The LSVPN implementation allows administrators to quickly connect VPN sites to the main site. The implementation relies on the usage of certificates to authenticate the satellites to the portal, which allows the administrators control who will be allowed access to the VPN network, and who can be denied if emergency action is needed.
To accomplish full control, there needs to be a Certificate Authority(CA) on the Palo Alto Networks firewall, and OCSP responder for the certificates that we will generate with that CA. The process is very similar to controlling GlobalProtect Remote access VPN connections and similar principles are valid and similar steps should be followed.
Note: For more information reference the following link: Controlling GlobalProtect VPN Access with OCSP
Create a CA at the firewall
Create a local OCSP responder
Create a Certificate Profile that will be used to check the status of the certifications with the given OCSP
Create a certificate signed by the CA and include the OCSP responder to be checked for the revocation status of these certificates
Verify if the certificates are generated with the correct information when a satellite connects to GlobalProtect (this should include the correct Issuer)
Verify that the satellites can connect to the VPN network
If needed, revoke the satellite certificate from the gateway and remove this satellite information from portal so that the satellite device will not reconnect to the VPN network.
After the CA and the OSCP responder are in place on the firewall, create a Certificate Profile.
Note: Reference the following link for more information on: How to Configure an OCSP Responder
To create a Certificate Profile for the LSVPN satellites, which will be verifying the revocation status with the created OCSP, go to Device > Certificate Management > Certificate Profile .
GUI:
Device > Certificate Management > Certificates
and click Generate to create the certificate that will be used to sign the satellite certificates.
While creating the certificate, be sure to use the OCSP responder previously created. If this is an intermediate certificate, make sure to select the root CA that is trusted on the satellite. If the root is not trusted on the satellite, or this is a root certificate that is being creating now, be sure to export the certificate from this firewall and import it on the satellite firewall.
At this time, the configuration of the LSVPN needs to be completed. Please reference the
Large Scale VPN (LSPV) Deployment Guide
to complete the configuration.
While configuring the setup, make sure to use the appropriate certificates and certificate profiles previously created.
Include the trusted root CA and the OCSP responder in the Satellite Configuration under the GlobalProtect Portal, so the certificates are checked for the revocation status.
Use the Server Certificate and the Certificate Profile for the GlobalProtect Gateway, as shown below:
After the full LSVPN configuration is complete, verify if connections are establishing from the satellites to GlobalProtect.
Check the connection under
Network > GlobalProtect > Portals
. Under Info > click on Satellite Information:
GUI: Network > GlobalProtect > Gateways . Under Info > click on Satellite Information to access details about the connection to the needed gateway:
The certificate that is used for this process is actually created for the satellite, from the CA that has been specified in the previous steps. By default, the validity of these certificates is 7 days.
As shown below, see the issued certificate under
Device > Certificate Management > Certificates
:
Revoke this certificate by opening the certificate.
Once the Revoke button is clicked, the certificate is no longer valid and should not be accepted by the portal to establish connections to the VPN network:
The status immediately changes to revoked:
From this point on, the connections from that satellite will be dropped, because of authentication with an invalid certificate. This can be viewed in the system logs, as shown below:
sslmgr.log displays the certificate revocation.
After revocation, a connection can not be established any more:
The satellite must be permanently removed from the GlobalProtect Portal Satellite configuration. This means the portal does not have to try to validate the certificate.
To delete, GUI: Network > GlobalProtect > Portals > Satellite Configuration , select the satellite, and delete it from the list: