PAN-OS: Configuring Multiple GlobalProtect Gateway Agent Configurations

Introduction: Tailoring the Client Experience

While a single GlobalProtect Gateway can serve many users, you might encounter scenarios where different groups of users connecting to that same Gateway require distinct settings pushed down to their GlobalProtect agents. For example, you might need different split-tunneling rules, DNS servers, or IP pools based on user group, operating system, or device compliance.

PAN-OS addresses this need by allowing you to configure multiple Agent Configurations within a single GlobalProtect Gateway definition. The firewall then uses matching criteria (like user group, OS, or HIP profile) to determine which specific configuration to apply to a connecting client.

This allows one Gateway infrastructure object to provide customized experiences and network access parameters for diverse user populations.

Why Use Multiple Gateway Agent Configurations?

Common scenarios where multiple configurations on a single Gateway are beneficial:

Configuration Location and Key Concepts

Location within the Gateway

Core Concept: Matching Criteria & Order

When a user connects to the Gateway, the firewall evaluates the list of configured Client Settings configurations from top to bottom .

Settings Defined Per Agent Configuration:

Within each Client Settings configuration block (matched by OS/User/HIP), you define the specific parameters for that group:

Configuration Workflow Example

Scenario:

Provide full-tunnel access for the 'IT-Admins' group and split-tunnel access (only 10.0.0.0/8) for the 'Sales-Users' group, all connecting to the same Gateway.

Steps:

  1. Navigate to Gateway Config: Go to Network > GlobalProtect > Gateways > [Your Gateway] > Agent tab > Client Settings sub-tab.
  2. Configure IT Admins Settings (Top Rule):
    • Click Add .
    • Name: IT-Admins-FullTunnel
    • User and Group Tab: Select the 'IT-Admins' group.
    • Network Settings Tab: Assign an IP Pool (e.g., `GP-IT-Pool`), assign appropriate DNS Servers.
    • Split Tunnel Tab: Leave 'Access Route' **empty** (this typically signifies full tunnel).
    • Click OK.
  3. Configure Sales Users Settings (Second Rule):
    • Click Add again.
    • Name: Sales-SplitTunnel
    • User and Group Tab: Select the 'Sales-Users' group.
    • Network Settings Tab: Assign an IP Pool (e.g., `GP-Sales-Pool`), assign appropriate DNS Servers.
    • Split Tunnel Tab: Under 'Access Route', click Add and enter 10.0.0.0/8 (or the specific internal subnets they need).
    • Click OK.
  4. Configure Default Settings (Bottom Rule - IMPORTANT):
    • Click Add one more time.
    • Name: Default-CatchAll
    • User and Group Tab: Leave this empty (or set to 'any').
    • OS Tab: Leave as 'any'.
    • HIP Profile Tab: Leave as 'any'.
    • Network Settings Tab: Assign a default IP Pool and DNS servers.
    • Split Tunnel Tab: Configure default access routes (e.g., maybe restrict access completely or provide minimal access).
    • Click OK.
  5. Order the Rules: Ensure the rules are ordered correctly using the up/down arrows:
    1. IT-Admins-FullTunnel (Most Specific User Group)
    2. Sales-SplitTunnel (Next Specific User Group)
    3. Default-CatchAll (Least Specific - matches anyone not matching above)
  6. Commit the configuration.

How it Works: Processing Logic Visualization

flowchart TD
    A[GP Client Connects] --> B{Evaluate Gateway Client Settings};
    B --> C{Check Config 1: IT-Admins?};
    C -- No Match --> D{Check Config 2: Sales-Users?};
    D -- Match! --> E[Apply Config 2: IP Pool: GP-Sales-Pool, DNS: Sales DNS, Split Tunnel: 10.0.0.0/8];
    E --> F[Connection Established];
    D -- No Match --> G{Check Config 3: Default?};
    G -- Match! --> H[Apply Config 3: Default Settings];
    H --> F;

    style E fill:#d5f5e3,stroke:#58d68d,stroke-width:2px;
    style H fill:#fdebd0,stroke:#f5b041,stroke-width:2px;

     
Simplified decision flow for selecting Agent Configuration based on user group.

Gotchas and Caveats

Best Practices

PCNSE Exam Focus

For the PCNSE exam, regarding multiple Gateway Agent Configurations:

Multiple Gateway Agent Configs Quiz

1. What is the primary purpose of configuring multiple "Client Settings" blocks within a single GlobalProtect Gateway configuration?

Multiple Client Settings configurations allow a single gateway to push tailored network settings (IP, DNS, routing/split-tunnel) based on matching criteria like user group, OS, or device posture (HIP).

2. Where are multiple Agent Client Settings configurations defined in the PAN-OS GUI?

These configurations, which dictate client network parameters *after* connecting to a specific gateway, are defined within that Gateway's settings under the Agent > Client Settings tab.

3. Which of the following is NOT a primary matching criterion used by the Gateway to select which Client Settings configuration to apply?

The Gateway selects the appropriate Client Settings block based on the client's reported OS, the authenticated User/Group (via User-ID), and/or the submitted HIP Profile match status. Source IP address is not a direct matching criterion for these specific configuration blocks.

4. How does the firewall process multiple Client Settings configurations defined for a single Gateway?

The order of the Client Settings configurations is critical. The firewall checks them sequentially from top to bottom and uses the very first one where the client's OS, User/Group, and/or HIP Profile match the configured criteria.

5. Which setting is commonly configured differently between multiple Agent Client Configurations to control whether all user traffic goes through the VPN or only specific internal traffic?

Split Tunneling, configured via Access Routes (and domain/app includes/excludes), is a primary reason for having multiple configurations. Some groups might get full tunnel (no access routes defined), while others get split tunnel (specific internal subnets listed as access routes).

6. Why is it essential to have a "default" or "catch-all" Client Settings configuration block at the bottom of the list?

Without a default configuration (typically matching 'any' OS/User/HIP), a user who doesn't fit into any of the specific configurations above it might fail to receive critical network settings (like an IP from a pool), preventing a successful VPN connection.

7. A gateway has two Client Settings configs: #1 matches OS=Windows, #2 matches User Group='Sales'. A user connects from a Windows machine and is a member of the 'Sales' group. Which configuration applies?

The firewall processes the list top-down. Since Configuration #1 (matching OS=Windows) is listed first and the connecting client *is* Windows, that configuration is applied, and evaluation stops. Configuration #2 is never checked for this user.

8. To provide different settings based on whether a device is corporate-managed (HIP Profile 'Managed') or BYOD (HIP Profile 'Unmanaged'), where would you use these HIP Profiles?

The HIP Profile match status is one of the key criteria (along with OS and User/Group) that can be used within each Gateway > Agent > Client Settings block to determine which specific set of network parameters (IP pool, DNS, split tunnel) the client receives.

9. Which specific setting is configured within a Gateway Agent Client Configuration to define the IP addresses assigned to clients matching that configuration?

The IP Pool selection within the Network Settings tab of a specific Client Settings configuration determines the source of IP addresses for clients matching that configuration's criteria.

10. If a Client Settings configuration block specifies BOTH an OS (e.g., Windows) AND a User Group (e.g., Engineering), when will this configuration be applied to a connecting client?

When multiple matching criteria (OS, User/Group, HIP Profile) are defined *within the same* Client Settings configuration block, they operate using AND logic. The client must satisfy *all* specified criteria to match that block.

References