Large Scale VPN (LSVPN)

The GlobalProtect Large Scale VPN (LSVPN) feature on the Palo Alto Networks Next-Generation Firewall simplifies the deployment of traditional hub and spoke VPNs, enabling you to deploy enterprise networks with several branch offices quickly with a minimum amount of configuration required on the remote satellites . This solution uses certificates for firewall authentication and IPSec to secure data.

LSVPN enables site-to-site VPNs between Palo Alto Networks firewalls. To set up a site-to-site VPN between a Palo Alto Networks firewall and another device, see VPNs . The LSVPN doesn’t require a GlobalProtect subscription.

Palo Alto Networks Logo

The following topics describe the LSVPN components and how to set them up to enable site-to-site VPN services between Palo Alto Networks firewalls:

LSVPN Overview

GlobalProtect provides a complete infrastructure for managing secure access to corporate resources from your remote sites. This infrastructure includes the following components:

The following diagram illustrates how the GlobalProtect LSVPN components work together.

graph TD subgraph "Corporate Network / Data Center" P[("GlobalProtect Portal
(Firewall)")] G1[("Primary LSVPN Gateway
(Firewall)")]; G2[("Backup LSVPN Gateway
(Firewall)")]; end subgraph "Branch Offices (Satellites)" S1[("Satellite 1
(Firewall)")] S2[("Satellite 2
(Firewall)")] S3[("Satellite ...N
(Firewall)")] end P -- "Manages & Distributes Config" --> G1; P -- "Manages & Distributes Config" --> G2; S1 --- P; S2 --- P; S3 --- P; S1 <-->|IPSec Tunnel| G1; S2 <-->|IPSec Tunnel| G1; S1 <-.->|Failover IPSec Tunnel| G2; S2 <-.->|Failover IPSec Tunnel| G2; S3 <-->|IPSec Tunnel| G1; S3 <-.->|Failover IPSec Tunnel| G2; style P fill:#f9f,stroke:#333,stroke-width:2px style G1 fill:#ccf,stroke:#333,stroke-width:2px style G2 fill:#cff,stroke:#333,stroke-width:2px style S1 fill:#cfc,stroke:#333,stroke-width:2px style S2 fill:#cfc,stroke:#333,stroke-width:2px style S3 fill:#cfc,stroke:#333,stroke-width:2px

High-level LSVPN topology showing Portal, Gateways, and Satellites.

Create Interfaces and Zones for the LSVPN

Configure the following interfaces and zones for your LSVPN infrastructure:

For more information about portals, gateways, and satellites see LSVPN Overview .

STEP 1 | Configure a Layer 3 interface.

The portal and each gateway and satellite all require a Layer 3 interface to enable traffic to be routed between sites.

If the gateway and portal are on the same firewall, you can use a single interface for both components.

  1. Select Network > Interfaces > Ethernet and then select the interface you want to configure for GlobalProtect LSVPN.
  2. Select Layer3 from the Interface Type drop-down.
  3. On the Config tab, select the Security Zone to which the interface belongs:
    • The interface must be accessible from a zone outside of your trust network. Consider creating a dedicated VPN zone for visibility and control over your VPN traffic.
    • If you haven’t yet created the zone, select New Zone from the Security Zone dropdown, define a Name for the new zone, and then click OK .
  4. Select the Virtual Router to use.
  5. Assign an IP address to the interface:
    • For an IPv4 address, select IPv4 and Add the IP address and network mask to assign to the interface, for example 203.0.11.100/24 .
    • For an IPv6 address, select IPv6 , Enable IPv6 on the interface , and Add the IP address and network mask to assign to the interface, for example 2001:1890:12f2:11::10.1.8.160/80 .
  6. To save the interface configuration, click OK .

STEP 2 | On the firewall(s) hosting the GlobalProtect gateway(s), configure the logical tunnel interface that will terminate VPN tunnels established by the GlobalProtect satellites.

IP addresses are only required on the tunnel interface when you plan to use dynamic routing. However, assigning an IP address to the tunnel interface can be useful for troubleshooting connectivity issues.

Make sure to enable User-ID in the zone where the VPN tunnels terminate.

  1. Select Network > Interfaces > Tunnel and click Add .
  2. In the Interface Name field, specify a numeric suffix, such as .2 .
  3. On the Config tab, expand the Security Zone drop-down to define the zone as follows:
    • To use your trust zone as the termination point for the tunnel, select the zone from the drop-down.
    • ( Recommended ) To create a separate zone for VPN tunnel termination, click New Zone . In the Zone dialog, define a Name for the new zone (for example lsvpn-tun ), select the Enable User Identification check box, and then click OK .
  4. Select the Virtual Router .
  5. ( Optional ) To assign an IP address to the tunnel interface:
    • For an IPv4 address, select IPv4 and Add the IP address and network mask to assign to the interface, for example 203.0.11.100/24 .
    • For an IPv6 address, select IPv6 , Enable IPv6 on the interface , and Add the IP address and network mask to assign to the interface, for example 2001:1890:12f2:11::10.1.8.160/80 .
  6. To save the interface configuration, click OK .

STEP 3 | If you created a separate zone for tunnel termination of VPN connections, create a security policy to enable traffic flow between the VPN zone and your trust zone.

For example, a policy rule enables traffic between the lsvpn-tun zone and the L3-Trust zone. See Create a Security Policy Rule .

STEP 4 | Commit your changes.

Click Commit .

Enable SSL Between GlobalProtect LSVPN Components

All interaction between the GlobalProtect components occurs over an SSL/TLS connection. Therefore, you must generate and/or install the required certificates before configuring each component so that you can reference the appropriate certificate(s) and/or certificate profiles in the configurations for each component. The following sections describe the supported methods of certificate deployment, descriptions and best practice guidelines for the various GlobalProtect certificates, and provide instructions for generating and deploying the required certificates:

About Certificate Deployment

There are two basic approaches to deploying certificates for GlobalProtect LSVPN:

graph LR A[Enterprise CA] --> B{Portal}; C[Self-Signed CA on Portal] --> B; B -- "Issues/Manages Certs for" --> D[Gateways]; B -- "Issues/Manages Certs for" --> E[Satellites]; subgraph "Certificate Authority Options" direction LR A C end subgraph "LSVPN Components" direction TB B D --- E end style A fill:#lightgrey,stroke:#333,stroke-width:2px style C fill:#lightgrey,stroke:#333,stroke-width:2px style B fill:#f9f,stroke:#333,stroke-width:2px style D fill:#ccf,stroke:#333,stroke-width:2px style E fill:#cfc,stroke:#333,stroke-width:2px

Certificate deployment approaches for LSVPN.

Deploy Server Certificates to the GlobalProtect LSVPN Components

The GlobalProtect LSVPN components use SSL/TLS to authenticate mutually. Before deploying the LSVPN, you must assign an SSL/TLS service profile to each portal and gateway. The profile specifies the server certificate and allowed TLS versions for communication with satellites. You don’t need to create SSL/TLS service profiles for the satellites because the portal will issue a server certificate for each satellite during the first connection as part of the satellite registration process.

In addition, you must import the root certificate authority (CA) certificate used to issue the server certificates onto each firewall that you plan to host as a gateway or satellite. Finally, on each gateway and satellite participating in the LSVPN, you must configure a certificate profile that will enable them to establish an SSL/TLS connection using mutual authentication.

The following workflow shows the best practice steps for deploying SSL certificates to the GlobalProtect LSVPN components:

STEP 1 | On the firewall hosting the GlobalProtect portal, create the root CA certificate for signing the certificates of the GlobalProtect components.

Create a Self-Signed Root CA Certificate :

  1. Select Device > Certificate Management > Certificates , then Device Certificates . Select Generate .
  2. Enter a Certificate Name , such as LSVPN_CA .
  3. Don’t select a value in the Signed By field (this is what indicates that it’s self-signed).
  4. Select the Certificate Authority check box and then click OK to generate the certificate.

STEP 2 | Create SSL/TLS service profiles for the GlobalProtect portal and gateways.

For the portal and each gateway, you must assign an SSL/TLS service profile that references a unique self-signed server certificate.

The best practice is to issue all of the required certificates on the portal, so that the signing certificate (with the private key) doesn’t have to be exported.

