I.1. Core Concept: Palo Alto Networks GlobalProtect Overview
Palo Alto Networks GlobalProtect provides secure remote access to your network for users on various devices (laptops, mobile phones). Its primary purpose is to extend the firewall's security policies to these remote users, ensuring that all traffic, regardless of user location, is inspected and protected according to the organization's security posture. It creates a secure, encrypted tunnel from the endpoint to the corporate network, allowing users to access internal resources as if they were locally connected, while maintaining consistent security enforcement.
I.2. GlobalProtect Portal Role
The GlobalProtect Portal serves several key functions in the GlobalProtect ecosystem:
- User Authentication: It is typically the first point of contact for users. The portal authenticates users against configured authentication profiles (e.g., LDAP, SAML, RADIUS).
- Agent Software Delivery: The portal provides the GlobalProtect agent software to endpoints. Users can download the appropriate agent for their operating system from the portal.
- Client Configuration Dissemination: After successful authentication, the portal delivers the client configuration to the agent. This configuration includes a list of available gateways, connection settings, and other operational parameters.
Crucially, the GlobalProtect Portal does not handle the user data tunnel . Its role is primarily for management, authentication, and configuration delivery.
I.3. GlobalProtect Gateway Role
The GlobalProtect Gateway is responsible for the secure data connection:
- VPN Tunnel Termination: Gateways terminate the VPN tunnels (SSL VPN or IPSec) initiated by the GlobalProtect agents.
- User Authentication (Re-authentication): Gateways can re-authenticate users, often using a cookie provided by the portal or by prompting for credentials again, to ensure the user establishing the tunnel is still valid.
- Security Policy Enforcement: This is a critical function. The gateway enforces the firewall's security policies on all traffic passing through the tunnel. This includes threat prevention, URL filtering, and application control.
- Providing Access to Internal Resources: Once the tunnel is established and traffic is permitted by security policies, the gateway provides users with access to internal network resources.
II.1. Overall Prerequisites for Configuration
Before configuring GlobalProtect Portal and Gateway on a Palo Alto Networks firewall, several essential prerequisites must be met:
- Palo Alto Networks Firewall: A physical or virtual firewall running PAN-OS.
- GlobalProtect Subscription/License: Valid license for GlobalProtect.
- Network Interfaces: Properly configured interfaces for Portal and Gateway services.
- Security Zones: Defined security zones for interfaces and VPN traffic.
- SSL/TLS Server Certificates: Trusted certificates for secure communication.
- Authentication Mechanisms: Configured authentication profiles and sequences.
- IP Address Pool: A pool of IP addresses for VPN clients.
- DNS Servers: Accessible DNS servers for internal resource resolution.
- Routing: Correct routing for traffic to and from VPN clients.
II.2. GlobalProtect Subscription/License
A GlobalProtect subscription (license) is required to enable its full functionality on a Palo Alto Networks firewall. Without a valid license, features may be limited or unavailable.
Verification and Activation:
-
Verification:
Licenses can be verified on the firewall GUI under
Device > Licenses
. Look for "GlobalProtect Gateway" or similar entries. Status should be valid and active. -
Activation:
Licenses are typically activated through the Palo Alto Networks support portal. Once a license is purchased and associated with the firewall's serial number, it can be retrieved and installed on the firewall. This often involves fetching licenses from the licensing server (
Device > Licenses > Retrieve license keys from license server
) or manually uploading a license key file.
Ensure the license covers the required number of concurrent users if applicable to your license model.
II.3. Network Interfaces for GlobalProtect
Network interfaces for GlobalProtect Portal and Gateway can be dedicated or shared with other services. Key considerations include:
- Type: Typically, a Layer 3 interface with an assigned IP address.
-
Reachability:
- The interface hosting the Portal must be reachable by clients over the internet (or internal network if for internal use only) on the configured port (usually HTTPS/443).
- The interface(s) hosting the Gateway(s) must be reachable by clients over the internet (or relevant network segment) on the configured port(s) for VPN tunnel establishment (SSL/TLS, potentially ESP for IPSec).
-
Dedicated vs. Shared:
- Dedicated: Using a dedicated interface for GlobalProtect can simplify security policy and routing.
- Shared: An existing external-facing interface (e.g., internet DMZ or Untrust) can be used. If shared, ensure no port conflicts with other services.
- IP Address: Must have a static IP address. FQDNs that resolve to this IP are highly recommended.
II.4. Security Zones in PAN-OS for GlobalProtect
Security Zones are fundamental to PAN-OS policy enforcement. For GlobalProtect:
-
Portal/Gateway Interface Zone:
The physical or logical interface hosting the Portal and/or Gateway services will reside in a security zone, typically an
Untrust
zone (if internet-facing) or a DMZ zone. -
VPN Tunnel Interface Zone:
A dedicated logical Tunnel Interface is created for GlobalProtect VPN connections. This Tunnel Interface must be assigned to a new or existing security zone.
-
Best practice is to create a dedicated zone for GlobalProtect clients (e.g.,
VPN-Zone
,GP-VPN
, orRemote-Access-Zone
). - This allows for granular security policies to control traffic from VPN clients to internal resources.
-
Best practice is to create a dedicated zone for GlobalProtect clients (e.g.,
Security policies will then be written to control traffic flow between these zones (e.g., from
VPN-Zone
to
Trust
or
DMZ
zones).
II.5. SSL/TLS Server Certificates
SSL/TLS server certificates are critical for securing communication with the GlobalProtect Portal and Gateway, providing server authentication and encryption.
-
Purpose:
- Portal: Secures the web interface for agent download and initial configuration.
- Gateway: Secures the SSL VPN tunnel setup.
- Client Trust: The certificate used by the Portal and Gateway must be trusted by the client endpoints. If not trusted, users will receive certificate warnings, and connections might fail.
-
Options:
- Public CA Certificate: Recommended for internet-facing Portal/Gateway. Certificates issued by well-known public Certificate Authorities (CAs) like Let's Encrypt, DigiCert, GoDaddy, etc., are trusted by default by most operating systems and browsers.
- Internal CA Certificate: If GlobalProtect is for internal use or if clients are managed and can have the internal CA root certificate installed, an internal CA can be used. This requires distributing the internal CA's root certificate to all client devices.
- Self-Signed Certificate: Not recommended for production due to trust issues. Clients will always see warnings unless the self-signed certificate is manually installed as trusted on each device.
- Requirements: The certificate must match the FQDN used by clients to access the Portal/Gateway. Wildcard certificates can be used. Ensure the certificate has not expired and has a strong signature algorithm.
II.6. Authentication Mechanisms
PAN-OS uses Authentication Profiles and Authentication Sequences to manage user authentication for GlobalProtect.
- Authentication Profile: Defines the method and server details for a specific authentication type (e.g., LDAP server IP, RADIUS secret, SAML IdP metadata).
- Authentication Sequence: Allows chaining multiple Authentication Profiles. This can be used to try different authentication methods in order or to enforce Multi-Factor Authentication (MFA) by requiring success from multiple profiles.
Common Authentication Methods for GlobalProtect:
- LDAP (Lightweight Directory Access Protocol): Authenticates against directory services like Microsoft Active Directory or OpenLDAP. Common for username/password authentication.
- RADIUS (Remote Authentication Dial-In User Service): Authenticates against a RADIUS server, often used for MFA integration (e.g., Duo, RSA SecurID) or network access control.
- SAML (Security Assertion Markup Language): Enables Single Sign-On (SSO) with an external Identity Provider (IdP) like Okta, Azure AD, or ADFS. Often preferred for modern, secure authentication and MFA.
- Kerberos: Authenticates against a Kerberos Key Distribution Center (KDC), typically in Windows environments.
- Local Database: Uses user accounts created directly on the Palo Alto Networks firewall. Suitable for small deployments or backup authentication.
- Certificate-based Authentication: Clients present a certificate for authentication. Can be used as a primary factor or in conjunction with other methods for MFA.
MFA (Multi-Factor Authentication) is highly recommended for GlobalProtect. It can be achieved using RADIUS with an MFA provider, SAML with an IdP that enforces MFA, or by combining methods in an Authentication Sequence (e.g., LDAP + RADIUS).
II.7. IP Address Pool for GlobalProtect Clients
An IP Address Pool is a range of IP addresses that the GlobalProtect Gateway assigns to connecting clients for their VPN tunnel interface.
- Purpose: Each client needs a unique IP address on the corporate network to communicate with internal resources.
