examine NAT Rules

Review NAT policies to ensure that traffic from VPN clients to internal resources is not being unintentionally translated. Typically, NAT is not required for internal traffic.

4. Verify DNS Settings

Ensure that VPN clients receive correct DNS server information to resolve internal hostnames. This can be configured in the GlobalProtect gateway settings under 'Client Settings' > 'Network Settings'.

5. Inspect Client Configuration

On the client machine:

6. Monitor Logs and Sessions

On the Palo Alto firewall:

7. Additional Resources