While a single GlobalProtect Gateway can serve many users, you might encounter scenarios where different groups of users connecting to that same Gateway require distinct settings pushed down to their GlobalProtect agents. For example, you might need different split-tunneling rules, DNS servers, or IP pools based on user group, operating system, or device compliance.
PAN-OS addresses this need by allowing you to configure multiple Agent Configurations within a single GlobalProtect Gateway definition. The firewall then uses matching criteria (like user group, OS, or HIP profile) to determine which specific configuration to apply to a connecting client.
This allows one Gateway infrastructure object to provide customized experiences and network access parameters for diverse user populations.
Common scenarios where multiple configurations on a single Gateway are beneficial:
Network > GlobalProtect > Gateways > [Select/Edit Gateway Name] > Agent
tab
When a user connects to the Gateway, the firewall evaluates the list of configured Client Settings configurations from top to bottom .
Within each Client Settings configuration block (matched by OS/User/HIP), you define the specific parameters for that group:
Provide full-tunnel access for the 'IT-Admins' group and split-tunnel access (only 10.0.0.0/8) for the 'Sales-Users' group, all connecting to the same Gateway.
Network > GlobalProtect > Gateways > [Your Gateway] > Agent
tab >
Client Settings
sub-tab.
Add
.
IT-Admins-FullTunnel
Add
again.
Sales-SplitTunnel
Add
and enter
10.0.0.0/8
(or the specific internal subnets they need).
Add
one more time.
Default-CatchAll
IT-Admins-FullTunnel
(Most Specific User Group)
Sales-SplitTunnel
(Next Specific User Group)
Default-CatchAll
(Least Specific - matches anyone not matching above)
flowchart TD A[GP Client Connects] --> B{Evaluate Gateway Client Settings}; B --> C{Check Config 1: IT-Admins?}; C -- No Match --> D{Check Config 2: Sales-Users?}; D -- Match! --> E[Apply Config 2: IP Pool: GP-Sales-Pool, DNS: Sales DNS, Split Tunnel: 10.0.0.0/8]; E --> F[Connection Established]; D -- No Match --> G{Check Config 3: Default?}; G -- Match! --> H[Apply Config 3: Default Settings]; H --> F; style E fill:#d5f5e3,stroke:#58d68d,stroke-width:2px; style H fill:#fdebd0,stroke:#f5b041,stroke-width:2px;Simplified decision flow for selecting Agent Configuration based on user group.
For the PCNSE exam, regarding multiple Gateway Agent Configurations:
1. What is the primary purpose of configuring multiple "Client Settings" blocks within a single GlobalProtect Gateway configuration?
2. Where are multiple Agent Client Settings configurations defined in the PAN-OS GUI?
3. Which of the following is NOT a primary matching criterion used by the Gateway to select which Client Settings configuration to apply?
4. How does the firewall process multiple Client Settings configurations defined for a single Gateway?
5. Which setting is commonly configured differently between multiple Agent Client Configurations to control whether all user traffic goes through the VPN or only specific internal traffic?
6. Why is it essential to have a "default" or "catch-all" Client Settings configuration block at the bottom of the list?
7. A gateway has two Client Settings configs: #1 matches OS=Windows, #2 matches User Group='Sales'. A user connects from a Windows machine and is a member of the 'Sales' group. Which configuration applies?
8. To provide different settings based on whether a device is corporate-managed (HIP Profile 'Managed') or BYOD (HIP Profile 'Unmanaged'), where would you use these HIP Profiles?
9. Which specific setting is configured within a Gateway Agent Client Configuration to define the IP addresses assigned to clients matching that configuration?
10. If a Client Settings configuration block specifies BOTH an OS (e.g., Windows) AND a User Group (e.g., Engineering), when will this configuration be applied to a connecting client?