If the GlobalProtect portal and gateway are on the same firewall interface, you can use the same server certificate for both components.

  1. Use the root CA on the portal to Generate a Certificate for each gateway that you’ll deploy:
    1. Select Device > Certificate Management > Certificates , then Device Certificates . Select Generate .
    2. Enter a Certificate Name .
    3. Enter the FQDN ( recommended ) or IP address of the interface where you plan to configure the gateway in the Common Name field.
    4. In the Signed By field, select the LSVPN_CA certificate you created.
    5. In the Certificate Attributes section, click Add and define the attributes to identify the gateway uniquely. If you add a Host Name attribute (which populates the SAN field of the certificate), it must exactly match the value you defined for the Common Name .
    6. Generate the certificate.
  2. Configure an SSL/TLS Service Profile for the portal and each gateway:
    1. Select Device > Certificate Management > SSL/TLS Service Profile and click Add .
    2. Enter a Name to identify the profile and select the server Certificate you created for the portal or gateway.
    3. Define the range of TLS versions ( Min Version to Max Version ) allowed for communicating with satellites and click OK .

STEP 3 | Deploy the self-signed server certificates to the gateways.

Best Practices:

  • Export the self-signed server certificates issued by the root CA from the portal and import them onto the gateways.
  • Be sure to issue a unique server certificate for each gateway.
  • The Common Name (CN) and, if applicable, the Subject Alternative Name (SAN) fields of the certificate must match the IP address or FQDN of the interface where you configure the gateway.
  1. On the portal, select Device > Certificate Management > Certificates , then Device Certificates . Select the gateway certificate you want to deploy, and click Export .
  2. Select Encrypted Private Key and Certificate (PKCS12) from the File Format drop-down.
  3. Enter (and re-enter) a Passphrase to encrypt the private key associated with the certificate and then click OK to download the PKCS12 file to your computer.
  4. On the gateway, select Device > Certificate Management > Certificates , then Device Certificates . Select Import .
  5. Enter a Certificate Name .
  6. Enter the path and name to the Certificate File that you downloaded from the portal, or Browse to find the file.
  7. Select Encrypted Private Key and Certificate (PKCS12) as the File Format .
  8. Enter the path and name to the PKCS12 file in the Key File field or Browse to find it.
  9. Enter and re-enter the Passphrase you used to encrypt the private key when you exported it from the portal and then click OK to import the certificate and key.

STEP 4 | Import the root CA certificate used to issue server certificates for the LSVPN components.

Import the root CA certificate onto all gateways and satellites. For security reasons, make sure you export the certificate only, and not the associated private key.

  1. Download the root CA certificate from the portal.
    1. Select Device > Certificate Management > Certificates , then Device Certificates .
    2. Select the root CA certificate used to issue certificates for the LSVPN components and click Export .
    3. Select Base64 Encoded Certificate (PEM) from the File Format drop-down and click OK to download the certificate. (Do not export the private key.)
  2. On the firewalls hosting the gateways and satellites, import the root CA certificate.
    1. Select Device > Certificate Management > Certificates , then Device Certificates . Select Import .
    2. Enter a Certificate Name that identifies the certificate as your client CA certificate.
    3. Browse to the Certificate File you downloaded from the CA.
    4. Select Base64 Encoded Certificate (PEM) as the File Format and then click OK .
    5. Select the certificate you imported on the Device Certificates tab to open it.
    6. Select Trusted Root CA and then click OK .
    7. Commit the changes.

STEP 5 | Create a Certificate Profile.

The GlobalProtect LSVPN portal and each gateway require a Certificate Profile that specifies which certificate to use to authenticate the satellites.

  1. Select Device > Certificate Management > Certificate Profile and click Add and enter a profile Name .
  2. Make sure that the Username Field is set to None .
  3. In the CA Certificates field, click Add , select the trusted root CA certificate you imported in the previous step.
  4. ( Recommended ) Enable use of CRL and/or OCSP to enable certificate status verification.
  5. Click OK to save the profile.

STEP 6 | Commit your changes.

Click Commit .

Deploy Client Certificates to the GlobalProtect Satellites Using SCEP

As an alternative method for deploying client certificates to satellites, you can configure your GlobalProtect portal to act as a Simple Certificate Enrollment Protocol (SCEP) client to a SCEP server in your enterprise PKI. SCEP operation is dynamic in that the enterprise PKI generates a certificate when the portal requests it and sends the certificate to the portal.

When the satellite device requests a connection to the portal or gateway, it also includes its serial number with the connection request. The portal submits a CSR to the SCEP server using the settings in the SCEP profile and automatically includes the serial number of the device in the subject of the client certificate. After receiving the client certificate from the enterprise PKI, the portal transparently deploys the client certificate to the satellite device. The satellite device then presents the client certificate to the portal or gateway for authentication.

sequenceDiagram participant S as Satellite participant P as Portal (SCEP Client) participant E as Enterprise PKI (SCEP Server) S->>P: Initial Connection (includes Serial#) P->>E: CSR (includes Serial# from S, using SCEP Profile) alt Challenge-Response P->>E: Request Challenge (if Dynamic) E-->>P: Challenge P->>E: Challenge Response end E-->>P: Issues Client Certificate P-->>S: Deploys Client Certificate S->>P: Presents Client Certificate for Auth

SCEP client certificate deployment flow.

STEP 1 | Create a SCEP profile.

  1. Select Device > Certificate Management > SCEP and then Add a new profile.
  2. Enter a Name to identify the SCEP profile.
  3. ( Optional ) If this profile is for a firewall with multiple virtual systems capability, select a virtual system or Shared as the Location where the profile is available.

STEP 2 | ( Optional ) To make the SCEP-based certificate generation more secure, configure a SCEP challenge-response mechanism between the PKI and portal for each certificate request.

After you configure this mechanism, its operation is invisible, and no further input from you is necessary.

To comply with the U.S. Federal Information Processing Standard (FIPS), use a Dynamic SCEP challenge and specify a Server URL that uses HTTPS (see step 7 ).

Select one of the following options:

STEP 3 | Specify the settings for the connection between the SCEP server and the portal to enable the portal to request and receive client certificates.

To identify the satellite, the portal automatically includes the device serial number in the CSR request to the SCEP server. Because the SCEP profile requires a value in the Subject field, you can leave the default $USERNAME token even though the value isn’t used in client certificates for LSVPN.

  1. Configure the Server URL that the portal uses to reach the SCEP server in the PKI (for example, http://10.200.101.1/certsrv/mscep/ ).
  2. Enter a string (up to 255 characters in length) in the CA-IDENT Name field to identify the SCEP server.
  3. Select the Subject Alternative Name Type :
    • RFC 822 Name —Enter the email name in a certificate’s subject or Subject Alternative Name extension.
    • DNS Name —Enter the DNS name used to evaluate certificates.
    • Uniform Resource Identifier —Enter the name of the resource from which the client will obtain the certificate.
    • None —Don’t specify attributes for the certificate.

STEP 4 | ( Optional ) Configure cryptographic settings for the certificate.

STEP 5 | ( Optional ) Configure the permitted uses of the certificate, either for signing or encryption.

STEP 6 | ( Optional ) To ensure that the portal is connecting to the correct SCEP server, enter the CA Certificate Fingerprint . Obtain this fingerprint from the SCEP server interface in the Thumbprint field.

  1. Enter the URL for the SCEP server’s administrative UI (for example, http:// <hostname or IP>/CertSrv/mscep_admin/ ).
  2. Copy the thumbprint and enter it in the CA Certificate Fingerprint field.

STEP 7 | ( Optional ) Enable mutual SSL authentication between the SCEP server and the GlobalProtect portal. This is required to comply with the U.S. Federal Information Processing Standard (FIPS).

FIPS-CC operation is indicated on the firewall login page and in its status bar.

Select the SCEP server’s root CA Certificate . Optionally, you can enable mutual SSL authentication between the SCEP server and the GlobalProtect portal by selecting a Client Certificate .

STEP 8 | Save and commit the configuration.

  1. Click OK to save the settings and close the SCEP configuration.
  2. Commit the configuration.

The portal attempts to request a CA certificate using the settings in the SCEP profile and saves it to the firewall hosting the portal. If successful, the CA certificate is shown in Device > Certificate Management > Certificates .