-
Configuration:
-
Defined under
Network > GlobalProtect > Gateways > [Gateway_Name] > Agent > Client Settings > Network Settings
. -
Specify one or more IP address ranges (e.g.,
192.168.100.1-192.168.100.254
). - These IP addresses should be from a subnet that is routable within your internal network but does not conflict with existing subnets.
-
Defined under
- Routing: Internal routers and the firewall itself must know how to route traffic back to this IP pool via the Gateway's tunnel interface.
- Sizing: The pool should be large enough to accommodate the maximum expected number of concurrent GlobalProtect users.
II.8. DNS Settings for GlobalProtect Clients
Proper DNS server configuration is critical for GlobalProtect clients to resolve internal hostnames and access resources by name.
- Purpose: Clients connected via GlobalProtect need to resolve FQDNs of internal servers, applications, and services.
-
Configuration:
-
DNS server IP addresses are typically configured within the GlobalProtect Gateway settings (
Network > GlobalProtect > Gateways > [Gateway_Name] > Agent > Client Settings > Network Settings
). - You can specify primary and secondary DNS servers.
- These should be internal DNS servers that can resolve your internal domain names.
-
DNS server IP addresses are typically configured within the GlobalProtect Gateway settings (
-
DNS Suffix (Optional but Recommended):
Configuring a DNS suffix (e.g.,
yourcompany.internal
) allows clients to resolve short hostnames without needing to type the full FQDN. - Split DNS Considerations: If using split tunneling, ensure that DNS queries for internal resources go to internal DNS servers, while queries for internet resources might go to public DNS servers or be handled by the client's local DNS. The Gateway can act as a DNS proxy to help manage this.
Without correct DNS settings, users will be unable to access internal resources by name, leading to a poor user experience and connectivity issues.
III.1. Portal Overview & GUI Path
The GlobalProtect Portal configuration is where you define how users authenticate, download the agent, and receive their initial client configurations, including the list of available gateways.
Standard GUI Navigation Path in PAN-OS:
Network > GlobalProtect > Portals
From this screen, you can add a new portal configuration or modify an existing one.
General Purpose of the Portal:
- Act as the initial entry point for GlobalProtect users.
- Authenticate users.
- Provide the GlobalProtect agent software for download.
- Distribute agent configurations, which include settings for how the agent behaves and a list of gateways (both internal and external) that the client can connect to.
- It does NOT handle the VPN data tunnel itself; that's the role of the Gateway.
III.2. Portal General Tab
The 'General' tab in a GlobalProtect Portal configuration contains fundamental settings for the portal's identity and network presence.
Key Configuration Parameters:
-
Name:
A descriptive name for the portal configuration (e.g.,
GP_Portal_External
). This is for administrative purposes. - Interface: The network interface on the firewall that will listen for GlobalProtect Portal connections. This is typically an external-facing interface if the portal is for remote access.
-
IP Address(es):
- Select the IP address on the chosen interface that the portal will use. If the interface has multiple IP addresses, you can choose one or more.
- Using an FQDN that resolves to this IP address is highly recommended for client access.
- IPv6 Address(es) (Optional): If IPv6 is used, configure the IPv6 address on the selected interface.
Ensure the selected interface is in the correct Security Zone (e.g., Untrust) and that an Interface Management Profile allowing 'GlobalProtect' and 'HTTPS' (for the portal web page) is applied to this interface.
III.3. Portal Authentication Tab
The 'Authentication' tab is where you configure how users will be authenticated when they connect to the GlobalProtect Portal.
Key Settings:
-
SSL/TLS Service Profile:
- Select an SSL/TLS Service Profile that defines the server certificate the portal will present to clients. This certificate must be trusted by the client devices.
- The profile also defines SSL/TLS protocol versions and cipher suites.
-
Create this profile under
Device > Certificate Management > SSL/TLS Service Profiles
.
-
Client Authentication:
- This section is for defining the primary authentication method for users.
- Click 'Add' to create a client authentication configuration.
- Name: A descriptive name for this authentication setting.
- OS: Select the operating systems this authentication applies to (e.g., Any, Windows, macOS).
- Authentication Profile: Select a pre-configured Authentication Profile or Authentication Sequence (e.g., LDAP, SAML, RADIUS, or a sequence for MFA). This is the core of the authentication setup.
- Authentication Message: Customize the message displayed to users during authentication.
- Generate and accept cookie for authentication override (Optional): If enabled, the portal can issue an authentication cookie to the client after successful authentication. This cookie can then be used by Gateways to re-authenticate the user without prompting for credentials again, for a certain period.
III.4. Portal Agent Tab - Agent Configurations
The 'Agent' tab within the GlobalProtect Portal configuration is crucial. It's where you define 'Agent Configurations' that dictate how the GlobalProtect client software behaves on endpoints and which gateways it can connect to.
You can have multiple agent configurations, often targeting different user groups or operating systems if needed.
Purpose of 'Agent Configurations':
An Agent Configuration groups settings related to the GlobalProtect agent itself, including app behavior, user credential handling, authentication override settings, and lists of internal/external gateways.
Within an Agent Configuration, you'll find several sub-tabs. Key areas include:
Common 'Client App Settings' (typically under an 'App' or 'General' sub-tab within the Agent Config):
-
Connect Method:
Determines how the agent connects. Options include:
- User-logon (Always On): Agent attempts to connect as soon as the user logs into their OS. Often preferred for corporate devices to ensure continuous protection.
- Pre-logon (Always On): Agent attempts to connect before the user logs in. Useful for remote patching, domain script execution. Requires machine certificate authentication.
- On-demand (User initiated): User manually initiates the connection.
- User Credential Forwarding: Allows forwarding of Windows/macOS login credentials to the Portal/Gateway, potentially enabling a more seamless SSO experience. Use with caution and understand security implications.
- Agent UI Settings: Control aspects of the agent's user interface, such as whether users can disable the agent or view connection details.
'Authentication Override' (often a sub-tab or section within Agent Config):
-
Cookie Authentication:
- Accept cookie for authentication: Allows the agent to accept an authentication cookie from the Portal.
- Generate and accept cookie for authentication override for gateway: If the Portal issues a cookie, this setting (often configured on the Gateway as well) allows the Gateway to use that cookie to authenticate the user without re-prompting for credentials.
- Cookie Lifetime: Defines how long the cookie is valid.
These settings are crucial for user experience and security posture. "Always On" connect methods are generally preferred for corporate assets.
III.5. Portal Agent Tab - External Gateways
Within an 'Agent Configuration' on the Portal's 'Agent' tab, you define the 'External Gateways' that GlobalProtect clients can connect to when they are outside the corporate network.
Defining External Gateways:
This list is pushed to the client agent after it authenticates to the portal. The agent will then attempt to connect to one of these gateways.
-
Name:
A descriptive name for the external gateway entry (e.g.,
External-GW-Primary
,US-East-GW
). This name is primarily for administrative reference in the portal config. -
Address:
- The public IP address or, more commonly, an FQDN (Fully Qualified Domain Name) of the GlobalProtect Gateway.
- Using FQDNs is highly recommended as it allows for IP address changes on the gateway without reconfiguring clients (DNS update is sufficient) and is necessary for certificates.
-
Source Region (Optional but useful for large deployments):
Allows you to specify the geographical region from which users might connect to this gateway. The agent can use this information, along with latency detection, to pick the "best" gateway. You can define regions like
Americas
,EMEA
,APAC
or more specific ones. -
Priority:
(Manual Gateway Selection)
- If multiple external gateways are configured with manual selection logic, priority (lower number is higher priority) can influence which gateway the agent tries first.
- However, agents typically use latency-based selection to find the "best" (lowest latency) gateway from the list, unless configured otherwise.
- Description (Optional): A text description for the gateway.
The agent uses this list to find and connect to an available gateway. At least one external gateway must be defined for remote users to connect.
III.6. Portal Agent Tab - Internal Gateways & Internal Host Detection
Within an 'Agent Configuration' on the Portal's 'Agent' tab, you can also configure 'Internal Gateways' and 'Internal Host Detection'. This is crucial for enabling the agent to behave differently when the user is already inside the corporate network.
Internal Gateways:
- Concept: An Internal Gateway is a GlobalProtect Gateway that is accessible only from within the internal network.
- Purpose: When a user is on the internal network, you might still want them to connect to an internal gateway for consistent policy enforcement or HIP checks, even if they don't need a VPN tunnel for basic network access. Alternatively, you might want the agent to simply recognize it's internal and not establish a tunnel.
