PAN-OS: Configuring Multiple GlobalProtect Gateway Agent Configurations

Introduction: Tailoring the Client Experience

While a single GlobalProtect Gateway can serve many users, you might encounter scenarios where different groups of users connecting to that same Gateway require distinct settings pushed down to their GlobalProtect agents. For example, you might need different split-tunneling rules, DNS servers, or IP pools based on user group, operating system, or device compliance (via HIP profiles).

PAN-OS addresses this need by allowing you to configure multiple Agent Configurations within a single GlobalProtect Gateway definition. The firewall then uses matching criteria (like user group, OS, or HIP profile) to determine which specific configuration to apply to a connecting client.

This powerful feature allows one logical Gateway infrastructure object on the firewall to provide customized experiences and network access parameters for diverse user populations, enhancing flexibility and granular control over your GlobalProtect deployment.

This article focuses on multiple Agent Configurations on a single Gateway . This is distinct from deploying multiple separate GlobalProtect Gateway instances (which might have different IP addresses or serve entirely different geographical regions).

Why Use Multiple Gateway Agent Configurations?

Common scenarios where multiple configurations on a single Gateway are beneficial:

Understanding these use cases is key for the exam, as questions often present a scenario and ask how to achieve it using Gateway Agent Configurations.

Configuration Location and Key Concepts

Location within the Gateway

You configure multiple agent configurations within the settings of a specific GlobalProtect Gateway.

GUI Path: Network > GlobalProtect > Gateways > [Select/Edit Your Gateway Name] > Agent tab

Within the Agent tab, the primary area for these multiple configurations is the Client Settings sub-tab. Here, you will add and order multiple "Client Settings Configuration" blocks.

Illustrative: GlobalProtect Gateway > Agent > Client Settings tab is where you add multiple configurations.

Core Concept: Matching Criteria & Order

When a GlobalProtect client connects to the Gateway, the firewall evaluates the list of configured Client Settings configurations sequentially from top to bottom .

Evaluates Client Settings

Yes

No

Yes

No

No

Yes

Client Connects Attributes OS, User, HIP

Gateway

Ordered List of Agent Configurations

Config 1: Matches?

Apply Config 1 Settings & Stop

Config 2: Matches?

Apply Config 2 Settings & Stop

...

Default Config: Matches? Usually Any/Any

Apply Default Settings & Stop

Session Established with Config 1

Session Established with Config 2

Session Established with Default Config

Flowchart of Gateway Agent Configuration Matching Logic.

Matching Criteria & Order of Evaluation

The effectiveness of multiple agent configurations hinges on correctly defining the matching criteria and the order of these configurations.

Matching Criteria

Each Client Settings configuration block allows you to specify criteria that the connecting client's attributes (OS, user identity, device posture) must meet to receive that specific set of configurations. The key matching criteria tabs within a Client Settings configuration are:

AND Logic within a Configuration Block: If you configure criteria across multiple tabs (e.g., OS is Windows, User Group is 'Engineers', AND HIP Profile is 'Compliant-Corporate') within a single Client Settings configuration block, the client must match ALL of these specified criteria to receive that configuration.

Order and "First Match Wins"

The order in which you list your Client Settings configurations is CRITICAL .

The "top-down, first match wins" rule is a fundamental concept for PCNSE. Incorrect ordering is a common source of misconfiguration.

The Indispensable Default/Fallback Configuration

It is crucial to have a "catch-all" or default Client Settings configuration block at the very bottom of the list .

Always configure a default/catch-all Client Settings configuration at the bottom of the list. This ensures all connecting clients receive some form of agent configuration.

Settings Defined Per Agent Configuration

Within each Client Settings configuration block (which is matched by OS, User/Group, and/or HIP criteria), you define the specific parameters that will be pushed down to the GlobalProtect agent on the client's endpoint. Key configurable settings include:

Key Tabs within a Client Settings Configuration Block:

When you "Add" or "Edit" a Client Settings configuration, you'll see several tabs. The most commonly used for defining agent behavior are:

  • General: Basic naming and description.
  • OS, User and Group, HIP Profile: These are for the matching criteria as discussed previously.
  • Network Settings (or similar naming based on PAN-OS version):
    • IP Pools: Assign client IP addresses from specific IP address pools configured on the firewall. This allows for network segmentation based on client profile.
    • Primary DNS Server, Secondary DNS Server: Specify DNS servers for clients.
    • DNS Suffixes: Define DNS search suffixes.
  • Split Tunnel:
    • Access Routes (Include/Exclude): Define IP-based routes.
      • Include Routes: Traffic destined for these networks will be sent through the GlobalProtect tunnel.
      • Exclude Routes: Traffic destined for these networks will bypass the tunnel and go via the client's local network interface.
      • Leaving "Include Access Routes" empty generally signifies a full-tunnel configuration (all traffic goes through the tunnel, except for what might be explicitly excluded).
    • Domain and Application Split Tunnel (Include/Exclude): Define split tunneling based on FQDNs (domains) or specific applications (App-ID based, requires App-ID to be up-to-date). This offers more granular control than IP-based routes.
  • Client Settings (or similar, may be called "App" in older versions):
    • Connect Method: (e.g., User-logon, Pre-logon, On-demand) - Can sometimes be varied.
    • Enable Inactivity Logout / Logout Hold Time.
    • Allow user to disable GlobalProtect app.
    • Save User Credentials.
    • Report HIP Data. (Though HIP collection is also enabled more globally).
    • And other agent behavior settings.
  • Network Services:
    • Settings like DNS Proxy, HTTP/HTTPS Proxy configuration for the client.

By customizing these settings within different agent configuration blocks, you can deliver precisely tailored network access and agent behavior to different sets of users connecting to the same Gateway.

Familiarize yourself with the types of settings available under each tab (especially IP Pools, DNS, and Split Tunneling options) as you may be asked to identify where a particular setting is configured.

Configuration Workflow Example

Let's illustrate with a common scenario:

Scenario: You have one GlobalProtect Gateway. You need to:

  1. Provide full-tunnel access for the 'IT-Admins' user group.
  2. Provide split-tunnel access (only to internal network 10.0.0.0/8 ) for the 'Sales-Users' user group.
  3. Provide highly restricted access (perhaps only to a remediation portal, e.g., 192.168.100.10/32 ) for any device that matches a 'Non-Compliant-Device' HIP profile, regardless of user group.
  4. Provide a default full-tunnel with basic internet access for all other users who don't meet the above criteria.

Steps:

  1. Navigate to Gateway Config:

    Go to Network > GlobalProtect > Gateways > [Your Gateway Name] > Agent tab > Client Settings sub-tab.

  2. Configure Non-Compliant Device Settings (Top Rule - Strictest Security Posture First):
    • Click Add .
    • Name: NonCompliant-RestrictedAccess
    • HIP Profile Tab: Select the 'Non-Compliant-Device' HIP profile.
    • Network Settings Tab: Assign a specific IP Pool (e.g., GP-Quarantine-Pool ), and DNS servers that might only resolve remediation sites.
    • Split Tunnel Tab: Under 'Access Route' (Include), click Add and enter 192.168.100.10/32 (the remediation portal). Ensure no other include routes are present for maximum restriction.
    • Click OK .
  3. Configure IT Admins Settings (Second Rule - Specific User Group):
    • Click Add .
    • Name: IT-Admins-FullTunnel
    • User and Group Tab: Select the 'IT-Admins' user group.
    • Network Settings Tab: Assign an IP Pool (e.g., GP-IT-Pool ), assign appropriate corporate DNS Servers.
    • Split Tunnel Tab: Leave 'Access Route' (Include) empty . This, combined with not having "Exclude local subnet access" (or similar options if present), typically signifies full tunnel. You might explicitly exclude video streaming sites if desired.
    • Click OK .
  4. Configure Sales Users Settings (Third Rule - Another Specific User Group):
    • Click Add .
    • Name: Sales-SplitTunnel
    • User and Group Tab: Select the 'Sales-Users' user group.
    • Network Settings Tab: Assign an IP Pool (e.g., GP-Sales-Pool ), assign appropriate corporate DNS Servers.
    • Split Tunnel Tab: Under 'Access Route' (Include), click Add and enter 10.0.0.0/8 .
    • Click OK .
  5. Configure Default Settings (Bottom Rule - Catch-All):
    • Click Add .
    • Name: Default-FullTunnel-Basic
    • OS Tab: Leave as 'any'.
    • User and Group Tab: Leave this empty or set to 'any'.
    • HIP Profile Tab: Leave as 'any'.
    • Network Settings Tab: Assign a default IP Pool (e.g., GP-Default-Pool ) and general DNS servers (e.g., corporate or public).
    • Split Tunnel Tab: Leave 'Access Route' (Include) empty for full tunnel.
    • Click OK .
  6. Order the Rules Correctly:

    Use the up/down arrows in the Client Settings list to ensure the rules are in the correct order of precedence (most specific or most restrictive first, down to the general default):

    1. NonCompliant-RestrictedAccess (HIP based, most restrictive access)
    2. IT-Admins-FullTunnel (Specific User Group)
    3. Sales-SplitTunnel (Another Specific User Group)
    4. Default-FullTunnel-Basic (Catch-all)
    If 'IT-Admins-FullTunnel' was above 'NonCompliant-RestrictedAccess', an IT Admin with a non-compliant device would get full tunnel access, bypassing the intended quarantine. Order is paramount!
  7. Commit Changes:

    Commit the configuration to the firewall.

Now, when users connect, the firewall will evaluate them against this ordered list and apply the first matching configuration.

Illustrative Diagrams

1. Agent Configuration Matching Logic Flowchart

Matches

No Match

Matches

No Match

Matches

No Match

No Match

Matches

No Match

Client Connects to Gateway with OS, User, and HIP attributes

Firewall Evaluates Client Settings

Check Config 1 Criteria: HIP is Non-Compliant

Apply Config 1 Settings

Client Session Established with Config 1

Check Config 2 Criteria: User Group is IT-Admins

Apply Config 2 Settings

Client Session Established with Config 2

Check Config 3 Criteria: User Group is Sales-Users

Apply Config 3 Settings

Client Session Established with Config 3

Continue for other specific configs

Check Default Config Criteria

Apply Default Config Settings

Client Session Established with Default Config

Connection May Fail or Use Global Settings

Flowchart illustrating the top-down, first-match evaluation process for multiple agent configurations.

2. User Group to Configuration Mapping (Conceptual Graph)

Single GlobalProtect Gateway

Agent Config 1: Non-Compliant Remediation
(HIP: NonCompliant, IP: Quarantine, DNS: Remediation, Split: Portal Only)

Agent Config 2: IT Admins Full Tunnel
(Group: IT-Admins, IP: IT_Pool, DNS: Corp, Split: None)

Agent Config 3: Sales Split Tunnel
(Group: Sales, OS: Windows, IP: Sales_Pool, DNS: Corp, Split: 10.0.0.0/8)

Agent Config 4: Default Basic Access
(Any/Any/Any, IP: Default_Pool, DNS: Public, Split: None)

Client with HIP 'Non-Compliant'

Compliant IT Admin Client

Compliant Sales Windows Client

Other Compliant Client

Conceptual graph showing different user profiles/states mapping to distinct agent configurations on the same gateway.

3. Sequence Diagram: Client Connection and Configuration Assignment

GP Gateway (Firewall) GP Client GP Gateway (Firewall) GP Client Checks Config Checks Config Checks Config Checks Default Config (Any/Any/Any) alt [Client matches Config] [Client does not match Config] alt [Client matches Config] [Client does not match Config] alt [Client matches Config] [Client does not match Config] 1 Connect Request (Auth, OS Info, User Info, HIP Report) 2 Evaluate Agent Config List (Top-Down) 3a Assign Config 3b Assign Config 3c Assign Config 3d Assign Default Config 4 Establish Tunnel with Assigned Configuration

Sequence diagram showing the interaction for assigning an agent configuration.

4. State Diagram: Possible Effective Configurations for a Client

EvaluatingCriteria

HIP Profile is 'Non-Compliant'

Apply Remediation Settings

User Group is 'IT-Admins' AND HIP is NOT 'Non-Compliant'

Apply IT Full Tunnel Settings

User Group is 'Sales' AND OS is 'Windows' AND HIP is NOT 'Non-Compliant'

Apply Sales Split Tunnel Settings

No other specific criteria met

Apply Default Settings

Disconnected

Matched_NonCompliant

RemediationConfig

Connected

Matched_IT_Admin

FullTunnel_IT_Config

Matched_Sales_Win

SplitTunnel_Sales_Config

Matched_Default

Default_Config

State diagram illustrating how a client transitions to an effective configuration state based on matching criteria. (Simplified for clarity)

Use Cases & Scenarios

Common Use Cases (Recap)

As previously mentioned, the primary drivers for using multiple agent configurations on a single Gateway include:

Advanced & Granular Scenarios

Beyond the common cases, multiple agent configurations enable more nuanced control:

Scenario: Differentiated DNS for Developers

Goal: Developers need access to internal staging DNS servers, while all other users use standard corporate DNS. All users connect to the same Gateway.