STEP 9 | ( Optional ) If after saving the SCEP profile, the portal fails to obtain the certificate, you can manually generate a certificate signing request (CSR) from the portal.

  1. Select Device > Certificate Management > Certificates , then Device Certificates . Select Generate .
  2. Enter a Certificate Name . This name can’t contain spaces.
  3. Select the SCEP Profile to use to submit a CSR to your enterprise PKI.
  4. Click OK to submit the request and generate the certificate.

Configure the Portal to Authenticate Satellites

To register with the LSVPN, each satellite must establish an SSL/TLS connection with the portal. After establishing the connection, the portal authenticates the satellite to ensure that is authorized to join the LSVPN. After successfully authenticating the satellite, the portal will issue a server certificate for the satellite and push the LSVPN configuration specifying the gateways to which the satellite can connect and the root CA certificate required to establish an SSL connection with the gateways.

There are multiple ways that the satellite can authenticate to the portal during its initial connection:

PAN-OS releases support the following authentication methods:

PAN-OS RELEASE SUPPORTED AUTHENTICATION METHOD
PAN-OS 10.0 and earlier releases Serial number Authentication method
PAN-OS 10.1 and later releases Username/password and Satellite Cookie Authentication method (Default authentication method)
While configuring the Username/ password and Satellite Cookie Authentication method, configure the satellite cookie expiration to a value more than the satellite upgrade time to avoid login failures.
PAN-OS 11.1.3 and later releases
  • Username/password and Satellite Cookie Authentication method (Default authentication method)
  • Serial number and IP address Authentication method

Before upgrading or downgrading to a particular PAN-OS release, be aware of the authentication methods supported.

Refer to Upgrade and Downgrade Considerations to learn about the authentication method supported when you upgrade or downgrade the firewall from one PAN-OS release to another.

(PAN-OS 11.0.1 and later releases) You can configure the cookie expiry period from 1 to 5 years, while the default remains as 6 months.

On the portal:

On the satellite:

Serial Number and IP Address Authentication Method

( PAN-OS 11.1.3 and later releases ) The Serial number and IP address Authentication method will be established successfully only when you configure the necessary parameters correctly and in the correct order.

The following table provides you with the details on how your parameter settings impact the establishment of Serial number and IP address authentication:

Serial Number and IP Address Authentication Method Configured retry-interval (Default is 5 seconds) Serial Number IP Address in Allow List Satellite Cookie Established Authentication Method
Enabled The retryinterval value is greater than or equal to 5 Registered Allowed Will not be checked Serial number and IP address Authentication method will be established successfully.
Enabled The retryinterval value is greater than or equal to 5 Registered Not Allowed Will not be checked Fails to establish Serial number and IP address Authentication.
Enabled The retryinterval value is greater than or equal to 5 Not Registered Will not be checked Will not be checked Fails to establish Serial number and IP address Authentication.
Disabled The retryinterval will not be checked Will not be checked Will not be checked Default behavior The default authentication method, Username/ password and Satellite Cookie Authentication method will be established successfully.

The satellite initiates a connection to the portal upon successful configuration of the satellite serial number registered and the satellite device IP address in the satellite IP allow list on the portal. You should also ensure that the portal is running PAN-OS 11.1.3 or later versions before configuring Serial number and IP address Authentication on the portal.

We don't support broadcast, multicast, loopback, zeronet IPv4 and IPv6 addresses for the serial number and IP address authentication method.

In the LSVPN serial number and IP address authentication method, PAN-OS stores the configuration changes in the database internally. Therefore, the latest saved configuration is applied when you upgrade to or downgrade from this feature.

Use the following workflow to authenticate the satellite using the Serial number and IP address Authentication method.

STEP 1 | Log in to the portal web interface and select Network > GlobalProtect > Portals > GlobalProtect Portal > Satellite Configuration > GlobalProtect Satellite > Devices to add a new satellite serial number to the GlobalProtect portal. Commit the configuration.

STEP 2 | Access the CLI .

You can't access the Serial number and IP address Authentication related CLIs from the Panorama.

STEP 3 | Follow the below steps in the same order to configure the parameters related to Serial number and IP address Authentication on a firewall configured as a GlobalProtect portal. Otherwise, the satellite authentication might fail and an administrator's intervention is required to enter the username and password on the satellite.

  1. Enter the following operational command per portal to add a satellite device IP address on the GlobalProtect portal.

    Configure a specific IP address, subnet, or a range to add one or more satellite devices. Both IPv4 and IPv6 addresses are supported.

    username@hostname> set global-protect global-protect-portal portal <portal_name> satellite-serialnumberip-auth satelliteip-allowlist entry <value>

    Where <value> is the IPv4 address, IPv6 address, IP range, or IP subnet of the satellite device that you want to add.

    For example:

    username@hostname> set global-protect global-protect-portal portal gp-portal-1 satellite-serialnumberip-auth satelliteip-allowlist entry 192.0.2.0-192.0.2.100

    You can also exclude a specific range of IP address from the satellite-ip-allowlist that you don't wish to configure as a satellite. To do this, use the following command:

    username@hostname> set global-protect global-protect-portal portal <portal_name> satellite-serialnumberip-auth satelliteip-exclude-fromrange <ip-address> exclude-list <value>

    Where satellite-ip-exclude-fromrange <ip-address> is the IPv4 or IPv6 subnet or range of the IP address that you want to exclude from configuring as a satellite device. The IP address that you want to exclude must be within the IP address range that you configured in the satellite-ip-allowlist .

    For example:

    username@hostname> set global-protect global-protectportal portal gp-portal-1 satellite-serialnumberip-auth satellite-ip-exclude-fromrange 192.0.2.0-192.0.2.100 exclude-list 192.0.2.20-192.0.2.30

    We support the following IP4 and IPv6 address formats to configure the satellite-ipallowlist .

    Table 11: Supported IPv4 and IPv6 Address Formats (Note: This table was duplicated in the original, showing only relevant one here)
    IP Address Format IPv4 Address IPv6 Address
    A specific IP address x.x.x.x
    For example:
    192.0.2.0
    For example:
    2001:db8::
    IP address subnet x.x.x.x/x
    For example:
    192.0.2.0/24
    y
    For example:
    2001:db8::/32
    IP address range x.x.x.x-x.x.x.x
    For example: 192.0.2.10-192.0.2.20
     

    ( HA deployments only ) The added satellite IP address list is synchronized among the HA peers.

    Ensure that Enable Config Sync (select Device > High Availability > General ) is enabled on your HA configuration to configure the Serial number and IP address Authentication method. This setting is required to synchronize the two firewall configurations (that is enabled by default).

    You must add the satellite device serial number first that allows the portal to select the correct satellite configuration.

    If the satellite devices in the HA pair use different IP addresses, then configure both the IP addresses in the satellite IP allow list on the portal.

  2. Enter the following operational command per portal to configure a retry interval for the serial number and IP address authentication in case of failure in establishing the authentication method.
    username@hostname> set global-protect global-protect-portal portal <name> satellite-serialnumberip-auth retryinterval <value>

    The retry interval range is 5 to 86,400 seconds and the default value is 5 seconds.

    For example:

    username@hostname> set global-protect global-protect-portal portal gp-portal-1 satellite-serialnumberip-auth retryinterval 100

    ( HA deployments only ) The authentication retry interval is synchronized among the HA peers.

  3. Enter the following operational command to enable the serial number and IP address authentication method on the firewall where you want to enable the Serial number and IP address Authentication method.
    username@hostname> set global-protect satelliteserialnumberip-auth enable

    The serial number and IP address authentication method is disabled by default.

    When the Serial number and IP address Authentication is enabled and if the satellite authentication fails, then based on the retry interval, the satellite will retry the authentication process again. There is no fall back mechanism available to support Username/Password and Satellite Cookie based authentication in case of failure in configuring the Serial number and IP address Authentication method.

    If attempting to enable the Serial number and IP address Authentication method results in failure, check for the following:

    • Whether the portal is running PAN-OS 11.1.3 or later versions.
    • Whether you have added the satellite device's IP address to the satellite IP allow list on the GlobalProtect portal.
    • Whether you have configured the satellite's serial number in Network > GlobalProtect > Portals > GlobalProtect Portal > Satellite Configuration > GlobalProtect Satellite > Devices .

