Do your internal zone systems have a route for the GP IP pool? If they don’t, you’ll either need to add one or use source NAT for your traffic going to the internal zone.
You can set up a filter for a test client in the Monitor > Packet Capture filter, then go to CLI when that user tries to go to the internal zone resource and check the counters:
show counter global filter delta yes packet filter yes
Run that command a few times, you should be able to see if any drops are happening on the firewall. My gut feeling says routing though, especially since it works if you do NAT.
Sounds to me like you have some kind of subnet overlap. On your core (or whatever you have downstream from your Palo) check out the routing table. Do you have a route that is summarized and maybe overlaps with your VPN subnet?