The Blue Coat Threatpulse client connector is installed on the workstation The workstation works well with Threatpulse connector, until a full tunnel VPN is brought up. Once the full tunnel VPN comes up, local network access and access to the Internet goes down. The user is able to access servers on the VPN network. The corporate network has ProxySG's that are used. The Juniper VPN client uses port 443. Other VPN clients may do the same, so the problem may not be just with Juniper VPN.
Please do the following steps:
1.) Login to the Threatpulse portal located at portal.threatpulse.com
2.) Go to Service > Network > Mobility
3.) In the "Bypass IP Address" section, add the IP address of the VPN concentrator that the workstation is connecting to. This will prevent the Cloud client connector from intercepting the packets and sending them to the Threatpulse cloud.
NOTE: If you have Blue Coat ProxySGs on your corporate network that all your traffic will go through, then you will want to add a network location for your ProxySGs so the Cloud client will detect that it is on a protected network and go into passive mode.
Imported Document ID: 000008680
Subscribing will provide email updates when this Article is updated. Login is required.
Thanks for your feedback. Let us know if you have additional comments below. (requires login)
Subscribed to the Article.
Unable to subscribe
Thanks for your additional feedback !!!
Enterprise Support Virtual Agent
Rate Me :
Tell us more:
Welcome! My name is Sami, the Enterprise Support Virtual Agent answering technical support questions.