    Enter any random username and password (or just press enter) in the pop-up dialog on the satellite to retrigger the authentication process in the following cases:

    • A scenario where the portal is running PAN-OS 11.1.3 and the satellite is running version earlier to 11.1.3, and the satellite cookie has expired. In this case, when you attempt to enable the Serial number and IP address Authentication method without adding the satellite IP address in the satellite IP allow list on the portal, satellite authentication fails. The failure is due to a missing IP address in the satellite IP allow list.
    • A scenario where the satellite is running version earlier to 11.1.3 and the portal is upgraded to PAN-OS 11.1.3. In the meantime, the satellite cookie expires before enabling the Serial number and IP address Authentication method on the portal. Then satellite authentication fails due to satellite cookie expiration.

    ( HA deployments only ) The serial number and IP address authentication method that is enabled is synchronized among the HA peers.

STEP 4 | ( Optional ) Use the following operational commands to disable, delete, or view information about the serial number and IP address authentication method.

  1. Enter the following command to disable the serial number and IP address authentication method on the firewall.
    username@hostname> set global-protect satelliteserialnumberip-auth disable

    ( HA deployments only ) The serial number and IP address authentication method that is disabled is synchronized among the HA peers.

  2. Enter the following command to view all the information related to the serial number and IP address authentication method on the portal.
    username@hostname> show global-protect-portal global-protectportal portal <name> satellite-serialnumberip-auth all
  3. Enter the following command to view if the serial number and IP address authentication method is enabled or disabled on the firewall configured as a portal.
    username@hostname> show global-protect-portal satelliteserialnumberip-auth status
  4. Enter the following command per portal to view the serial number and IP address retry interval.
    username@hostname> show global-protect-portal global-protectportal portal <name> satellite-serialnumberip-auth retryinterval
  5. Enter the following command per portal to view all the configured allowed satellite device IP addresses.

    This command displays both the IPv4 and IPv6 addresses that you have configured as a satellite IP allowed list in a sorted order.

    username@hostname> show global-protect-portal global-protectportal portal <name> satellite-serialnumberip-auth satelliteip-allowlist
  6. Enter the following command per portal to delete a satellite device IP address from the satellite IP allow list.
    username@hostname> delete global-protect global-protect-portal portal <portal_name> satellite-ip-list allowlist-entry ipaddress <value>

    Where <value> is the IPv4 address, IPv6 address, IP address range, or IP address subnet of the satellite device you want to delete.

    ( HA deployments only ) The deleted satellite devices IP address from the satellite IP allow list is synchronized among the HA peers.

  7. Enter the following command per portal to delete a satellite device IP address from the satellite IP exclude list. You can delete only the entries that are added in the IP address exclude list. By deleting the entries from the exclude list, you are allowing these IP addresses to be configured in the satellite IP allow list.
    username@hostname> delete global-protect global-protect-portal portal <portal_name> satellite-ip-list excludelist-entry ip <value>

    Where <value> is the IPv4 address, IPv6 address, IP address range, or IP address subnet of the satellite device you want to delete from the exclude list entry.

    ( HA deployments only ) The deleted satellite devices IP address from the satellite IP exclude list is synchronized among the HA peers.

  8. Enter the following command per portal to delete all the satellite devices IP address from the satellite IP allow list.
    username@hostname> delete global-protect global-protect-portal portal <name> satellite-ip-list satellite-ip-allowlist-all

    ( HA deployments only ) The deleted satellite IP address list is synchronized among the HA peers.

Configure GlobalProtect Gateways for LSVPN

Because the GlobalProtect configuration that the portal delivers to the satellites includes the list of gateways the satellite can connect to, it’s a good idea to configure the gateways before configuring the portal.

Before you can configure the GlobalProtect gateway, you must complete the following tasks:

Configure each GlobalProtect gateway to participate in the LSVPN as follows:

STEP 1 | Add a gateway.

  1. Select Network > GlobalProtect > Gateways and click Add .
  2. In the General screen, enter a Name for the gateway. The gateway name should have no spaces and, as a best practice, should include the location or other descriptive information to help users and administrators identify the gateway.
  3. ( Optional ) Select the virtual system to which this gateway belongs from the Location field.

STEP 2 | Specify the network information that enables satellite devices to connect to the gateway.

If you haven’t created the network interface for the gateway, see Create Interfaces and Zones for the LSVPN for instructions.

  1. Select the Interface that satellites will use for ingress access to the gateway.
  2. Specify the IP Address Type and IP address for gateway access:
    • The IP address type can be IPv4 (only), IPv6 (only), or IPv4 and IPv6 . Use IPv4 and IPv6 if your network supports dual stack configurations, where IPv4 and IPv6 run at the same time.
    • The IP address must be compatible with the IP address type. For example, 172.16.1.0/24 for IPv4 addresses or 21DA:D3:0:2F3B::/64 for IPv6 addresses. For dual stack configurations, enter both an IPv4 and IPv6 address.
  3. Click OK to save changes.

STEP 3 | Specify how the gateway authenticates satellites attempting to establish tunnels. If you haven’t yet created an SSL/TLS Service Profile for the gateway, see Deploy Server Certificates to the GlobalProtect LSVPN Components .

If you haven’t set up the authentication profiles or certificate profiles, see Configure the Portal to Authenticate Satellites for instructions.

If you have not yet set up the certificate profile, see Enable SSL Between GlobalProtect LSVPN Components for instructions.

On the GlobalProtect Gateway configuration dialog, select Authentication and then configure any of the following:

STEP 4 | Configure the tunnel parameters and enable tunneling.

  1. On the GlobalProtect Gateway configuration dialog, select Satellite > Tunnel Settings .
  2. Select the Tunnel Configuration check box to enable tunneling.
  3. Select the Tunnel Interface that you defined to terminate VPN tunnels established by the GlobalProtect satellites when you performed the task to Create Interfaces and Zones for the LSVPN .
  4. ( Optional ) If you want to preserve the Type of Service (ToS) information in the encapsulated packets, select Copy TOS .

If there are multiple sessions inside the tunnel (each with a different ToS value), copying the ToS header can cause the IPSec packets to arrive out of order.

STEP 5 | ( Optional ) Enable tunnel monitoring.

Tunnel monitoring enables satellites to monitor its gateway tunnel connection, allowing it to failover to a backup gateway if the connection fails. Failover to another gateway is the only type of tunnel monitoring profile supported with LSVPN.

  1. Select the Tunnel Monitoring check box.
  2. Specify the Destination IP Address that the satellites should use to determine if the gateway is active. You can specify an IPv4 address, and IPv6 address, or both. Alternatively, if you configured an IP address for the tunnel interface, you can leave this field blank and the tunnel monitor will instead use the tunnel interface to determine if the connection is active.
  3. Select Failover from the Tunnel Monitor Profile drop-down (this is the only supported tunnel monitor profile for LSVPN).

STEP 6 | Select the IPSec Crypto profile to use when establishing tunnel connections.

The profile specifies the type of IPSec encryption and the authentication method for securing the data that will traverse the tunnel. Because both tunnel endpoints in an LSVPN are trusted firewalls within your organization, you can typically use the default (predefined) profile, which uses ESP as the IPSec protocol, group2 for the DH group, AES-128-CBC for encryption, and SHA-1 for authentication.

In the IPSec Crypto Profile drop-down, select default to use the predefined profile or select New IPSec Crypto Profile to define a new profile .

STEP 7 | Configure the network settings to assign the satellites during establishment of the IPSec tunnel.

You can also configure the satellite to push the DNS settings to its local clients by configuring a DHCP server on the firewall hosting the satellite. In this configuration, the satellite will push the DNS settings it learns from the gateway to the DHCP clients.

  1. On the GlobalProtect Gateway configuration dialog, select Satellite > Network Settings .
  2. ( Optional ) If clients local to the satellite need to resolve FQDNs on the corporate network, configure the gateway to push DNS settings to the satellites in one of the following ways:
    • If the gateway has an interface that is configured as a DHCP client, you can set the Inheritance Source to that interface and assign the same settings received by the DHCP client to GlobalProtect satellites. You can also inherit the DNS suffix from the same source.
    • Manually define the Primary DNS , Secondary DNS , and DNS Suffix settings to push to the satellites.
  3. To specify the IP Pool of addresses to assign the tunnel interface on the satellites when the VPN is established, click Add and then specify the IP address range(s) to use.
  4. To define what destination subnets to route through the tunnel click Add in the Access Route area and then enter the routes as follows:
    • If you want to route all traffic from the satellites through the tunnel, leave this field blank.
    • In this case, all traffic except traffic destined for the local subnet will be tunneled to the gateway.