Configuration:

  1. Agent Config 1 (Top):
    • Name: Developers-StagingDNS
    • User and Group: Select 'Developer-Group'.
    • Network Settings: Primary/Secondary DNS set to staging DNS servers.
    • Split Tunnel: Appropriate access routes for developers.
  2. Agent Config 2 (Bottom - Default):
    • Name: Default-CorpDNS
    • User and Group: 'any' (or leave blank).
    • Network Settings: Primary/Secondary DNS set to standard corporate DNS servers.
    • Split Tunnel: Standard access routes.

This ensures only developers get the staging DNS, while everyone else gets the standard. The order is vital.

Caveats & Gotchas

While powerful, using multiple Gateway Agent Configurations comes with points to watch out for:

The order of rules, the need for a default, and troubleshooting which configuration was applied are frequent areas of focus.

Agent Configs on One Gateway vs. Multiple Actual Gateways

It's important to distinguish between using multiple Agent Configurations on a single Gateway versus deploying multiple distinct GlobalProtect Gateway instances (which could be on the same firewall or different firewalls).

Multiple Agent Configurations on a SINGLE Gateway:

Multiple Distinct GlobalProtect Gateways:

Key Takeaway: If you need to vary client-side settings for users hitting the same access point (Gateway) , use multiple Agent Configurations. If you need different access points due to geography, authentication, or major network segmentation, deploy multiple distinct Gateways and manage selection via the Portal.

You can, of course, use both: have multiple distinct Gateways, and each of those Gateways can itself have multiple Agent Configurations to further tailor the experience for users connecting to that specific Gateway instance.

PCNSE Exam Focus for Multiple Gateway Agent Configurations

For the PCNSE exam, understanding how to tailor the GlobalProtect client experience using multiple agent configurations on a single gateway is crucial. Key areas of focus include:

Study Tip: Practice scenarios. Given a set of requirements for different user types, mentally (or in a lab) walk through creating and ordering the necessary agent configuration blocks. Pay close attention to the "first match wins" logic.

GlobalProtect Gateway Agent Configurations - Interactive Quiz

Test your knowledge on configuring multiple agent settings for a GlobalProtect Gateway.

1. Where in the PAN-OS GUI do you configure multiple agent configurations for a single GlobalProtect Gateway?

Correct Answer: C
Multiple agent configurations (Client Settings) are defined under the Agent tab of a specific GlobalProtect Gateway.

2. What is the evaluation logic used by the firewall when a client connects to a Gateway with multiple agent configurations defined?

Correct Answer: A
The firewall evaluates the ordered list of Client Settings configurations from the top. The first one that matches the client's attributes is applied, and no further configurations are checked.

3. Which of the following are valid matching criteria for a Gateway Agent Configuration (Client Settings)?

Correct Answer: D
The primary matching criteria tabs within a Client Settings configuration are Operating System, User and Group, and HIP Profile.

4. If an agent configuration block specifies criteria for OS (Windows), User Group (Engineers), and HIP Profile (Compliant), what logic is applied?

Correct Answer: B
When multiple types of criteria (OS, User/Group, HIP) are set within a single agent configuration block, the client must satisfy all of them (AND logic) for that block to be a match.

5. Why is it critical to have a default/catch-all agent configuration at the bottom of the list?

Correct Answer: C
A default configuration (typically matching 'any' OS, 'any' user, 'any' HIP) ensures that if a client doesn't meet any of the more specific criteria, they still get a baseline set of agent settings, preventing connection failures or undefined behavior.

6. Which setting within an agent configuration block is typically left empty to signify a full-tunnel configuration for GlobalProtect?

Correct Answer: A
When "Include Access Routes" is left empty (and no overriding exclusions are present), it generally means all traffic from the client will be tunneled through the Gateway.

7. A company wants to provide different DNS servers to Windows users versus macOS users connecting to the same Gateway. This can be achieved by:

Correct Answer: D
This is a prime use case for multiple agent configurations on a single Gateway. One configuration block would match Windows OS and assign its specific DNS, and another would match macOS and assign its DNS.