- Configuration: Similar to external gateways, you specify an address (IP or FQDN) for the internal gateway.
Internal Host Detection (IHD):
- Purpose: IHD allows the GlobalProtect agent to determine if the endpoint is currently connected to the internal (corporate) network.
-
Mechanism:
You configure one or more internal hostnames or IP addresses that are only resolvable/reachable from the internal network. The agent will attempt to connect to these specified hosts/IPs on given ports.
- Host: An IP address or FQDN of an internal server.
- Port: The port to test connectivity on (e.g., 80, 443, or a custom port of a reliable internal service).
-
Behavior when Internal:
-
If IHD succeeds (meaning the client is internal), the agent can be configured to:
- Connect to an Internal Gateway: Useful for HIP checks and consistent policy even when on-prem.
- Disable Agent and Disconnect VPN: If VPN is not needed internally. The agent remains active for HIP collection but doesn't establish a tunnel.
- Remain Connected to External Gateway (less common): Usually, you'd want to switch or disconnect.
- The agent uses this detection to switch its behavior, potentially disabling the VPN tunnel (if configured for "no direct access to the local network" when internal) or connecting to an internal gateway.
-
If IHD succeeds (meaning the client is internal), the agent can be configured to:
If IHD is configured, the agent will perform these checks. If it determines it's internal, it will consult the internal gateway list (if any) or follow the configured behavior for internal clients. If it determines it's external, it will use the external gateway list.
III.7. Portal Agent Tab - HIP Data Collection
Host Information Profile (HIP) data collection settings are configured within the 'Agent Configuration' section of the GlobalProtect Portal's 'Agent' tab. HIP allows the firewall to gather information about the security posture of connecting endpoints.
Overview of HIP Data Collection:
- Purpose: The GlobalProtect agent collects information about the endpoint, such as OS version, patch level, antivirus status, disk encryption status, firewall status, and custom checks (e.g., presence of specific files or registry keys).
- HIP Profile: This collected information forms a "HIP Profile" for the endpoint.
- Submission: The agent submits this HIP Profile to the Portal and/or Gateway.
-
Policy Enforcement:
- HIP Objects: You create HIP Objects on the firewall that define criteria for a compliant (or non-compliant) endpoint (e.g., "OS is Windows 10 version X or later AND Antivirus is enabled AND Real-time protection is ON").
- HIP Profiles (Matching): You then create HIP Profiles (on the firewall, distinct from the data profile) that match against these HIP Objects.
- Security Policies: These HIP Profiles can be used as match criteria in Security Policy rules to control access. For example, only compliant devices might be allowed to access sensitive resources.
Configuration in Portal Agent Tab:
- Enable HIP Data Collection: Checkbox to enable/disable HIP collection for agents using this configuration.
- HIP Notification Message: Customize messages displayed to users if their device is non-compliant.
- Categories of Data to Collect: You can select which categories of information the agent should collect (e.g., OS info, patch management, firewall, anti-malware, disk encryption, custom checks).
HIP is a powerful feature for enhancing security by ensuring endpoints meet certain security standards before being granted access. It requires careful planning of HIP Objects and Profiles on the firewall.
III.8. Portal Satellite Tab
The 'Satellite' tab in a GlobalProtect Portal configuration is primarily used in the context of Large Scale VPN (LSVPN) deployments.
Purpose of the Satellite Tab:
- LSVPN Integration: LSVPN is a Palo Alto Networks feature that simplifies the deployment and management of numerous site-to-site VPNs, typically in a hub-and-spoke or dynamic mesh topology.
- Portal as LSVPN Controller: In an LSVPN setup, the GlobalProtect Portal can act as a central controller or orchestrator. It helps satellite firewalls (acting as LSVPN gateways) discover each other and establish VPN tunnels.
- Configuration Distribution: The Portal distributes necessary configuration information to the LSVPN satellite devices.
Typical Use Case (LSVPN):
- When configuring LSVPN, the firewall acting as the LSVPN hub or a dedicated management firewall with Portal capabilities would have settings configured under this 'Satellite' tab.
- These settings relate to how the Portal interacts with LSVPN satellite gateways, such as authentication methods for satellites, certificates, and tunnel parameters.
For standard remote access GlobalProtect deployments (client-to-site VPNs), the 'Satellite' tab is generally not used or configured. Its functionality is specific to the LSVPN architecture.
IV.1. Gateway Overview & GUI Path
The GlobalProtect Gateway is the component that terminates VPN tunnels from GlobalProtect clients, enforces security policies on their traffic, and provides access to internal network resources.
Standard GUI Navigation Path in PAN-OS:
Network > GlobalProtect > Gateways
From this screen, you can add a new gateway configuration or modify an existing one.
General Purpose of the Gateway:
- Establish secure VPN tunnels (SSL or IPSec) with GlobalProtect agents.
- Authenticate (or re-authenticate) users connecting via the agent.
- Enforce security policies, including threat prevention, URL filtering, and application control, on traffic from remote users.
- Assign IP addresses to clients from a configured IP pool.
- Provide DNS and routing information to clients.
- Control access to internal resources based on security policies.
- Optionally, collect HIP information from clients for posture assessment.
IV.2. Gateway General Tab
The 'General' tab in a GlobalProtect Gateway configuration contains fundamental settings for the gateway's identity and network presence.
Key Configuration Parameters:
-
Name:
A descriptive name for the gateway configuration (e.g.,
GP_Gateway_External_Primary
). This is for administrative purposes. - Interface: The network interface on the firewall that will listen for GlobalProtect Gateway connections (VPN tunnel establishments). This is typically an external-facing interface for remote access.
-
IP Address(es):
- Select the IP address on the chosen interface that the gateway will use. If the interface has multiple IP addresses, you can choose one.
- An FQDN resolving to this IP address should be used by clients (as configured in the Portal's agent configuration).
- IPv6 Address(es) (Optional): If IPv6 is used for VPN connections, configure the IPv6 address on the selected interface.
-
Tunnel Interface:
Select the logical Tunnel Interface that will be associated with this gateway. VPN client traffic will ingress and egress through this tunnel interface. This interface must be created beforehand (
Network > Interfaces > Tunnel
).
Ensure the selected physical interface is in the correct Security Zone (e.g., Untrust) and the selected Tunnel Interface is in its dedicated VPN zone (e.g., GP-VPN-Zone). An Interface Management Profile allowing 'GlobalProtect' (and potentially 'IPSec' if used explicitly) should be applied to the physical interface.
IV.3. Gateway Authentication Tab
The 'Authentication' tab for the GlobalProtect Gateway is where you configure how users (or rather, their sessions) are authenticated or validated when establishing a VPN tunnel to this gateway.
Key Settings:
-
SSL/TLS Service Profile:
- Select an SSL/TLS Service Profile that defines the server certificate the gateway will present to clients for SSL VPN tunnel establishment. This certificate must be trusted by clients and typically should be the same as or from the same CA as the Portal's certificate if using an FQDN that could resolve to either.
-
Client Authentication:
- This section defines how the gateway authenticates the client session. It can differ from the Portal's initial authentication.
- Click 'Add' to create a client authentication configuration.
- Name: A descriptive name.
- OS: Select applicable operating systems.
- Authentication Profile: You might select an Authentication Profile here if you require the gateway to perform a full re-authentication (e.g., prompting for credentials again). However, this is less common if cookie authentication is used.
-
Authentication Modifier (Cookie):
- Purpose: This is a common and recommended method for gateway authentication. It leverages the authentication already performed by the Portal.
-
Accept cookie for authentication:
Enable this to allow the gateway to accept the authentication cookie issued by the Portal.
- Cookie Authentication Type: Typically "Authentication Cookie".
- Certificate Profile for Cookie Decryption (if Portal encrypts cookie): If the Portal is configured to encrypt the cookie, the Gateway needs the corresponding certificate (usually the Portal's SSL/TLS certificate) to decrypt it.
- If the cookie is valid and accepted, the user is authenticated to the gateway without needing to re-enter credentials. This provides a seamless experience.
- Client Certificate Authentication: Can also be configured here as an alternative or additional factor.
While the Portal performs the initial user authentication, the Gateway also has an authentication step. Often, this is satisfied by an authentication cookie passed from the Portal, but it can be configured for full re-authentication or certificate checks if needed. This distinction is important for understanding the flow.
IV.4. Gateway Agent Tab - Tunnel Settings
Under the Gateway's 'Agent' tab, the 'Tunnel Settings' section is crucial for defining how the VPN tunnel itself is established and operates.
Key 'Tunnel Settings':
- Tunnel Interface: This is a read-only field here, reflecting the Tunnel Interface selected in the 'General' tab of the Gateway configuration. All VPN traffic will be associated with this logical interface.
-
Enable IPSec:
- If checked, the Gateway will attempt to establish an IPSec tunnel with the client. This is often preferred for performance.
- Fallback to SSL: If IPSec fails (e.g., due to network restrictions blocking ESP or IKE), the connection will automatically fall back to SSL VPN if this option is implicitly or explicitly part of the behavior. GlobalProtect primarily uses SSL/TLS for control and can use it for data, but IPSec is common for the data tunnel.
- If unchecked, the tunnel will be SSL VPN only.
-
Tunnel Mode:
- This refers to how the Gateway encapsulates traffic. While "Tunnel Mode" is a general VPN term, in GlobalProtect, the underlying mechanisms are typically SSL/TLS or IPSec (ESP in tunnel mode). The specifics are often abstracted.
- The key choice here is enabling IPSec or relying purely on SSL.
- Enable X-Auth Support (If IPSec is enabled): Used if extending authentication for IPSec via X-Auth, typically with pre-shared keys or certificates. Less common with modern GlobalProtect setups that rely on SSL for initial auth and cookie.
- Group Name / Group Password (If IPSec with X-Auth): Credentials for X-Auth.
-
DPD (Dead Peer Detection):
- Enable DPD: Allows the gateway to detect if a VPN client has become unresponsive.
- Interval / Retry: Configure timings for DPD probes.
- Keep Alive: Sends keep-alive packets to maintain the tunnel through NAT devices.
- Rekey / Lifetime Settings: Configure parameters for cryptographic key regeneration for the tunnel (e.g., data lifetime, time lifetime).
The "Enable IPSec" option is significant. Most deployments aim to use IPSec for the data tunnel due to potential performance benefits, with SSL as a reliable fallback. Ensure your network path allows IPSec (UDP 500, UDP 4500, ESP protocol 50).
IV.5. Gateway Agent Tab - Client Settings (Network)
Within the Gateway's 'Agent' tab, under 'Client Settings', the 'Network Settings' (or similarly named section) is where you define network parameters that will be pushed to the GlobalProtect clients upon connection.
Key 'Network Settings' in Client Configuration:
-
IP Pool(s):
- This is where you define one or more IP address ranges that the gateway will assign to connecting clients for their virtual VPN interface.
-
Example:
192.168.200.1-192.168.200.254
. - The pool must be large enough for the maximum concurrent users and should not overlap with other network segments.
-
Primary DNS Server / Secondary DNS Server:
- Specify the IP addresses of the DNS servers that clients should use to resolve hostnames when connected to the VPN.
- These should typically be your internal DNS servers capable of resolving internal resources.
-
Primary WINS Server / Secondary WINS Server (Legacy):
- For environments still using WINS for NetBIOS name resolution. Generally less common now.
-
DNS Suffix(es):
-
Specify one or more DNS suffixes (e.g.,
corp.example.com
,dev.example.com
). - This allows clients to resolve short hostnames by automatically appending these suffixes.
-
Specify one or more DNS suffixes (e.g.,
These settings are fundamental for client connectivity. Without a valid IP address from the pool and correct DNS server information, clients will not be able to access internal resources properly.
IV.6. Gateway Agent Tab - Client Settings (Split Tunnel)
Split tunneling is configured within the Gateway's 'Agent' tab, specifically under 'Client Settings' in a sub-tab or section often labeled 'Split Tunnel' or 'Access Route Configuration'. This determines which traffic from the client endpoint is sent through the VPN tunnel and which traffic goes directly to the internet (or local network).
Defining Access Route Configuration (Split Tunneling):
-
No Direct Access to Local Network (Tunnel All):
If this option (or a similar "tunnel all" setting) is selected, all traffic from the client (internet-bound, internal-bound, local LAN) is forced through the VPN tunnel to the gateway. This provides maximum security inspection but can consume more bandwidth and add latency for internet traffic.
- This is often the default or recommended secure posture if all traffic needs inspection.
-
Split Tunnel Traffic:
If you choose to enable split tunneling, you then define which traffic goes through the tunnel.
-
Include Routes:
Specify IP subnets that should be accessed via the VPN tunnel. Any traffic destined for these subnets will be tunneled. All other traffic will bypass the tunnel.
-
Example:
10.0.0.0/8
,172.16.0.0/12
,192.168.0.0/16
(common private IP ranges).
-
Example:
- Exclude Routes (Less common for defining VPN traffic, more for excluding specific local resources if "tunnel all" is mostly used): Specify IP subnets that should NOT go through the tunnel.
-
Include Routes:
Specify IP subnets that should be accessed via the VPN tunnel. Any traffic destined for these subnets will be tunneled. All other traffic will bypass the tunnel.
-
Split Tunnel by Domain and Application (Advanced):
-
Domains:
You can specify domain names (e.g.,
*.mycompany.com
,sharepoint.site.com
). Traffic destined for these domains will be tunneled. This requires the agent to perform DNS resolution or inspection to identify matching traffic. - Applications: You can select specific applications (requires Application IDs known to Palo Alto Networks). Traffic identified as these applications will be tunneled.
- Video Streaming Applications: Specific categories for common video streaming services (e.g., YouTube, Netflix) can be explicitly excluded from the tunnel to save bandwidth, sending them direct to the internet.
-
Domains:
You can specify domain names (e.g.,
Considerations for Split Tunneling:
- Security: Tunneling all traffic provides the most security as all client traffic is inspected by the firewall. Split tunneling can create security gaps if not carefully configured, as internet-bound traffic from the client bypasses firewall inspection.
- Bandwidth/Performance: Tunneling all traffic can increase bandwidth consumption on the corporate internet link and add latency for users accessing public internet sites. Split tunneling can alleviate this.
- User Experience: Forcing all traffic through the VPN might be slow for users accessing SaaS applications or general internet sites.
Careful planning is required. If split tunneling is used, ensure only necessary corporate traffic is included in the tunnel, and be aware of the security implications for excluded traffic.
IV.7. Gateway Agent Tab - Network Services
The 'Network Services' tab (or a similarly named section) within the Gateway's Agent configuration allows for configuring specific network-related services provided by the gateway to the clients, notably DNS proxy functionality.
Purpose and Configuration Options:
-
DNS Proxy Functionality:
- Enable DNS Proxy: If enabled, the GlobalProtect Gateway can act as a DNS proxy for connected clients.
- How it works: When clients send DNS queries, they can be directed to the Gateway's tunnel IP (which acts as the proxy). The Gateway then forwards these queries to the upstream DNS servers configured for the firewall (or specifically for the Gateway).
-
Benefits:
- Simplified Client Configuration: Clients might only need to be configured with the Gateway's IP as their DNS server.
- Conditional Forwarding/Split DNS: The firewall's DNS proxy can be configured with more sophisticated rules, such as forwarding queries for internal domains to internal DNS servers and queries for external domains to public DNS servers. This can help manage split DNS scenarios effectively.
- Visibility/Logging: DNS queries passing through the firewall's DNS proxy can be logged, providing visibility.
- Settings related to how the gateway handles or announces other network services might be found here, though DNS proxy is the most common feature in this context.
- Some WINS-related proxy settings might also appear here if WINS is being used.
Enabling the DNS Proxy on the Gateway can be very useful, especially in complex split-tunneling or multi-domain environments, as it centralizes DNS resolution logic at the firewall level rather than relying on individual client configurations to handle different DNS zones.
V.1. Overall Supporting Objects and Policies
Beyond the direct Portal and Gateway object configurations, several other PAN-OS objects and policies are critical for GlobalProtect to function correctly. These supporting elements must be configured properly:
- Tunnel Interface: A logical interface for VPN traffic.
- Security Zones: For the external interface, tunnel interface, and internal resources.
- SSL/TLS Server Certificates & Service Profiles: For securing Portal/Gateway communication.
- Authentication Profiles & Sequences: To define how users are authenticated.
- IP Address Pool: For assigning IPs to clients (configured in Gateway).
- DNS Settings: For client name resolution (configured in Gateway).
- Address Objects/Groups: For representing client IP pools and internal resources in policies.
- Routing Configuration: To ensure traffic can flow between clients and internal networks.
- Security Policy Rules: To permit/deny traffic between zones.
- NAT Policy Rules: Typically a "No-NAT" rule for GP client traffic to internal resources.
- Interface Management Profile: To allow 'GlobalProtect' service on the external interface.
- HIP Objects & Profiles (Optional): If using Host Information Profile checks.
Each of these components plays a vital role in the overall GlobalProtect solution.
V.2. Tunnel Interface Configuration
A logical Tunnel Interface is essential for GlobalProtect Gateways. It serves as the termination point for VPN tunnels and the interface through which client traffic enters and exits the firewall's dataplane for policy inspection.
Creation and Configuration Steps (GUI Path:
Network > Interfaces > Tunnel
):
-
Add Tunnel Interface:
Click 'Add' to create a new tunnel interface. A numerical ID will be assigned (e.g.,
tunnel.1
,tunnel.10
). -
Configuration Tab:
-
Name:
The system assigns a name like
tunnel.X
. You can't change this part, but you add it to a virtual router and zone. - Virtual Router: Assign the tunnel interface to a Virtual Router. This is typically the same virtual router that handles your internal and external routing.
-
Security Zone:
Assign the tunnel interface to a Security Zone.
-
Best Practice:
Create a dedicated Security Zone for GlobalProtect clients (e.g.,
GP-VPN-Zone
,RemoteUsers-Zone
). This allows for granular policy control.
-
Best Practice:
Create a dedicated Security Zone for GlobalProtect clients (e.g.,
-
Name:
The system assigns a name like
-
IPv4 / IPv6 Tabs (Optional but common for management):
-
You can optionally assign an IP address to the tunnel interface itself. This IP is not typically used for client VPN traffic directly (clients get IPs from the pool), but it can be useful for:
- Routing protocols if you run them over the tunnel to redistribute the client IP pool.
- Management access or as a source IP for traffic originating from the firewall through this tunnel (less common for GP).
- If assigning an IP, ensure it's unique and doesn't overlap with the client IP pool.
- Most often, for GlobalProtect client VPNs, the tunnel interface might not have an IP address explicitly configured on it, as routing for the client IP pool is handled via static routes or redistribution.
-
You can optionally assign an IP address to the tunnel interface itself. This IP is not typically used for client VPN traffic directly (clients get IPs from the pool), but it can be useful for:
- Advanced Tab (MTU, etc.): Adjust MTU if necessary, though default values are usually fine.
This Tunnel Interface is then selected in the GlobalProtect Gateway configuration (
General
tab). Security policies will use the zone assigned to this tunnel interface as the source zone for traffic originating from GlobalProtect clients.
V.3. Zone Configuration (Reiteration)
Security Zones are a cornerstone of Palo Alto Networks' security model. For GlobalProtect, proper zone configuration is vital for segmenting traffic and applying appropriate security policies.
Key Zones and Their Importance:
-
External-Facing Zone (e.g.,
Untrust
,Internet-DMZ
):- The physical interface(s) hosting the GlobalProtect Portal and Gateway services will typically reside in this zone.
- Security policies will control initial access to the Portal/Gateway services themselves.
-
VPN/GlobalProtect Client Zone (e.g.,
GP-VPN-Zone
,Remote-Access
):-
This is crucial.
The logical Tunnel Interface (e.g.,
tunnel.1
) associated with your GlobalProtect Gateway(s) must be assigned to a dedicated Security Zone. - This zone represents the source of traffic originating from authenticated GlobalProtect clients.
- Creating a dedicated zone allows for precise security policies defining what these remote users can access.
-
This is crucial.
The logical Tunnel Interface (e.g.,
-
Internal Zones (e.g.,
Trust
,DMZ
,Servers
,Users
):- These are your existing zones that host internal resources.
-
Security policies will be written to permit (or deny) traffic from the
GP-VPN-Zone
to these internal zones.
Policy Flow Example:
A typical security policy for GlobalProtect users would be:
Source Zone: GP-VPN-Zone
->
Destination Zone: Trust
->
Application: any
->
Service: any
->
Action: Allow
(with appropriate security profiles applied).
Without distinct zones, especially a dedicated zone for the tunnel interface, it becomes very difficult to write effective and granular security policies for GlobalProtect users.
V.4. Authentication Profile/Sequence Setup
Authentication Profiles and Authentication Sequences define how users are verified before gaining access via GlobalProtect. These are configured under
Device > Authentication Profile
and
Device > Authentication Sequence
.
Guidance on Configuration:
- Choose Authentication Method(s): Decide which methods you'll use (LDAP, RADIUS, SAML, Kerberos, Local DB, Certificate). This depends on your existing identity infrastructure and security requirements (e.g., MFA).
-
Create Authentication Profile(s):
-
Navigate to
Device > Authentication Profile
and click 'Add'. -
Name:
Give it a descriptive name (e.g.,
AD_LDAP_Auth
,MFA_RADIUS_Auth
,Okta_SAML_Auth
). - Type: Select the type (LDAP, RADIUS, SAML, etc.).
-
Server Profile (for LDAP, RADIUS, Kerberos):
-
You'll need to create a Server Profile first (e.g., LDAP Server Profile under
Device > Server Profiles > LDAP
) that contains the connection details for your authentication server (IP, port, base DN, bind credentials for LDAP; server IP, secret for RADIUS). - Select this Server Profile in your Authentication Profile.
-
You'll need to create a Server Profile first (e.g., LDAP Server Profile under
- SAML Specifics: For SAML, you'll configure IdP metadata, SP identity, and other SAML-specific settings. This often involves exporting metadata from the firewall and importing it into your IdP, and vice-versa.
- Login Attribute / User Domain: Configure as needed for your authentication type.
- Advanced Tab (Allow List, etc.): Configure an allow list of users/groups if needed.
-
Navigate to
-
Create Authentication Sequence (Optional but common for MFA or Fallback):
-
Navigate to
Device > Authentication Sequence
and click 'Add'. -
Name:
E.g.,
GP_MFA_Sequence
. - Authentication Profiles: Add the Authentication Profiles you created in the desired order. For MFA, you might add an LDAP profile first, then a RADIUS profile (for MFA token).
- Use first successful profile or require all: Choose if any one success is enough, or if all profiles in the sequence must succeed (typical for MFA).
-
Navigate to
-
Assign to GlobalProtect:
-
In the GlobalProtect Portal configuration (
Authentication
tab), select the created Authentication Profile or Sequence for Client Authentication. -
In the GlobalProtect Gateway configuration (
Authentication
tab), you might also select an Authentication Profile/Sequence if direct re-authentication is needed, or configure it to use cookie authentication.
-
In the GlobalProtect Portal configuration (
Refer to Palo Alto Networks official documentation for detailed steps specific to each authentication type (e.g., "Configure LDAP Authentication", "Configure SAML SSO").
V.5. SSL/TLS Service Profile Setup
An SSL/TLS Service Profile dictates which server certificate the firewall uses for services like GlobalProtect Portal and Gateway, and also defines the SSL/TLS protocols and cipher suites.
Creation and Association (GUI Path:
Device > Certificate Management > SSL/TLS Service Profile
):
-
Import/Generate Server Certificate:
-
First, ensure you have the server certificate that will be presented to clients. This certificate must be trusted by the clients.
- Ideally, this is a certificate signed by a public CA or your internal enterprise CA.
-
Import it via
Device > Certificate Management > Certificates
. Make sure to import the private key as well. - The certificate's Common Name (CN) or Subject Alternative Name (SAN) should match the FQDN clients use to connect to GlobalProtect.
-
First, ensure you have the server certificate that will be presented to clients. This certificate must be trusted by the clients.
-
Create SSL/TLS Service Profile:
-
Navigate to
Device > Certificate Management > SSL/TLS Service Profile
and click 'Add'. -
Name:
Give it a descriptive name (e.g.,
GP_SSL_Profile
). - Certificate: Select the server certificate you imported/generated in the previous step from the dropdown list.
-
Protocol Settings:
- Min Version / Max Version: Specify the minimum and maximum SSL/TLS protocol versions allowed (e.g., Min: TLSv1.2, Max: TLSv1.3). It's best practice to disable older, insecure protocols like SSLv3 and TLSv1.0/1.1.
- Authentication (Ciphers, etc.): You can usually leave cipher selection to default unless specific compliance requirements dictate otherwise. Modern defaults are generally secure.
-
Navigate to
-
Associate with GlobalProtect Portal/Gateway:
-
In the GlobalProtect Portal configuration (
Authentication
tab), select this SSL/TLS Service Profile. -
In the GlobalProtect Gateway configuration (
Authentication
tab), select this SSL/TLS Service Profile.
-
In the GlobalProtect Portal configuration (
Using a strong, trusted certificate and secure SSL/TLS protocol versions is paramount for the security of your GlobalProtect deployment.
V.6. Address Objects/Groups for GlobalProtect
Using Address Objects and Address Groups is a best practice for managing IP addresses and subnets in Palo Alto Networks firewall policies, including those related to GlobalProtect.
Best Practices for GlobalProtect:
-
GlobalProtect Client IP Pool:
-
Create an Address Object (Type: IP Netmask or IP Range) representing the IP address pool(s) assigned to GlobalProtect clients.
-
Example Name:
AO_GP_Client_Pool
-
Value:
192.168.100.0/24
(if your pool is this subnet)
-
Example Name:
-
If you have multiple IP pools, create an Address Object for each and then combine them into an Address Group (e.g.,
AG_GP_Client_Pools
). - Usage: This object/group will be used as the source address in Security Policy rules for traffic originating from GlobalProtect clients. It's also used in NAT policies (for No-NAT).
-
Create an Address Object (Type: IP Netmask or IP Range) representing the IP address pool(s) assigned to GlobalProtect clients.
-
Internal Network Resources:
-
Use existing or create new Address Objects and Address Groups for your internal servers, applications, or entire subnets that GlobalProtect clients need to access.
-
Example Names:
AO_Internal_WebServer
,AG_Finance_Servers
,AO_LAN_Subnet1
-
Example Names:
- Usage: These objects/groups will be used as the destination address in Security Policy rules allowing GlobalProtect clients to access internal resources.
-
Use existing or create new Address Objects and Address Groups for your internal servers, applications, or entire subnets that GlobalProtect clients need to access.
Benefits of Using Address Objects/Groups:
-
Readability:
Policies become much easier to read and understand (e.g.,
Source: AG_GP_Client_Pools
instead of raw IP addresses). - Maintainability: If an IP address or subnet changes, you only need to update the Address Object, and all policies referencing it are automatically updated. This reduces errors and administrative overhead.
- Reusability: Objects can be reused across multiple policies.
Configuration Path:
Objects > Addresses
and
Objects > Address Groups
.
V.7. Routing Configuration for GlobalProtect
Correct routing is essential to ensure that traffic can flow between GlobalProtect clients and your internal network resources, and also for the firewall to route traffic back to the clients.
Key Routing Requirements:
-
Firewall's Route to Internal Resources:
- The Virtual Router on the firewall that the GlobalProtect Tunnel Interface is assigned to must have routes to the internal networks/subnets that VPN clients need to access.
- These routes can be learned via dynamic routing protocols (OSPF, BGP, RIP), or they can be static routes configured on the firewall.
-
Internal Network's Route to GlobalProtect Client IP Pool:
- Your internal network devices (core switches, routers) must know how to route traffic destined for the GlobalProtect client IP pool back to the Palo Alto Networks firewall.
-
Methods:
- Static Route on Internal Routers: Configure static routes on your internal routers pointing the GlobalProtect client IP pool(s) towards the firewall's internal interface IP address.
-
Dynamic Routing:
If you are using dynamic routing protocols internally, you can configure the firewall to redistribute the GlobalProtect client IP pool into the routing protocol. This is often done by:
-
Creating a static route on the firewall for the GP client IP pool, with the next hop being the Tunnel Interface itself (e.g.,
Destination: 192.168.100.0/24, Next Hop: Tunnel.X
). This makes the route active in the firewall's RIB. - Then, configure a redistribution profile in your dynamic routing protocol (OSPF, BGP) on the firewall to redistribute this static route (or directly connected if the tunnel interface has an IP in that range) into your internal network.
-
Creating a static route on the firewall for the GP client IP pool, with the next hop being the Tunnel Interface itself (e.g.,
-
Firewall's Route for Client IP Pool (Often Implicit or via Static Route to Tunnel):
- The firewall itself needs to associate the client IP pool with the correct Tunnel Interface. When a client connects and gets an IP from the pool, the firewall usually handles this association.
-
Sometimes, a static route pointing the client IP pool to the specific tunnel interface (e.g.,
Destination:
) is configured on the firewall to ensure the firewall knows traffic for these IPs egresses that tunnel. This is also useful for redistribution as mentioned above., Interface: tunnel.X, Next Hop: None
Configuration Path (Static Routes):
Network > Virtual Routers > [Your_VR] > Static Routes
.
Configuration Path (Dynamic Routing):
Network > Virtual Routers > [Your_VR] > [OSPF/BGP/etc.]
.
Routing issues are a common cause of GlobalProtect connectivity problems where clients can connect but cannot access resources, or resources cannot reply to clients.
V.8. Security Policy Rules for GlobalProtect
Security Policy rules are essential to permit legitimate traffic from GlobalProtect clients to internal resources and to apply security inspections.
Creating Security Policy Rules (GUI Path:
Policies > Security
):
You will typically need at least one rule, but often more for granular control.
- Rule Placement: Place GlobalProtect-related rules appropriately within your rulebase. Rules are evaluated top-down.
-
Rule Structure (Example for allowing GP clients to access a trusted internal network):
-
Name:
Descriptive, e.g.,
Allow_GP-VPN_to_Trust
. -
Source Zone:
Select the Security Zone assigned to your GlobalProtect Tunnel Interface (e.g.,
GP-VPN-Zone
). -
Source Address:
-
Use the Address Object or Address Group representing your GlobalProtect Client IP Pool (e.g.,
AG_GP_Client_Pools
). - You can also specify 'Any' if you want to match all IPs from that zone, but using the pool object is more precise.
-
Use the Address Object or Address Group representing your GlobalProtect Client IP Pool (e.g.,
-
Destination Zone:
Select the internal zone containing the resources (e.g.,
Trust
,DMZ
,Servers
). -
Destination Address:
-
Use Address Objects or Address Groups representing the specific internal servers or subnets clients need to access (e.g.,
AG_Internal_Servers
). - Avoid using 'Any' if possible; apply the principle of least privilege.
-
Use Address Objects or Address Groups representing the specific internal servers or subnets clients need to access (e.g.,
-
Application:
-
Specify the applications clients are allowed to use (e.g.,
ssh
,rdp
,ms-ds-smb
, or custom App-IDs). - Start with 'Any' for testing if needed, but refine to specific applications for better security.
-
Specify the applications clients are allowed to use (e.g.,
-
Service/URL Category:
-
Specify the L4 services/ports (e.g.,
application-default
,tcp-445
,tcp-3389
). `application-default` is often preferred as it uses standard ports for the matched App-ID. - URL Category is typically used for web traffic.
-
Specify the L4 services/ports (e.g.,
-
Action:
Set to
Allow
. -
Profile Setting (Security Profiles):
- CRITICAL: Apply relevant Security Profiles to inspect the allowed traffic. This is where the "next-generation" aspect of the firewall comes in.
-
Attach profiles for:
- Anti-Virus
- Anti-Spyware
- Vulnerability Protection
- URL Filtering (if applicable)
- File Blocking (if applicable)
- WildFire Analysis
- Use a Security Profile Group if you have standard sets of profiles.
- Log Settings: Enable logging at session end (and start, if needed for troubleshooting).
-
Name:
Descriptive, e.g.,
Principle of Least Privilege: Only allow access to the specific internal resources, applications, and services that GlobalProtect users legitimately need. Apply comprehensive Security Profiles to all allowed traffic.
V.9. NAT Policy (No-NAT) for GlobalProtect
When GlobalProtect clients access internal resources, their source IP address (from the GlobalProtect IP Pool) usually needs to be preserved so that internal servers see the true client IP and can route return traffic correctly. If the firewall performs Source NAT (SNAT) on this traffic to its own internal interface IP, it can break applications or logging.
Therefore, a 'No-NAT' rule (or a source NAT exemption) is typically necessary for GlobalProtect client traffic destined for internal networks.
Configuring a No-NAT Rule (GUI Path:
Policies > NAT
):
- Rule Placement: NAT rules are also evaluated top-down. Place this No-NAT rule *before* any broader outbound NAT rules that might otherwise apply to traffic from the GlobalProtect client IP pool.
-
Rule Structure:
-
Name:
Descriptive, e.g.,
NoNAT_GP-VPN_to_Internal
. -
Original Packet Tab:
-
Source Zone:
Select the Security Zone assigned to your GlobalProtect Tunnel Interface (e.g.,
GP-VPN-Zone
). -
Destination Zone:
Select
Any
or, more specifically, the internal zones (e.g.,Trust
,DMZ
) that clients will access *without* NAT. If clients also access the internet through the tunnel and you *do* want to NAT that, make this specific to internal zones. -
Destination Interface:
Typically
Any
, or you can specify the egress interface if traffic to a specific internal zone always leaves via a particular interface. -
Source Address:
Use the Address Object or Address Group representing your GlobalProtect Client IP Pool (e.g.,
AG_GP_Client_Pools
). -
Destination Address:
Use Address Objects or Groups for your internal networks (e.g.,
AG_Internal_Networks
).
-
Source Zone:
Select the Security Zone assigned to your GlobalProtect Tunnel Interface (e.g.,
-
Name:
Descriptive, e.g.,
-
Translated Packet Tab:
-
Source Address Translation:
-
Type:
Select
None
. This is the key to making it a "No-NAT" rule.
-
Type:
Select
-
Destination Address Translation:
-
Type:
Typically
None
, unless you are also doing Destination NAT for some specific reason, which is uncommon in this context.
-
Type:
Typically
-
Source Address Translation:
- Activate the rule.
This No-NAT rule ensures that when a GlobalProtect client (e.g.,
192.168.100.10
) communicates with an internal server (e.g.,
10.1.1.50
), the server sees the request coming from
192.168.100.10
, not from the firewall's internal interface IP.
If you have a general outbound NAT rule (e.g., from any internal zone to Untrust, translating to the firewall's external IP), ensure your GlobalProtect No-NAT rule is positioned above it in the NAT policy list.
V.10. Interface Management Profile for GlobalProtect
An Interface Management Profile allows you to control which management services are permitted on a firewall interface. For GlobalProtect, you need to ensure the necessary services are allowed on the external-facing interface(s) where the Portal and Gateway are listening.
Utility and Configuration:
- Purpose: To explicitly permit network services like HTTPS (for Portal web access), GlobalProtect (for agent connections), and potentially IPSec (if used by the Gateway) on the interface. This provides an additional layer of security by only exposing necessary services.
-
Create/Modify Interface Management Profile (GUI Path:
Network > Network Profiles > Interface Mgmt
):- Click 'Add' or select an existing profile.
-
Name:
E.g.,
IMP_External_GP
. -
Services:
- HTTPS: Check this to allow access to the GlobalProtect Portal web page (for agent download, etc.) if it's hosted on this interface.
- GlobalProtect: Check this to allow GlobalProtect agent connections (for both Portal and Gateway communication over SSL/TLS). This is essential.
- IPSec (Optional): If your GlobalProtect Gateway is configured to use IPSec and you want to explicitly manage this service at the interface level via the profile, you might enable it. However, GlobalProtect service often handles the necessary IPSec negotiation aspects. Allowing the "GlobalProtect" service is typically the main requirement.
- SNMP, SSH, Telnet, HTTP, Ping: Enable these only if strictly necessary for managing the firewall *through this specific interface*. For external interfaces, it's best practice to disable unnecessary management services.
- Permitted IP Addresses (Optional): You can restrict which source IPs can access these management services. For GlobalProtect (which needs to be accessible by any remote client), you would typically leave this as 'Any' or not configure it.
-
Apply Profile to Interface (GUI Path:
Network > Interfaces > [Your_External_Interface] > Advanced Tab
):- In the configuration for the physical external interface hosting GlobalProtect:
- Under the 'Advanced' tab (or 'Other Info' in some older PAN-OS versions).
- Select the created Interface Management Profile from the 'Management Profile' dropdown.
If the 'GlobalProtect' service (and 'HTTPS' for portal web access) is not permitted by the Interface Management Profile on the external interface, clients will not be able to connect to the Portal or Gateway.
VI.1. GlobalProtect Connection Flow Diagram
A typical GlobalProtect connection involves several steps, illustrating how a remote user connects first to the Portal and then to a Gateway.
Simplified GlobalProtect Connection Flow.
Description of the Flow:
- Portal Connection: The GlobalProtect agent on the user's device first connects to the GlobalProtect Portal (using its FQDN).
- Portal Authentication: The Portal authenticates the user against configured authentication profiles (e.g., LDAP, RADIUS, SAML). MFA may be enforced here.
- Configuration Download: Upon successful authentication, the Portal sends the agent configuration to the client. This includes a list of available Gateways, HIP check requirements, connect method, etc. The Portal may issue an authentication cookie.
- Gateway Selection: The agent determines the "best" Gateway to connect to from the provided list (often based on lowest latency, or user selection if manual).
- Gateway Connection: The agent initiates a connection to the selected GlobalProtect Gateway.
- Gateway Authentication/Validation: The Gateway authenticates the session. This often involves validating the authentication cookie received from the Portal. In some setups, full re-authentication or client certificate validation might occur.
- Tunnel Establishment: A secure VPN tunnel (SSL or IPSec) is established between the agent and the Gateway.
- Traffic Flow: User traffic is now routed through the secure tunnel to the Gateway, where security policies are enforced before traffic is allowed to/from internal resources.
VI.2. Simplified Network Architecture Diagram
This diagram illustrates the typical placement of a Palo Alto Networks firewall hosting GlobalProtect Portal and Gateway services, and how traffic flows from a remote client to internal resources.
Zone: Untrust
GP Portal & Gateway Service] TunIF[Tunnel Interface (e.g., tunnel.1)
Zone: GP-VPN-Zone] IntIF[Internal Interface (e.g., ethernet1/2)
Zone: Trust] PortalGwServices[GP Portal/Gateway Logic] PolicyEngine[Security Policy Engine] ExtIF -- Portal/Gateway Connections --> PortalGwServices PortalGwServices -- VPN Tunnel Termination --> TunIF TunIF -- Inspected Traffic --> PolicyEngine PolicyEngine -- Allowed Traffic --> IntIF IntIF -- Allowed Traffic --> PolicyEngine PolicyEngine -- Return Traffic --> TunIF end subgraph InternalNetwork [Corporate Internal Network] direction LR InternalResources[Internal Resources
(Servers, Applications)
Zone: Trust/DMZ] end RemoteClient -- Encrypted VPN Tunnel --> ExtIF IntIF <--> InternalResources classDef internet fill:#e6f7ff,stroke:#005ea2,stroke-width:2px; classDef firewall fill:#e0ffe0,stroke:#006400,stroke-width:2px; classDef internal fill:#fff0e6,stroke:#d2691e,stroke-width:2px; class RemoteClient internet; class ExtIF,TunIF,IntIF,PortalGwServices,PolicyEngine firewall; class InternalResources internal;
Simplified GlobalProtect Network Architecture.
Key Components and Traffic Flow:
- Remote GP Agent: The user's device with GlobalProtect agent installed, located on an external network (Internet).
-
Palo Alto Networks Firewall:
- External Interface: Faces the internet, hosts the public IP addresses for GlobalProtect Portal and Gateway services. Resides in an 'Untrust' or similar zone.
- GP Portal/Gateway Logic: The processes on the firewall handling Portal authentication/configuration and Gateway tunnel termination/policy enforcement.
-
Tunnel Interface:
A logical interface (e.g.,
tunnel.1
) where VPN traffic logically enters the firewall's dataplane. Assigned to a dedicated VPN zone (e.g.,GP-VPN-Zone
). -
Security Policy Engine:
Inspects traffic flowing from the
GP-VPN-Zone
to internal zones (and vice-versa) based on configured security rules and profiles. - Internal Interface: Connects to the internal corporate network (e.g., 'Trust' zone).
- Internal Resources: Servers, applications, and other resources within the corporate network that remote users need to access.
Traffic Flow Summary:
- The Remote GP Agent establishes a secure VPN tunnel to the External Interface of the firewall (specifically to the Gateway service).
- Encrypted traffic from the client enters the firewall and is decrypted, then passed to the logical Tunnel Interface.
-
Traffic from the Tunnel Interface (
GP-VPN-Zone
) is processed by the Security Policy Engine. -
If allowed by security policies, traffic is routed via an Internal Interface to the destination Internal Resources in zones like
Trust
orDMZ
. - Return traffic from Internal Resources to the client follows the reverse path, being encrypted by the Gateway before being sent back over the VPN tunnel.
VII.1. Comprehensive Best Practices List for GlobalProtect
Deploying and managing Palo Alto Networks GlobalProtect effectively involves adhering to several key best practices to ensure security, reliability, and performance.
-
Use FQDNs for Portal/Gateway Addresses:
- Always use Fully Qualified Domain Names (FQDNs) for your Portal and Gateway addresses instead of IP addresses. This allows for IP address changes without client reconfiguration (DNS handles it) and is essential for SSL/TLS certificate common name matching.
-
Employ Trusted SSL/TLS Certificates:
- Use SSL/TLS certificates signed by a reputable public Certificate Authority (CA) for external-facing Portal and Gateways. For internal-only deployments, a well-managed internal CA is acceptable if clients trust it. Avoid self-signed certificates in production.
- Ensure certificates are not expired and use strong signature algorithms.
-
Implement Strong Authentication (MFA, SAML, Certificate-based):
- Enforce Multi-Factor Authentication (MFA) for all users. This can be achieved via RADIUS (with an MFA provider like Duo, Okta MFA), SAML (with an IdP that enforces MFA), or certificate-based authentication combined with another factor.
- Avoid relying solely on username/password.
-
Use a Dedicated VPN Security Zone:
-
Assign the GlobalProtect Tunnel Interface(s) to a dedicated Security Zone (e.g.,
GP-VPN-Zone
). This allows for granular security policies specifically for VPN traffic.
-
Assign the GlobalProtect Tunnel Interface(s) to a dedicated Security Zone (e.g.,
-
Apply the Principle of Least Privilege in Security Policies:
- Grant GlobalProtect users access only to the specific internal resources, applications, and services they absolutely need. Avoid overly broad "allow any" rules.
- Define source/destination addresses, applications, and services as narrowly as possible.
-
Apply Comprehensive Security Profiles to VPN Traffic:
- Treat VPN traffic like any other untrusted traffic. Apply all relevant Security Profiles (Anti-Virus, Anti-Spyware, Vulnerability Protection, URL Filtering, File Blocking, WildFire) to security rules allowing traffic from the VPN zone.
-
Careful Consideration and Precise Configuration of Split Tunneling:
- Tunnel All (Default Secure Posture): If maximum security and inspection are required, configure GlobalProtect to tunnel all client traffic.
- Split Tunneling: If used, carefully define which traffic (specific internal subnets, domains, or applications) goes through the tunnel. Understand the security implications of traffic bypassing the tunnel and firewall inspection. Exclude only trusted, high-bandwidth applications (like video streaming) if necessary, after risk assessment.
-
Optional: Enable HIP Checks for Endpoint Posture Assessment:
- Configure Host Information Profile (HIP) checks to assess the security posture of connecting endpoints (OS version, patches, AV status, etc.).
- Use HIP objects and profiles in security policies to enforce compliance before granting access to sensitive resources.
-
Active Monitoring and Logging:
- Regularly monitor GlobalProtect logs (System, GlobalProtect, Traffic, Threat) for connection issues, authentication failures, and security events.
- Ensure logging is enabled for security policies related to VPN traffic. Forward logs to a SIEM if applicable.
-
Keep PAN-OS and GlobalProtect Agent Software Updated:
- Regularly update the firewall's PAN-OS and the GlobalProtect client agent software to the latest recommended versions to benefit from security patches, bug fixes, and new features.
-
Plan for Capacity and Scalability:
- Ensure your firewall hardware and GlobalProtect licenses can support the expected number of concurrent users and traffic load.
- Consider deploying multiple gateways for redundancy and load distribution in larger environments.
-
User Training and Documentation:
- Provide clear instructions and support for users on how to install and use the GlobalProtect client.
VIII.1. Key PCNSE Exam Topics for GlobalProtect
For the Palo Alto Networks Certified Network Security Engineer (PCNSE) exam, a solid understanding of GlobalProtect Portal and Gateway configuration is critical. Based on typical exam blueprints and study guides, key topics and concepts to master include:
-
Distinct Roles of Portal vs. Gateway:
- Clearly understand what each component is responsible for (Portal: authentication, agent download, config delivery; Gateway: VPN tunnel termination, policy enforcement).
- Know that the Portal does not handle the data tunnel.
-
Key Configuration Tabs and Settings for Both Portal and Gateway:
- Portal: General (Interface, IP), Authentication (SSL/TLS Profile, Client Auth), Agent (Agent Configs, App settings, External/Internal Gateways, HIP).
- Gateway: General (Interface, IP, Tunnel Interface), Authentication (SSL/TLS Profile, Client Auth, Cookie Auth), Agent (Tunnel Settings, Client Settings - IP Pool, DNS, Split Tunnel/Access Routes).
-
Importance of Supporting Objects:
- Certificates (and SSL/TLS Service Profiles).
- Authentication Profiles and Sequences.
- Tunnel Interfaces.
- Security Zones (for physical interface and tunnel interface).
- Address Objects/Groups.
-
Licensing Prerequisites:
- Understand that a GlobalProtect license is required and how to verify it.
-
Portal's Role in Gateway List Delivery:
- How the portal provides the list of available gateways (internal and external) to the agent.
- Agent's logic for selecting a gateway (e.g., priority, latency).
-
Split Tunneling Configuration (Access Routes):
- How to configure include/exclude routes, domain-based, and application-based split tunneling.
- Understand the implications of "No Direct Access to Local Network" (tunnel all).
-
Security Policy and No-NAT Rule Requirements:
- How to construct security policies to allow VPN traffic (Source Zone: VPN-Zone, Source IP: Client Pool).
- The necessity and configuration of a No-NAT rule for VPN client traffic to internal resources.
-
Differences between Portal and Gateway Authentication:
- Portal handles initial user authentication.
- Gateway re-validates the session, often using a cookie from the portal, but can also perform full re-authentication or client certificate checks.
-
Basic Connection Flow:
- Client to Portal (auth, config) -> Client to Gateway (tunnel setup).
-
Internal Host Detection (IHD):
- Purpose and basic configuration.
-
HIP (Host Information Profile):
- Basic concept: agent collects host info, firewall uses it in policy.
- Where HIP data collection is configured (Portal Agent config).
Focus on understanding the "why" behind configurations, not just memorizing GUI paths. Scenario-based questions are common in the PCNSE exam.
VIII.2. Common PCNSE Questions Insights
Based on typical PCNSE exam focus areas for GlobalProtect, common questions often revolve around troubleshooting, configuration nuances, and understanding the distinct roles of components.
Areas frequently tested include:
- Troubleshooting Connection Issues: Scenarios where a client can't connect to the portal, can't connect to a gateway, or connects but can't access resources. This requires knowing the connection flow and what to check at each stage (certificates, routing, NAT, security policies, authentication).
- Certificate Problems: Questions about untrusted certificates, expired certificates, or CN/SAN mismatches.
- Authentication Failures: Why authentication might fail at the portal or gateway (e.g., incorrect credentials, MFA issues, misconfigured auth profiles).
- Split Tunneling Behavior: Scenarios asking which traffic will be tunneled based on a given split tunnel configuration (include/exclude lists, domain/app-based).
- NAT Policy Impact: Understanding why a No-NAT rule is needed and what happens if it's missing or misconfigured.
- Security Policy Logic: Given a set of security rules, determining if VPN traffic will be allowed or denied. The importance of zone order and rule order.
- Portal vs. Gateway Functionality: Differentiating tasks performed by the portal versus the gateway (e.g., "Which component is responsible for delivering the agent software?").
- Agent Configuration Delivery: How agent settings (connect method, gateway list) are pushed from the portal.
- HIP Matching: Basic understanding of how HIP data is collected and used in security policies (e.g., "A user's device does not have AV enabled. Which GlobalProtect feature can be used to restrict their access?").
- Interface Management Profiles: Why the "GlobalProtect" service must be enabled on the external interface.
Example Question Stems (Conceptual):
- "A remote user successfully authenticates to the GlobalProtect portal but cannot establish a VPN tunnel to any gateway. What are two potential causes?" (Could be gateway reachability, gateway cert issue, gateway auth config).
- "An administrator has configured split tunneling to include only subnet 10.10.0.0/16. Traffic to which of the following destinations will be sent through the VPN tunnel?"
- "Which GlobalProtect component is responsible for terminating the IPSec or SSL VPN tunnel from the client?" (Gateway).
- "A user reports receiving a certificate warning when trying to access the GlobalProtect portal. What is the most likely cause?" (Untrusted/mismatched certificate on Portal).
Thoroughly understanding the dependencies between different configuration elements (e.g., how an SSL/TLS Service Profile with a specific certificate is used by both Portal and Gateway) is key to answering complex scenario questions.
GlobalProtect Configuration Quiz
Test your knowledge of Palo Alto Networks GlobalProtect Portal and Gateway configuration.