    • To route only some traffic through the gateway (called split tunneling ), specify the destination subnets that must be tunneled. In this case, the satellite will route traffic that isn’t destined for a specified access route using its own routing table. For example, you may choose to only tunnel traffic destined for your corporate network, and use the local satellite to enable internet access safely.
    • If you want to enable routing between satellites, enter the summary route for the network protected by each satellite.

STEP 8 | ( Optional ) Define what routes, if any, the gateway will accept from satellites.

By default, the gateway won’t add any routes that the satellites advertise to its routing table. If you don’t want the gateway to accept routes from satellites, you don’t need to complete this step.

  1. To enable the gateway to accept routes advertised by satellites, select Satellite > Route Filter .
  2. Select the Accept published routes check box.
  3. To filter which of the routes advertised by the satellites to add to the gateway routing table, click Add and then define the subnets to include. For example, if all the satellites are configured with subnet 192.168.x.0/24 on the LAN side, configuring a permitted route of 192.168.0.0/16 to enable the gateway to accept only routes from the satellite if it is in the 192.168.0.0/16 subnet.

STEP 9 | Save the gateway configuration.

  1. Click OK to save the settings and close the GlobalProtect Gateway configuration dialog.
  2. Commit the configuration.

GlobalProtect Portal for LSVPN Prerequisite Tasks

Before configuring the GlobalProtect portal, you must complete the following tasks:

Configure the Portal

The GlobalProtect portal provides the management functions for your GlobalProtect LSVPN. Every satellite system that participates in the LSVPN receives configuration information from the portal, including information about available gateways as well as the certificate it needs in order to connect to the gateways.

After you’ve completed the GlobalProtect Portal for LSVPN Prerequisite Tasks , configure the GlobalProtect portal as follows:

STEP 1 | Add the portal.

  1. Select Network > GlobalProtect > Portals and click Add .
  2. On the General tab, enter a Name for the portal. The portal name shouldn’t contain any spaces.
  3. ( Optional ) Select the virtual system to which this portal belongs from the Location field.

STEP 2 | Specify the network information to enable satellites to connect to the portal.

If you haven’t yet created the network interface for the portal, see Create Interfaces and Zones for the LSVPN for instructions.

  1. Select the Interface that satellites will use for ingress access to the portal.
  2. Specify the IP Address Type and IP address for satellite access to the portal:
    • The IP address type can be IPv4 (for IPv4 traffic only), IPv6 (for IPv6 traffic only, or IPv4 and IPv6 . Use IPv4 and IPv6 if your network supports dual stack configurations, where IPv4 and IPv6 run at the same time.
    • The IP address must be compatible with the IP address type. For example, 172.16.1.0/24 for IPv4 addresses or 21DA:D3:0:2F3B::/64 for IPv6 addresses. For dual stack configurations, enter both an IPv4 and IPv6 address.
  3. Click OK to save changes.

STEP 3 | Specify an SSL/TLS Service Profile to use to enable the satellite to establish an SSL/TLS connection to the portal.

If you haven’t yet created an SSL/TLS Service Profile for the portal and issued gateway certificates, see Deploy Server Certificates to the GlobalProtect LSVPN Components .

  1. On the GlobalProtect portal configuration dialog, select Authentication .
  2. Select the SSL/TLS Service Profile .

STEP 4 | Specify an authentication profile and optional Certificate Profile for authenticating satellites.

The first time the satellite connects to the portal, it must authenticate using local database authentication (on subsequent sessions it uses a satellite cookie issued by the portal). Therefore, before you can save the portal configuration (by clicking OK ), you must Configure an authentication profile .

Add a Client Authentication, and then enter a Name to identify the configuration, select OS : Satellite to apply the configuration to all satellites, and specify the Authentication Profile to use to authenticate satellite devices. You can also specify a Certificate Profile for the portal to use to authenticate satellite devices.

STEP 5 | Continue with defining the configurations to push to the satellites or, if you’ve already created the satellite configurations, save the portal configuration.

Click OK to save the portal configuration or continue to Define the Satellite Configurations .

Define the Satellite Configurations

When a GlobalProtect satellite connects and successfully authenticates to the GlobalProtect portal, the portal delivers a satellite configuration, which specifies what gateways the satellite can connect to. If all your satellites will use the same gateway and certificate configurations, you can create a single satellite configuration to deliver to all satellites upon successful authentication. However, if you require different satellite configurations—for example if you want one group of satellites to connect to one gateway and another group of satellites to connect to a different gateway—you can create a separate satellite configuration for each. The portal will then use the enrollment username/group name or the serial number of the satellite to determine which satellite configuration to deploy. As with security rule evaluation, the portal looks for a match starting from the top of the list. When it finds a match, it delivers the corresponding configuration to the satellite.

For example, the following figure shows a network in which some branch offices require VPN access to the corporate applications protected by your perimeter firewalls and another site needs VPN access to the data center.

LSVPN with multiple satellite configurations
Example network with different satellite groups requiring access to different gateways.

Use the following procedure to create one or more satellite configurations.

STEP 1 | Add a satellite configuration.

The satellite configuration specifies the GlobalProtect LSVPN configuration settings to deploy to the connecting satellites. You must define at least one satellite configuration.

  1. Select Network > GlobalProtect > Portals and select the portal configuration for which you want to add a satellite configuration and then select the Satellite tab.
  2. In the Satellite section, click Add .
  3. Enter a Name for the configuration.

If you plan to create multiple configurations, make sure that the name you define for each is descriptive enough to allow you to distinguish them.

  1. To change how often a satellite should check the portal for configuration updates, specify a value in the Configuration Refresh Interval (hours) field (range is 1-48; default is 24).

STEP 2 | Specify the satellites to which to deploy this configuration.

The portal uses the Enrollment User/User Group settings and/or Devices serial numbers to match a satellite to a configuration. Therefore, if you have multiple configurations, be sure to order them properly. As soon as the portal finds a match, it will deliver the configuration.

Therefore, more specific configurations must precede more general ones. See step 5 for instructions on ordering the list of satellite configurations.

Specify the match criteria for the satellite configuration as follows:

Before you can restrict the configuration to specific groups, you must Map Users to Groups .

STEP 3 | Specify the gateways that satellites with this configuration can establish VPN tunnels with.

Routes published by the gateway are installed on the satellite as static routes. The metric for the static route is 10x the routing priority. If you have more than one gateway, make sure to set the routing priority also to ensure that routes advertised by backup gateways have higher metrics compared to the same routes advertised by primary gateways. For example, if you set the routing priority for the primary gateway and backup gateway to 1 and 10 respectively, the satellite will use 10 as the metric for the primary gateway and 100 as the metric for the backup gateway.

  1. On the Gateways tab, click Add .
  2. Enter a descriptive Name for the gateway. The name you enter here should match the name you defined when you configured the gateway and should be descriptive enough to identify the location of the gateway.
  3. Enter the FQDN or IP address of the interface where the gateway is configured in the Gateways field. The address you specify must exactly match the Common Name (CN) in the gateway server certificate.
  4. ( Optional ) If you’re adding two or more gateways to the configuration, the Routing Priority helps the satellite pick the preferred gateway. Enter a value in the range of 1-25, with lower numbers having the higher priority (that is, the gateway the satellite will connect to if all gateways are available). The satellite will multiply the routing priority by 10 to determine the routing metric.

STEP 4 | Save the satellite configuration.

  1. Click OK to save the satellite configuration.
  2. If you want to add another satellite configuration, repeat the previous steps.

STEP 5 | Arrange the satellite configurations so that the proper configuration is deployed to each satellite.

STEP 6 | Specify the certificates required to enable satellites to participate in the LSVPN.

