Hi, we have a “Cloud-VPN-Service”. the client is always running, and if the device is outside of office network, it connects via VPN.
Problem is, that devcies inside the office get the office boundary group AND the VPN-Boundary group. But at the office, we want clients only to connect to the local distribution point, to reduce internet traffic.
Only in case of failure, they should connect to DP in Azure. The DP in Azure is MP too (a second one is MP only). So we can’t just block traffic to the servers in Azure.
is there any way to prioritize one boundary group?
> devices inside the office get the office boundary group AND the VPN-Boundary group
Why is that? If the devices only connect if it’s outside the office network then how is a device on your network also in the VPN boundary group?
Also, what do you mean by ‘VPN boundary group’ exactly? Do you mean a range of IPs/Subnets/AD sites you’ve created or an actual ‘VPN Boundary’ type (docs)?
I guess I’m confused. Are your devices connecting to VPN while at the office? They shouldn’t be, and without an active VPN connection they shouldn’t be using your VPN boundary. Unless there is crossover in your IP ranges between the VPN and Office boundaries.
>how does it determine if VPN is on
I’m nearly certain that it’s based on the network adapter’s connection status. So if you have a network adapter that ConfigMgr recognizes as a VPN client and it reports at connected then it’s going to be in the proverbial mix.
I’ve never seen that scenario; every AoVPN solution I’ve seen have an option to not connect when it’s on the network it’s trying to connect to. I’m fairly certain you could create your VPN boundaries only as fallback boundaries (docs) so that they’re only used when the non-VPN adapters aren’t connected.
it’s a “Cloud Magic VPN solution” and yes the adapter is always connected in control panel. but it has a office mode, so it does not route always all traffic trough VPN.
thanks, the fallback idea sounds nice. I will try this. Adding no DP to the VPN boundary and only a fallback. If it’s in Office and VPN Boundary, it should get DP from Office. if a Device is in VPN boundary only, it will fallback to the Azure DPs.
We use GlobalProtect which is always running, but it can detect when it’s internal to your network and foregoes connecting the VPN tunnel. It works great with the VPN boundary type, too.