GlobalProtect Licensing Overview

1. Introduction

GlobalProtect is Palo Alto Networks' comprehensive solution for secure remote access. It extends the protection of the corporate firewall to remote users by establishing a secure connection between the user's device and the enterprise network. Understanding the licensing options is crucial for deploying the appropriate features to meet organizational needs.

This article provides a detailed explanation of GlobalProtect licensing, including the different tiers, features associated with each, and visual aids to clarify complex concepts. Additionally, we will explore common App-ID concepts relevant to PCNSE certification and offer an interactive quiz to test your knowledge.

Key Takeaway: Choosing the right GlobalProtect license depends on your organization's specific remote access security requirements, including device types, security features like HIP checks, and integration needs.

2. Licensing Options

2.1 Basic Access (No License Required)

For organizations seeking fundamental VPN capabilities, GlobalProtect provides basic access without the need for additional licenses. This foundational tier allows you to establish secure remote connectivity for certain endpoints.

Features included in Basic Access:

Note: Advanced features such as Host Information Profile (HIP) checks, mobile device support, and Clientless VPN are not available in this tier. If these capabilities are required, a GlobalProtect Gateway License is necessary.

Basic access is suitable for organizations with simple remote access needs, primarily focused on providing VPN connectivity to Windows and macOS users without requiring advanced security posture checks or support for a wider range of devices.

2. Licensing Options (Continued)

2.2 GlobalProtect Gateway License

The GlobalProtect Gateway License unlocks a suite of advanced functionalities and is required for each Palo Alto Networks firewall that will host a GlobalProtect gateway and utilize these enhanced features. This license significantly expands the capabilities beyond basic VPN access.

Key features enabled by the Gateway License include:

Remember that the Gateway License is applied per firewall acting as a GlobalProtect gateway. If you have multiple firewalls serving as gateways and requiring these advanced features, each will need its own Gateway License.

2. Licensing Options (Continued)

2.3 GlobalProtect Subscription License

The GlobalProtect Subscription License (often referred to simply as the "GlobalProtect subscription" in newer contexts, and sometimes tied to Prisma Access or advanced endpoint features) typically builds upon the Gateway License. It's geared towards organizations needing the most advanced security features and integrations, particularly for endpoint protection and cloud-delivered security.

The term "GlobalProtect Subscription License" can sometimes be confusing as its specific feature set and naming has evolved. It's crucial to refer to the latest Palo Alto Networks datasheets and documentation for the most current information. Historically, this license was distinct. Now, many advanced features are bundled with Cortex XDR/Pro or Prisma Access subscriptions which inherently use GlobalProtect technology.

For the purpose of this article, based on common understanding and the provided text, features associated with this higher-tier subscription include:

This subscription is aimed at organizations looking to implement a Zero Trust network access (ZTNA) strategy and require deep endpoint visibility and control, along with seamless integration into a broader security ecosystem, including cloud-based security services.

3. Licensing Summary

The following table summarizes the features and their corresponding GlobalProtect license requirements:

Feature License Required
Basic VPN access (Windows/macOS) No License Required
HIP checks and content updates GlobalProtect Gateway License
Mobile app support (iOS, Android, etc.) GlobalProtect Gateway License
Linux and IoT endpoint support GlobalProtect Gateway License
IPv6 support for external gateways GlobalProtect Gateway License
Clientless VPN access GlobalProtect Gateway License
Split tunneling (destination domain, application process name, or video streaming application) GlobalProtect Gateway License
Adding compromised devices to quarantine GlobalProtect Gateway License
Advanced endpoint protection with integration to Palo Alto Networks' security services GlobalProtect Subscription License (or equivalent like Prisma Access / Cortex XDR Pro)
Integration with Endpoint Protection Platforms (EPP) and Endpoint Detection and Response (EDR) solutions GlobalProtect Subscription License (or equivalent)
Support for Prisma Access for remote users GlobalProtect Subscription License (typically bundled with Prisma Access subscription)

Important Note: Licensing models can evolve. Always consult the official Palo Alto Networks documentation, datasheets, or your Palo Alto Networks account team for the most up-to-date and specific licensing information relevant to your deployment scenario and software version.

Visualizations: GlobalProtect License Decision Flowchart

This flowchart helps visualize the decision-making process for selecting the appropriate GlobalProtect licensing based on feature requirements.

Yes

No

Yes

No

Yes

No

Start: Need Remote Access?

Basic VPN for Windows/macOS only?

No Additional License Required for Basic Access

Need any of these?
- HIP Checks & Content Updates
- Mobile App Support iOS, Android, etc.
- Linux/IoT Endpoint Support
- IPv6 for External Gateways
- Clientless VPN
- Advanced Split Tunneling
- Quarantine Compromised Devices

GlobalProtect Gateway License required per firewall

Need any of these?
- Advanced Endpoint Protection Integration
- EPP/EDR Solution Integration
- Prisma Access for Remote Users

GlobalProtect Subscription License needed
often alongside/part of Gateway License or
as part of Prisma Access/Cortex XDR Pro

Re-evaluate: Basic or Gateway License likely sufficient based on earlier choices

Deployment Complete

Flowchart illustrating GlobalProtect licensing decision points.