  1. In the Trusted Root CA field, click Add and then select the CA certificate used to issue the gateway server certificates. The portal will deploy the root CA certificate you add here to all satellites as part of the configuration to enable the satellite to establish an SSL connection with the gateways. As a best practice, all of your gateways should use the same issuer.
  2. Select the method of Client Certificate distribution:
    • To store the client certificates on the portal —select Local and select the root CA certificate that the portal will use to issue client certificates to satellites upon successfully authenticating them from the Issuing Certificate drop-down.
    • If the root CA certificate used to issue your gateway server certificates isn’t on the portal, you can Import it now. See Enable SSL Between GlobalProtect LSVPN Components for details on how to import a root CA certificate.

    • To enable the portal to act as a SCEP client to request dynamically and issue client certificates —select SCEP and then select the SCEP profile used to generate CSRs to your SCEP server.
    • If you have not yet set up the portal to act as a SCEP client, you can add a New SCEP profile now. See Deploy Client Certificates to the GlobalProtect Satellites Using SCEP for details.

STEP 7 | Save the portal configuration.

  1. Click OK to save the settings and close the GlobalProtect portal configuration dialog.
  2. Commit your changes.

Prepare the Satellite to Join the LSVPN

To participate in the LSVPN, the satellites require a minimal amount of configuration. Because the required configuration is minimal, you can pre-configure the satellites before shipping them to your branch offices for installation.

STEP 1 | Configure a Layer 3 interface .

This is the physical interface that the satellite will use to connect to the portal and the gateway. This interface must be in a zone that allows access outside of the local trust network. As a best practice, create a dedicated zone for VPN connections for visibility and control over traffic destined for the corporate gateways.

STEP 2 | Configure the logical tunnel interface for the tunnel to use to establish VPN tunnels with the GlobalProtect gateways.

IP addresses aren’t required on the tunnel interface unless you plan to use dynamic routing. However, assigning an IP address to the tunnel interface can be useful for troubleshooting connectivity issues.

  1. Select Network > Interfaces > Tunnel and click Add .
  2. In the Interface Name field, specify a numeric suffix, such as .2 .
  3. On the Config tab, expand the Security Zone drop-down and select an existing zone or create a separate zone for VPN tunnel traffic by clicking New Zone and defining a Name for the new zone (for example lsvpnsat ).
  4. In the Virtual Router drop-down, select default .
  5. ( Optional ) To assign an IP address to the tunnel interface:
    • For an IPv4 address, select IPv4 and Add the IP address and network mask to assign to the interface, for example 203.0.11.100/24 .
    • For an IPv6 address, select IPv6 , Enable IPv6 on the interface , and Add the IP address and network mask to assign to the interface, for example 2001:1890:12f2:11::10.1.8.160/80 .
  6. To save the interface configuration, click OK .

STEP 3 | If you generated the portal server certificate using a root CA that isn’t trusted by the satellites (for example, if you used self-signed certificates), import the root CA certificate used to issue the portal server certificate.

The root CA certificate is required to enable the satellite to establish the initial connection with the portal to obtain the LSVPN configuration.

  1. Download the CA certificate that was used to generate the portal server certificates. If you’re using self-signed certificates, export the root CA certificate from the portal as follows:
    1. Select Device > Certificate Management > Certificates , then Device Certificates .
    2. Select the CA certificate, and click Export .
    3. Select Base64 Encoded Certificate (PEM) from the File Format drop-down and click OK to download the certificate. (You don’t need to export the private key.)
  2. Import the root CA certificate that you exported onto each satellite as follows.
    1. Select Device > Certificate Management > Certificates , then Device Certificates . Select Import .
    2. Enter a Certificate Name that identifies the certificate as your client CA certificate.
    3. Browse to the Certificate File that you downloaded from the CA.
    4. Select Base64 Encoded Certificate (PEM) as the File Format and then click OK .
    5. Select the certificate that you imported on the Device Certificates tab to open it.
    6. Select Trusted Root CA and then click OK .
    7. Commit the changes.

STEP 4 | Configure the IPSec tunnel configuration.

  1. Select Network > IPSec Tunnels and click Add .
  2. On the General tab, enter a descriptive Name for the IPSec configuration.
  3. Select the Tunnel Interface that you created for the satellite.
  4. Select GlobalProtect Satellite as the Type .
  5. Enter the IP address or FQDN of the portal as the Portal Address .
  6. Select the Layer 3 Interface you configured for the satellite.
  7. Select the IP Address to use on the selected interface. You can select an IPv4 address, an IPv6 address, or both. Specify if you want IPv6 preferred for portal registration .

STEP 5 | ( Optional ) Configure the satellite to publish local routes to the gateway.

Pushing routes to the gateway enables traffic to the subnets local to the satellite via the gateway. However, you must also configure the gateway to accept the routes as detailed in Configure GlobalProtect Gateways for LSVPN .

  1. To enable the satellite to push routes to the gateway, on the Advanced tab select Publish all static and connected routes to Gateway .

If you select this check box, the firewall will forward all static and connected routes from the satellite to the gateway. However, to prevent the creation of routing loops, the firewall will apply some route filters, such as the following:

  1. ( Optional ) If you only want to push routes for specific subnets rather than all routes, click Add in the Subnet section and specify which subnet routes to publish.
STEP 6 | Save the satellite configuration.
  1. Click OK to save the IPSec tunnel settings.
  2. Click Commit .
STEP 7 | If required, provide the credentials to allow the satellite to authenticate to the portal.

To authenticate to the portal for the first time , the satellite administrator must provide the username and password associated with the satellite admin account in the local database.

  1. Select Network > IPSec Tunnels and click the Gateway Info link in the Status column of the tunnel configuration you created for the LSVPN.
  2. Click the enter credentials link in the Portal Status field and provide the username and password to authenticate the satellite to the portal.

After the portal successfully authenticates to the portal, it will receive its signed certificate and configuration, which it will use to connect to the gateway(s). You should see that the tunnel is established and the Status is changed to Active .

Verify the LSVPN Configuration

After configuring the portal, gateways, and satellites, verify that the satellites are able to connect to the portal and gateway and establish VPN tunnels with one or more gateways.

STEP 1 | Verify satellite connectivity with portal.

From the firewall hosting the portal, verify that the satellites are successfully connecting by selecting Network > GlobalProtect > Portal and clicking Satellite Info in the Info column of the portal configuration entry.

STEP 2 | Verify satellite connectivity with the gateway(s).

On each firewall hosting a gateway, verify that satellites are able to establish VPN tunnels by selecting Network > GlobalProtect > Gateways and click Satellite Info in the Info column of the gateway configuration entry. Satellites that have successfully established tunnels with the gateway will display on the Active Satellites tab.

STEP 3 | Verify LSVPN tunnel status on the satellite.

On each firewall hosting a satellite, verify the tunnel status by selecting Network > IPSec Tunnels and verify active Status as indicated by a green icon.

graph LR S[Satellite] -->|1. Connects to Portal| P[Portal] P -->|2. Sends Config & Certs| S S -->|3. Connects to Gateway| G[Gateway] G -->|4. Tunnel Established| S style S fill:#cfc,stroke:#333,stroke-width:2px style P fill:#f9f,stroke:#333,stroke-width:2px style G fill:#ccf,stroke:#333,stroke-width:2px

Basic LSVPN verification flow.

Basic LSVPN Configuration with Static Routing

This quick configuration shows the fastest way to get up and running with LSVPN. In this example, a single firewall at the corporate headquarters site is configured as both a portal and a gateway. Satellites can be quickly and easily deployed with minimal configuration for optimized scalability.

Basic LSVPN with Static Routing Topology
LSVPN Basic Setup: Single Portal/Gateway and multiple Satellites with static routing.

The following workflow shows the steps for setting up this basic configuration:

STEP 1 | Configure a Layer 3 interface .

In this example, the Layer 3 interface on the portal/gateway requires the following configuration:

STEP 2 | On the firewall(s) hosting GlobalProtect gateway(s), configure the logical tunnel interface that will terminate VPN tunnels established by the GlobalProtect satellites.

To enable visibility into users and groups connecting over the VPN, enable User-ID in the zone where the VPN tunnels terminate.

In this example, the Tunnel interface on the portal/gateway requires the following configuration:

STEP 3 | Create the Security policy rule to enable traffic flow between the VPN zone where the tunnel terminates (lsvpn-tun) and the trust zone where the corporate applications reside (L3Trust).

See Create a Security Policy Rule .