8. What is a potential issue if a more general agent configuration (e.g., matching 'any' user) is placed above a more specific one (e.g., matching 'IT-Admins' group)?

Correct Answer: B
Due to the "top-down, first match wins" logic, if the general rule is matched first by an IT Admin, they will get that configuration, and their more specific rule lower in the list will never be evaluated.

9. To assign clients to a restricted "quarantine" IP pool if their device fails a HIP check for 'Antivirus-Disabled', you would typically:

Correct Answer: C
The Agent Configuration is where you link a matching criterion (like a HIP Profile) to specific client settings (like an IP Pool). This configuration should be placed high in the order.

10. If User-ID is not functioning correctly and failing to identify a user's group membership, how might this impact Gateway Agent Configurations that rely on 'User and Group' matching?

Correct Answer: A
If the firewall cannot determine the user's group due to User-ID issues, any agent configuration that specifically matches on that group will not be hit. The user will likely match a more general rule or the default rule.

11. Which log on the Palo Alto Networks firewall is most helpful for determining which specific Gateway Agent Configuration was applied to a connecting GlobalProtect client?

Correct Answer: B
The System Log, when filtered for GlobalProtect events (e.g., subtype globalprotect and eventid globalprotectgateway-agent-config-match or similar), often shows the name of the agent configuration profile that was matched and applied to the client during connection.

12. When is deploying multiple *distinct* GlobalProtect Gateways more appropriate than using multiple agent configurations on a single gateway?

Correct Answer: D
Multiple distinct gateways are used for geographical distribution, high availability, differing authentication realms, or fundamentally separate network access points. Options A, B, and C can all be handled by multiple agent configurations on a single gateway.

13. A client connects and matches an agent configuration that assigns IP Pool 'Pool-A' and DNS 'DNS-1'. Later, an administrator changes that specific agent configuration to use 'Pool-B' and 'DNS-2' and commits. What happens to the already connected client?

Correct Answer: C
Gateway agent configurations are typically applied at the time of connection. Changes to the agent configuration settings usually require the client to disconnect and reconnect to receive the updated settings.

14. To provide split-tunnel access that only includes routes to 10.10.0.0/16 and 172.16.0.0/12 , how would you configure the "Access Routes" in the Split Tunnel tab of an agent configuration?

Correct Answer: B
For split tunneling where only specific routes go through the tunnel, you add those specific routes to the "Include Access Routes" list. Traffic to other destinations will then go via the client's local network.

15. If no agent configuration block explicitly matches a connecting client, and there is no default/catch-all configuration defined at the bottom of the list, what is the likely outcome?

Correct Answer: A
Without a matching agent configuration, including a default, the client might not receive necessary settings like an IP address or DNS, leading to connection issues or undefined behavior.

16. An administrator wants to disable the "Save User Credentials" option for GlobalProtect agents connecting from devices that match a 'Public-Kiosk' HIP Profile. This should be done in:

Correct Answer: D
Client behavior settings like "Save User Credentials" are configured within a specific Gateway Agent Configuration block, which can be matched based on criteria like a HIP Profile.

17. To ensure that an agent configuration for "Contractor Users" (who are also part of the "All_Staff" group) takes precedence over a more general configuration for "All_Staff", how should they be ordered?

Correct Answer: C
The more specific rule ("Contractor Users") must be placed higher in the list than the more general rule ("All_Staff") to ensure contractors get their intended settings due to the top-down, first-match logic.

18. The "Domain and Application Split Tunnel" feature within a Gateway Agent Configuration allows you to:

Correct Answer: B
This feature provides finer control over what traffic is tunneled by specifying domains (FQDNs) or applications (using App-ID), rather than just relying on IP addresses/subnets.

19. If you have two agent configurations, ConfigA (matches UserGroupX) and ConfigB (matches OS_Windows), and a Windows user from UserGroupX connects, which config applies if ConfigA is listed above ConfigB?

Correct Answer: A
The evaluation is strictly top-down. If ConfigA matches UserGroupX, and that user is in UserGroupX, ConfigA is applied regardless of whether ConfigB (lower in the list) would also have matched based on OS.

20. Which of these is NOT typically configured within a Gateway Agent Configuration's "Client Settings" block?

Correct Answer: D
The Gateway's external listening IP address is part of the main Gateway configuration (Network tab), not a setting that varies per agent configuration block for clients connecting to it. Agent configurations define what settings are *pushed to the client*.