SSL VPN Split Tunneling and Office 365

UPDATE: Apr 9, 2020 A colleague, Vinicius M. , put together a Configuration guide:
Optimizing Office 365 traffic on Remote Access through VPNs when using BIG-IP APM.pdf

As we shift to a much larger remote workforce than ever before, additional strains are being placed on the remote access infrastructure of many organizations around the world.

Over the past several weeks we have seen organizations adapt quickly, and as it relates to APM, implement split tunneling configurations to specifically allow Office 365 traffic to egress a client's local interface instead of the corporate network via the VPN tunnel. Microsoft publishes their Office 365 endpoints (URLs & IPs) via an API but occasionally they make changes and keeping on top of those changes can be an administrative nightmare.

To make the ongoing maintenance of the Network Access Lists / split tunneling configuration as seamless as possible, I’ve adapted a Python script (see GitHubRepo) we commonly use for SSL Orchestrator deployments to fetch Office 365 endpoints and update one or more Network Access Lists. Used in conjunction with iCall, this script will periodically check for and apply updates to your Network Access List(s) without any administrative intervention, allowing you to focus on other mission critical tasks.

The script is maintained and documented in this GitHub repository: https://github.com/f5regan/o365-apm-split-tunnel


Microsoft has provided us with a statement concerning their recommendations for Office 365 and split tunneling:

"Microsoft recommends excluding traffic destined to key Office 365 services from the scope of VPN connection by configuring split tunneling using published IPv4 and IPv6 address ranges. For best performance and most efficient use of VPN capacity, traffic to these dedicated IP address ranges associated with Office 365 Exchange Online, SharePoint Online and Microsoft Teams (referred to as Optimize category in Microsoft documentation) should be routed directly, outside of the VPN tunnel. Please refer to Microsoft guidance for more detailed information about this recommendation."

Microsoft’s recommendations have been incorporated into the script published in the aforementioned GitHub repository. See the changelog for details.

More Resources

In addition to considering how the steps in this article may relieve some strain on your organization’s remote access infrastructure, I’d highly recommend visiting How to optimize SSL VPN connections when BIG-IP is reaching 100% CPU for further guidance on optimizing SSL VPN connections.

Updated Jun 16, 2022
Version 2.0
  •   Thanks very much I have been playing around on my testbed. One thing I have noticed is I need to apply the Access policy after the update is working. maybe I have missed something(probably 😉 ) but is there another step I need to take o make sure this is applied to the Network Access List automatically ?

     

    Cheers and thanks again

  •  The Access policies/profiles defined in the "access_profiles" list (line 40) should be applied (on or around line 386) when the script is executed. If you have them defined but they aren't applying, make sure you don't have a typo in the name.

  • The access policy and NA​ is being updated ok but I still need to "Apply" the access policy so it won't take effect until this is done is all.. Just needs my manual intervention.

    Also​, adding the URLs to the script includes them in the DNS exclusion. Which is fine as this is the intended functionality of the script but in my case this would likely mean the routing table on the client could potentially be very long as a result.. I believe each entry from the DNS Exclusion list is resolved and then added in as a host route.

    I'm not actually sure Microsoft has an endpoint specifically of windows update like it seems they do for O365.

    Thanks very much for your replies too. This script in any event is great and much appreciated.

    Cheers​

  • Great solution !

    Any plan to extend it to other collaboration services like Webex and Zoom ?

  • this is awesome! but i need to make the connections through a proxy as well :(

  • sh00b's avatar
    sh00b
    Icon for Nimbostratus rankNimbostratus

    Please shout when there's news from PM

    Here's how we might work around it using python for the time being 🙂

     

    import requests
    import json
    
    # Fetch the data from the web service
    response = requests.get("https://endpoints.office.com/endpoints/worldwide?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7")
    
    # Parse the JSON data
    data = json.loads(response.text)
    
    # Create an empty list to hold the Optimize entries
    optimize_entries = []
    
    # Iterate over the entries in the data
    for entry in data:
        # Check if the entry is categorized as "Optimize"
        if entry["category"] == "Optimize":
            # Add the entry to the list
            optimize_entries.append(entry)
    
    # Convert the list of entries to JSON
    optimize_json = json.dumps(optimize_entries)
    
    # Print the JSON data
    print(optimize_json)