Visualizations: GlobalProtect License Feature Mapping

This diagram provides a simplified visual mapping of features to GlobalProtect license tiers.

GlobalProtect Subscription Features - Often via Prisma Access / Cortex XDR Pro

Advanced Endpoint Protection Integration - e.g., WildFire, DNS Security for endpoints

EPP/EDR Solution Integration

Prisma Access Connectivity

GlobalProtect Gateway License - Per Firewall

HIP Checks & Updates

Mobile App Support - iOS, Android, etc.

Linux & IoT Endpoint Support

IPv6 for External Gateways

Clientless VPN Access

Advanced Split Tunneling - Domain, App, Video

Quarantine Compromised Devices

No License Required

Basic VPN for Win/macOS

Portal/Gateway Deployment

Simplified feature mapping across GlobalProtect license tiers.

Visualizations: Basic GlobalProtect Connection Sequence

This sequence diagram illustrates the high-level steps involved when a GlobalProtect client connects to the corporate network.

Corporate Resource GlobalProtect Gateway GlobalProtect Portal User Device (GP Agent) Corporate Resource GlobalProtect Gateway GlobalProtect Portal User Device (GP Agent) 1 Request Portal Configuration 2 Send Gateway List, Client Config, Certificates 3 Select Gateway, Initiate VPN Connection (SSL/IPSec) 4 Authenticate User, Perform HIP Check (if licensed/configured) 5 HIP Report (if applicable) 6 VPN Tunnel Established (if auth/HIP successful) 7 Request Access to Corporate Resource 8 Forward Request (subject to Security Policy) 9 Resource Response 10 Forward Response

Sequence diagram of a typical GlobalProtect connection flow.

Visualizations: Simplified HIP Check State Machine

This state diagram shows a simplified view of the states an endpoint might go through during a HIP check process when connecting via GlobalProtect.

Gateway Requires HIP Pre-Login

Gateway Requires HIP Post-Login

VPN Established (No HIP)

HIP Profile Match

HIP Profile Mismatch

Full/Defined Network Access

Restricted Access / Notification

Connection Blocked

Re-check after remediation

Connecting

PreLogin_HIP_Check

PostLogin_HIP_Check

No_HIP_Check_Configured

HIP_Report_Sent

Evaluating_Policy

Compliant

Non_Compliant

Access_Granted

Quarantine

Access_Denied

User_Remediates

Disconnected

State machine illustrating a simplified HIP check process and outcomes.

App-ID PCNSE Interactive Quiz

Test your understanding of Palo Alto Networks App-ID with these 20 questions. These questions are designed to reflect common topics and scenarios you might encounter in PCNSE preparation.

1. Which of the following is NOT a primary identification technique used by App-ID?

2. What is the primary purpose of an Application Override policy?

3. If App-ID cannot identify an application using signatures or decoders, but the traffic is over TCP port 80, how might it initially be classified before further analysis?

4. How does App-ID handle applications that switch ports mid-session?

5. Which of the following statements about App-ID and SSL/TLS encrypted traffic is TRUE?

6. What is an "application dependency" in the context of App-ID?

7. How are new App-IDs for emerging applications primarily delivered to a Palo Alto Networks firewall?

8. If a security policy rule explicitly allows "web-browsing" but denies "ssl", what is the likely outcome for HTTPS traffic to a standard website?

9. What is the App-ID for traffic that the firewall has identified as DNS, but cannot associate with a more specific application using DNS (e.g., a specific SaaS service's DNS query)?

10. When creating a custom application, which characteristic is typically NOT part of its definition?

11. What does "insufficient-data" in the application field of a traffic log typically indicate?

12. An administrator wants to allow general web surfing but block Facebook. Which is the most effective way to configure this using App-ID?

13. What is the primary function of the App-ID cache on a Palo Alto Networks firewall?

14. If an application is identified as "unknown-tcp", what is the recommended first step for an administrator to gain more insight?

15. Which component of the firewall is responsible for maintaining and updating the App-ID signature database?

16. What is an "Application Filter" primarily used for?

17. Which of these App-IDs is an example of an "implicit" application that is often required for other applications to function?

18. When App-ID identifies an application, what is the next logical step the firewall takes regarding that traffic flow in the context of a security policy?

19. If you see traffic logged as "application incomplete" in the traffic logs, what does this typically mean?

20. How can User-ID information enhance App-ID based security policies?

4. References

For the most current and detailed information, always refer to the official Palo Alto Networks documentation:

Consult your Palo Alto Networks account team or authorized reseller for specific licensing questions related to your environment and purchased products (e.g., Prisma Access, Cortex XDR).