One of my clients provides me with a VPN connection using Palo Alto Network's GlobalProtect.
It works reliably but blocks other network connections from my Windows client machine when it is active.
At first I thought it blocked everything including the LAN, but have since realised that it is selective. Some web sites still work, while others are blocked.
So I'm guessing it is placing me under the security filtering regime of the organisation while I am connected to it.
Can someone explain how this mechanism works on my client machine in terms of the network protocol stack, or point me some relevant materials?
In particular, what gives this VPN connection the authority to override my other connections, and what strategies might work to circumvent this intrusive behaviour?
No other client VPN I have ever encountered does this, and this disruption actually degrades the quality of support that I am able to provide them.
I am moving devops into a cloud virtual machine environment which I suspect will be effectively orphaned if I try to connect to this VPN from within.