Forum Discussion
turagittech63
Apr 03, 2024Copper Contributor
global secure access and azure VPN
Hi all,
I have enabled Global Secure Access in our environment to assess how it might benefit us. We also use Azure Point to Site VPN, and I am running into problems that the two clash. Is there a solution to allowing the two coexist.
Do we somehow whitelist traffic to Azure to allow them to coexist or is this still in the pipeline?
1 Reply
- Integrating Global Secure Access with Azure Point-to-Site (P2S) VPN can indeed present some challenges, especially if both solutions are being used concurrently on the same devices. The clash typically arises because both services are trying to manage network traffic, which can lead to routing conflicts or issues with DNS resolution, among other potential conflicts.
Here are some general strategies you might consider to allow these two services to coexist:
1. Routing Configuration: Ensure that the routing tables on the devices are configured to properly handle traffic for both services. This might involve setting up specific routes that direct Azure-related traffic through the P2S VPN and other traffic through Global Secure Access. This approach often involves adjusting the metric values in the routing table so that the preferred routes are chosen based on the destination of the traffic.
2. Split Tunneling: If the VPN is set to route all traffic through the Azure network, you might want to consider configuring split tunneling. Split tunneling allows only Azure-specific traffic to go through the VPN, while the rest of the traffic goes directly to the internet or through Global Secure Access. This can reduce conflicts between the two services.
3. DNS Resolution: Conflicts may also arise from DNS resolution, where both services try to resolve names differently. Ensuring that DNS queries are properly routed to the correct resolver for the service they are intended for can help mitigate this issue.
4. Whitelisting: If Global Secure Access provides a feature to whitelist certain traffic or destinations, you could configure it to recognize Azure P2S VPN traffic as trusted. This might involve identifying the IP ranges used by Azure and configuring Global Secure Access to allow direct communication for these ranges.
5. Vendor Documentation and Support: Since both Azure and the provider of Global Secure Access may have specific recommendations or best practices for such configurations, reviewing their documentation or reaching out to their support teams can provide more tailored advice.
6. Test Environment: Before rolling out any changes to your production environment, it's beneficial to test your configuration in a controlled setting to ensure that the integration does not disrupt your network traffic.
If these general strategies don't resolve the issue, it could be beneficial to provide more details about the specific problems you're encountering. For instance, are there specific applications or services that are not functioning correctly when both Global Secure Access and Azure P2S VPN are active? Details like these can help in diagnosing the issue and providing more precise solutions.