STEP 4 | Assign an SSL/TLS Service profile to the portal/gateway. The profile must reference a selfsigned server certificate.

The certificate subject name must match the FQDN or IP address of the Layer 3 interface you create for the portal/gateway.

  1. On the firewall hosting the GlobalProtect portal, create the root CA certificate for signing the certificates of the GlobalProtect components. In this example, the root CA certificate, lsvpn-CA , will be used to issue the server certificate for the portal/gateway.

In addition, the portal will use this root CA certificate to sign the CSRs from the satellites.

  1. Create SSL/TLS service profiles for the GlobalProtect portal and gateways. Because the GlobalProtect portal and primary gateway are the same firewall interface, you can use the same server certificate for both components.
  1. Deploy the self-signed server certificates to the gateways.
  2. Import the root CA certificate used to issue server certificates for the LSVPN components.
  3. Create a certificate profile. In this example, the Certificate Profile lsvpn-profile references the root CA certificate lsvpn-CA . The gateway will use this Certificate Profile to authenticate satellites attempting to establish VPN tunnels.
  4. Repeat steps 2 through 5 on the backup gateway with the following settings:
    • Root CA Certificate : CA-cert
    • Certificate Name : LSVPN-backup-GW-cert

STEP 5 | Configure GlobalProtect Gateways for LSVPN .

Select Network > GlobalProtect > Gateways and Add a configuration. This example requires the following gateway configuration:

STEP 6 | Configure the Portal .

Select Network > GlobalProtect > Portal and Add a configuration. This example requires the following portal configuration:

STEP 7 | Define the Satellite Configurations .

On the Satellite tab in the portal configuration, Add a Satellite configuration and a Trusted root CA and specify the CA the portal will use to issue certificates for the satellites. In this example, the required settings are as following:

STEP 8 | Prepare the Satellite to Join the LSVPN .

The satellite configuration in this example requires the following settings:

Interface configuration

Root CA Certificate from Portal

IPSec Tunnel configuration

STEP 9 | Verify the LSVPN Configuration .

STEP 10 | ( Optional ) Add a new site to the LSVPN deployment.

  1. Select Network > GlobalProtect > Portals > GlobalProtect Portal > Satellite Configuration > GlobalProtect Satellite > Devices to add the serial number of the new satellite to the GlobalProtect portal.
  2. Configure the IPSec tunnel on the satellite with the GlobalProtect portal IP address.
  3. Select Network > Virtual Router > BGP > Peer Group to add the satellite to the BGP peer group configuration on each gateway.
  4. Select Network > Virtual Router > BGP > Peer Group to add the gateways to the BGP peer group configuration on the new satellite.

Advanced LSVPN Configuration with Dynamic Routing (OSPF)

In larger LSVPN deployments with multiple gateways and many satellites, investing a little more time in the initial configuration to set up dynamic routing will simplify the maintenance of gateway configurations because access routes will update dynamically. The following example configuration shows how to extend the basic LSVPN configuration to configure OSPF as the dynamic routing protocol.

Setting up an LSVPN to use OSPF for dynamic routing requires the following additional steps on the gateways and the satellites:

Although dynamic routing requires additional setup during the initial configuration of the LSVPN, it reduces the maintenance tasks associated with keeping routes up to date as topology changes occur on your network.

The following figure shows an LSVPN dynamic routing configuration. This example shows how to configure OSPF as the dynamic routing protocol for the VPN.

LSVPN with OSPF Dynamic Routing
LSVPN with OSPF for dynamic routing between Hub and Spokes.

For a basic setup of a LSVPN, follow the steps in Basic LSVPN Configuration with Static Routing . You can then complete the steps in the following workflow to extend the configuration to use dynamic routing rather than static routing.

STEP 1 | Add an IP address to the tunnel interface configuration on each gateway and each satellite.

Complete the following steps on each gateway and each satellite:

  1. Select Network > Interfaces > Tunnel and select the tunnel configuration you created for the LSVPN to open the Tunnel Interface dialog.

If you haven’t yet created the tunnel interface, see step 2 in Create Interfaces and Zones for the LSVPN .

  1. On the IPv4 tab, click Add and then enter an IP address and subnet mask. For example, to add an IP address for the gateway tunnel interface you would enter 2.2.2.100/24 .
  2. Click OK to save the configuration.

STEP 2 | Configure the dynamic routing protocol on the gateway.

To configure OSPF on the gateway:

  1. Select Network > Virtual Routers and select the virtual router associated with your VPN interfaces.
  2. On the Areas tab, click Add to create the backbone area, or, if it’s already configured, click on the area ID to edit it.
  3. If you’re creating a new area, enter an Area ID on the Type tab.
  4. On the Interface tab, click Add and select the tunnel Interface you created for the LSVPN.
  5. Select p2mp as the Link Type .
  6. Click Add in the Neighbors section and enter the IP address of the tunnel interface of each satellite, for example 2.2.2.111 .
  7. Click OK twice to save the virtual router configuration and then Commit the changes on the gateway.
  8. Repeat this step each time you add a new satellite to the LSVPN.
graph LR VR[Virtual Router on Gateway] --> OSPF[OSPF Config] OSPF --> Area0["Area 0 (Backbone)"] Area0 --> TunnelInterface[Tunnel Interface (e.g., tunnel.1)] TunnelInterface --> P2MP["Link Type: P2MP"] P2MP --> Neighbor1["Neighbor: Satellite 1 IP (e.g., 2.2.2.111)"] P2MP --> Neighbor2["Neighbor: Satellite 2 IP (e.g., 2.2.2.112)"] P2MP --> NeighborN["Neighbor: Satellite N IP"] style VR fill:#lightgrey style OSPF fill:#lightblue

OSPF P2MP configuration on Gateway VR showing neighbors.

STEP 3 | Configure the dynamic routing protocol on the satellite.

To configure OSPF on the satellite:

  1. Select Network > Virtual Routers and select the virtual router associated with your VPN interfaces.
  2. On the Areas tab, click Add to create the backbone area, or, if it’s already configured, click on the area ID to edit it.
  3. If you’re creating a new area, enter an Area ID on the Type tab.
  4. On the Interface tab, click Add and select the tunnel Interface you created for the LSVPN.
  5. Select p2mp as the Link Type .
  6. Click Add in the Neighbors section and enter the IP address of the tunnel interface of each GlobalProtect gateway, for example 2.2.2.100 .
  7. Click OK twice to save the virtual router configuration and then Commit the changes on the gateway.
  8. Repeat this step each time you add a new gateway.

STEP 4 | Verify that the gateways and satellites are able to form router adjacencies.

Advanced LSVPN Configuration with iBGP

This use case illustrates how GlobalProtect LSVPN securely connects distributed office locations with primary and disaster recovery data centers that house critical applications for users and how an internal border gateway protocol (iBGP) eases deployment and upkeep. Using this method, you can extend up to 500 satellite offices connecting to a single gateway.

BGP is a highly scalable, dynamic routing protocol that is ideal for hub-and-spoke deployments such as LSVPN. As a dynamic routing protocol, it eliminates much of the overhead associated with access routes (static routes) by making it relatively easy to deploy additional satellite firewalls. Due to its route filtering capabilities and features such as multiple tunable timers, route dampening, and route refresh, BGP scales to a higher number of routing prefixes with greater stability than other routing protocols like RIP and OSPF. In the case of iBGP, a peer group, which includes all the satellites and gateways in the LSVPN deployment, establishes adjacencies over the tunnel endpoints. The protocol then implicitly takes control of route advertisements, updates, and convergence.

In this example configuration, an active/passive HA pair of PA-5200 firewalls is deployed in the primary (active) data center and acts as the portal and primary gateway. The disaster recovery data center also has two PA-5200s in an active/passive HA pair acting as the backup LSVPN gateway. The portal and gateways serve 500 PA-220s deployed as LSVPN satellites in branch offices.

Both data center sites advertise routes but with different metrics. As a result, the satellites prefer and install the active data center’s routes. However, the backup routes also exist in the local routing information base (RIB). If the active data center fails, the routes advertised by that data center are removed and replaced with routes from the disaster recovery data center’s routes. The failover time depends on selection of iBGP times and routing convergence associated with iBGP.

LSVPN with iBGP and HA Data Centers
LSVPN with iBGP for dynamic routing, featuring primary and disaster recovery data centers.

The following workflow shows the steps for configuring this deployment:

STEP 1 | Create Interfaces and Zones for the LSVPN .

Portal and primary gateway:

Backup gateway:

Satellite:

Configure the zones, interfaces, and IP addresses on each satellite. The interface and local IP address will be different for each satellite. This interface is used for the VPN connection to the portal and gateway.

STEP 2 | On the firewall(s) hosting GlobalProtect gateway(s), configure the logical tunnel interface that will terminate VPN tunnels established by the GlobalProtect satellites.

To enable visibility into users and groups connecting over the VPN, enable User-ID in the zone where the VPN tunnels terminate.

Primary gateway:

Backup gateway:

STEP 3 | Enable SSL Between GlobalProtect LSVPN Components .

The gateway uses the self-signed root certificate authority (CA) to issue certificates for the satellites in a GlobalProtect LSVPN. Because one firewall houses the portal and primary gateway, a single certificate is used for authenticating to the satellites. The same CA is used to generate a certificate for the backup gateway. The CA generates certificates that are pushed to the satellites from the portal and then used by the satellites to authenticate to the gateways.

You must also generate a certificate from the same CA for the backup gateway, allowing it to authenticate with the satellites.

  1. On the firewall hosting the GlobalProtect portal, create the root CA certificate for signing the certificates of the GlobalProtect components. In this example, the root CA certificate is called CA-cert .
  2. Create SSL/TLS service profiles for the GlobalProtect portal and gateways. Because the GlobalProtect portal and primary gateway are the same firewall interface, you can use the same server certificate for both components.
    • Root CA Certificate : CA-Cert
    • Certificate Name : LSVPN-Scale
  3. Deploy the self-signed server certificates to the gateways.
  4. Import the root CA certificate used to issue server certificates for the LSVPN components.
  5. Create a certificate profile. In this example, the Certificate Profile lsvpn-profile references the root CA certificate lsvpn-CA . The gateway will use this Certificate Profile to authenticate satellites attempting to establish VPN tunnels.
  6. Repeat steps 2 through 5 on the backup gateway with the following settings:
    • Root CA Certificate : CA-cert
    • Certificate Name : LSVPN-backup-GW-cert

STEP 4 | Configure GlobalProtect Gateways for LSVPN .

  1. Select Network > GlobalProtect > Gateways and click Add .
  2. On the General tab, name the primary gateway LSVPN-Scale .
  3. Under Network Settings , select ethernet1/21 as the primary gateway interface and enter 172.16.22.1/24 as the IP address.
  4. On the Authentication tab, select the previously created primary gateway SSL/TLS Profile LSVPN-Scale from the SSL/TLS Service Profile drop-down.
  5. Select Satellite > Tunnel Settings and select Tunnel Configuration . Set the Tunnel Interface to tunnel.5. All satellites in this use case connect to a single gateway, so a single satellite configuration is needed. Satellites are matched based on their serial numbers, so no satellites will need to authenticate as a user.
  6. On Satellite > Network Settings , define the pool of IP address to assign to the tunnel interface on the satellite once the VPN connection is established. Because this use case uses dynamic routing, the Access Routes setting remains blank.
  7. Repeat steps 1 through 5 on the backup gateway with the following settings:
    • Name : LSVPN-backup
    • Gateway interface : ethernet1/5
    • Gateway IP : 172.16.22.25/24
    • Server cert : LSVPN-backup-GW-cert
    • Tunnel interface : tunnel.1

STEP 5 | Configure iBGP on the primary and backup gateways and add a redistribution profile to allow the satellites to inject local routes back to the gateways.

Each satellite office manages its own network and firewall, so the redistribution profile called ToAllSat is configured to redistribute local routes back to the GlobalProtect gateway.

graph TD subgraph "Gateway Firewall" VR_GW[Virtual Router] -->|Contains| BGP_GW[BGP Process] BGP_GW --> PeerGroup_GW[Peer Group: Satellites] BGP_GW --> RedistRule_GW[Redistribution Rule: ToAllSat (Connected/Static)] end subgraph "Satellite Firewall" VR_SAT[Virtual Router] -->|Contains| BGP_SAT[BGP Process] BGP_SAT --> PeerGroup_SAT[Peer Group: Gateways] BGP_SAT --> RedistRule_SAT[Redistribution Rule: ToGateways (Local LANs)] end PeerGroup_GW ---|iBGP Peering (Tunnel)| PeerGroup_SAT style VR_GW fill:#ccf style VR_SAT fill:#cfc

iBGP configuration concept on Gateway and Satellite.

  1. Select Network > Virtual Routers and Add a virtual router.
  2. On Router Settings , add the Name and Interface for the virtual router.
  3. On Redistribution Profile , select Add .
    1. Name the redistribution profile ToAllSat and set the Priority to 1.
    2. Set Redistribute to Redist .
    3. Add ethernet1/23 from the Interface drop-down.
    4. Click OK .
  4. Select BGP on the virtual router to configure BGP.
    1. On BGP > General , select Enable .
    2. Enter the gateway IP address as the Router ID ( 172.16.22.1 ) and 1000 as the AS Number .
    3. In the Options section, select Install Route .
    4. On BGP > Peer Group , Add a peer group with all the satellites that will connect to the gateway.
    5. On BGP > Redist Rules , Add the ToAllSat redistribution profile you created previously.
  5. Click OK .
  6. Repeat steps 1 through 5 on the backup gateway using ethernet1/6 for the redistribution profile.

STEP 6 | Prepare the Satellite to Join the LSVPN .

The configuration shown is a sample of a single satellite.

Repeat this configuration each time you add a new satellite to the LSVPN deployment.

  1. Configure a tunnel interface as the tunnel endpoint for the VPN connection to the gateways.
  2. Set the IPSec tunnel type to GlobalProtect Satellite and enter the IP address of the GlobalProtect portal.
  3. Select Network > Virtual Routers and Add a virtual router.
  4. On Router Settings , add the Name and Interface for the virtual router.
  5. Select Virtual Router > Redistribution Profile and Add a profile with the following settings.
    1. Name the redistribution profile ToLSVPNGW and set the Priority to 1.
    2. Add an Interface ethernet1/2.1 .
    3. Click OK .
  6. Select BGP > General , Enable BGP and configure the protocol as follows:
    1. Enter the gateway IP address as the Router ID ( 172.16.22.1 ) and 1000 as the AS Number .
    2. In the Options section, select Install Route .
    3. On BGP > Peer Group , Add a peer group containing all the satellites that will connect to the gateway.
    4. On BGP > Redist Rules , Add the ToLSVPNGW redistribution profile you created previously.
  7. Click OK .

STEP 7 | Configure the GlobalProtect Portal for LSVPN .

Both data centers advertise their routes but with different routing priorities to ensure that the active data center is the preferred gateway.

  1. Select Network > GlobalProtect > Portals and click Add .
  2. On General , enter LSVPN-Portal as the portal name.
  3. On Network Settings , select ethernet1/21 as the Interface and select 172.16.22.1/24 as the IP Address .
  4. On the Authentication tab, select the previously created primary gateway SSL/TLS Profile LSVPN-Scale from the SSL/TLS Service Profile drop-down.
  5. On the Satellite tab, Add a satellite and Name it sat-config-1 .
  6. Set the Configuration Refresh Interval to 12 .
  7. On GlobalProtect Satellite > Devices , add the serial number and hostname of each satellite device in the LSVPN.
  8. On GlobalProtect Satellite > Gateways , add the name and IP address of each gateway. Set the routing priority of the primary gateway to 1 and the backup gateway to 10 to ensure that the active data center is the preferred gateway.

STEP 8 | Verify the LSVPN Configuration .

STEP 9 | ( Optional ) Add a new site to the LSVPN deployment.

  1. Select Network > GlobalProtect > Portals > GlobalProtect Portal > Satellite Configuration > GlobalProtect Satellite > Devices to add the serial number of the new satellite to the GlobalProtect portal.
  2. Configure the IPSec tunnel on the satellite with the GlobalProtect portal IP address.
  3. Select Network > Virtual Router > BGP > Peer Group to add the satellite to the BGP peer group configuration on each gateway.
  4. Select Network > Virtual Router > BGP > Peer Group to add the gateways to the BGP peer group configuration on the new satellite.