Hello u/fmaster007 I imagine as you say, that you connect via GP to the headquarter.
Now a question, are you forwarding all your traffic via global protect ? or have you configured split tunnel, to only use GP for the traffic going to the internal networks and systems of the head office but not to forward the traffic to the Internet ?
If you are forwarding all traffic e.g. 0.0.0.0.0/0 it would not be a routing issue at least from the Global Protect config. Now if you are using split, make sure all the networks you intend and need to reach are configured.
Now, as mentioned by the other colleague, remember that the client and/or the Global Protect zone also has or should have defined access rules, validate that the correct rules exist from Global Protect to the Site to Site VPN(s).
Now, and no less important, assuming you have a Site to Site VPN and at the level of encryption domains you have:
10.10.10.10.0/24 and 10.10.20.0/24 in both directions, which is the standard, the expected, for the correct Site to Site VPN configuration. Now why do I point this out, because Global Protect, GP VPN clients, when they connect have or will have a network range such as 172.16.1.0/24 to give a simple example. When the client connected to GP tries to go to one of the Branch office IPs, it will of course use the IP 172.16.1.0/24 but this IP is not allowed in the VPN Site to Site tunnel, in the encryption domains, therefore it will not allow the traffic.
Now you have a couple of options:
The simple one is to create a NAT rule, exactly source NAT, that when the source connection is the Zone and the network range of the endpoints that use Global Protect and the destination is the Bran-Office, it uses an IP within the range of the central house, that is to say an IP in the range 10.10.10.0/24. With this, when applying a NAT source, the traffic will pass without problems, as long as the corresponding rules exist, since the peer, the branch office, will recognize this traffic as within the range 10.10.10.0/24 and this range already allows it and is part of the encryption domain/Proxy ID of the Site to Site VPN, between the head office/HQ and the BranchOffice.
Now the most complex, add the GP range to the encryption domain / VPN Site to Site in both peer and branch, generate a return route, a return route, for example, from the Branch office, create a static route so that it knows that the GP range is routed back through the VPN Site to Site tunnel interface.
Regards