You can run both a gateway and portal on the same firewall, or you can have multiple distributed gateways throughout your enterprise.
Portal: Where user can download GlobalProtect client, specify gateway.
An internal gateway is an interface on the internal network that is configured as a GlobalProtect gateway and applies security policies for internal resource access.Internal gateways are useful in sensitive environments where authenticated access to critical resources is required. The GlobalProtect app connects to the internal gateway after performing internal host detection to determine the location of the endpoint.
An external gateway (auto discovery )resides outside of the corporate network and provides security enforcement and/or virtual private network (VPN) access for your remote users. By default, the GlobalProtect app automatically connects to the best available external gateway, based on the priority you assign to the gateway, source region, and the response time.
License:
secure remote access or VPN solution via single or multiple internal/external gateways, you don't need any GlobalProtect licenses.
However, to use some of the more advanced features (such as HIP checks and associated content updates, support for the GlobalProtect mobile app, or IPv6 support) you must purchase an annual GlobalProtect Gateway license.
About GlobalProtect Licenses (paloaltonetworks.com)
Configuration
Steps:
1. Create VPN Security Zone, with User ID enabled
Network>Zones
2. Create VPN Tunnel Interface
Network>Interfaces>Tunnel
3.Add Security Policy
3.1 Allow GlobalProtect connects to FW outside interface, this is not required if intrazone-default policy catch the traffic. It is required if a deny access firewall outside IP rule exists.
source zone: untrust
destination zone: untrust
destination address: FW outside interface
application: web-browsing (ssl), panos-global-protect
3.2 Allow VPN client to access internal resource
souece zone: GPVPN
destination zone: trust destination address: LAN
application:
Policies>Security
If GPVPN tunnel interface is in Trusted zone, then traffic between LAN and GPVPN will matches Intrazone-default policy.
4. Create an Authentication Profile, attach a server profile.
Device>Authentication Profile
Device>Server Profiles
Bind DN can also use format: ldap@lab.local
5. Create a SSL/TLS Profile, assign a certificate
6. Gateway
Network>GlobalProtect>Gateways
7. Portal
Network>GlobalProtect>Portals
8. Prepare client software, Download and Activate.
Device>GlobalProtect Client
==========================
After connected, on PA routing table, a prefix of VPN pool points to VPN tunnel interface.
Resource List
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClfXCAS
=====Notes===========
1. Enable client disconnect button
portal agent config > App > Connect Method : On-demand (Manual user initialed connection)
=========Troubleshooting==============
1. user is unable to connect to GP portal using browser
fix: added missing security policy to allow connection to FW outside IP with app: web-browsing
2. user is able to connect to GP portal using browser, but can't connect using GP client
fix: added missing security policy to allow connect to FW outside IP with app: panos-global-protect
3. GP gateway configured with AP group, user can't connect with error: "matching client config not found"
fix: authentication profile is missing or has incorrect User Domain
CLI:
> show user group list
cn=network admins,cn=users,dc=sc,dc=local
cn=helpdesks,cn=users,dc=sc,dc=local
cn=employees,cn=users,dc=sc,dc=local
Total: 4
* : Custom Group
> show user group name cn=employees,cn=users,dc=sc,dc=local
===============
Internal gateways are not really VPNs. They are used in conjunction with an "always-on" VPN connection to provide UserID functionality for PCs/Users connected to your internal networks. Basically, you enable an always-on VPN configuration and provide an internal gateway with a DNS record that can only be resolved from your internal network. Then if your users are in the office, the GlobalProtect client will see that DNS record, connect to the Internal Gateway, and just report to the firewall the Username/IP mapping of the host for UserID purposes. If the user is WFH/on the road, they'll connect to an external gateway and get the full VPN experience with encryption.
Just used to perform gp agent related functions without tunneling traffic.
GP related functions: Userid mapping, hip check/reports, scripting (if needed), quarantine identification (if panos 10.x), etc
Comments
Post a Comment