PAN-OS: GlobalProtect Internal vs. External Gateways

Introduction: Location Matters

GlobalProtect provides secure access to corporate resources, but the user's location when they connect determines which type of GlobalProtect Gateway they should ideally use. PAN-OS allows administrators to configure distinct gateways optimized for users connecting from either outside or inside the corporate network perimeter.

The GlobalProtect agent intelligently selects the appropriate gateway type based on its ability to reach predefined internal resources ( Internal Host Detection ).

External Gateways

Purpose

Typical Configuration

Internal Gateways

Purpose

Internal Gateways do *not* necessarily encrypt traffic (though they can be configured to), as the primary goal is often policy enforcement and posture assessment rather than confidentiality from the internal network itself.

Typical Configuration

Internal Host Detection (IHD) - The Key Differentiator

For the GlobalProtect agent to automatically choose between External and Internal Gateways, Internal Host Detection (IHD) must be configured within the Portal's Agent configuration.

Configuration and Selection Workflow

  1. Portal Configuration: ( Network > GlobalProtect > Portals > ... > Agent > External/Internal ) Define BOTH External and Internal Gateways in the agent configuration distributed by the Portal. Specify addresses (FQDN recommended) and priorities.
  2. Internal Host Detection Config: Configure IHD criteria within the same Portal Agent configuration.
  3. Gateway Configuration: Create separate Gateway objects ( Network > GlobalProtect > Gateways ):
    • One (or more) for External Gateways listening on external interfaces.
    • One (or more) for Internal Gateways listening on internal interfaces.
    • Each gateway type will likely have different Agent > Client Settings (especially Split Tunnel Access Routes).
  4. Agent Connection Logic:
    • Agent starts and attempts Internal Host Detection based on Portal config.
    • **If IHD Succeeds:** Agent marks itself as "Internal". It then attempts to connect to the highest priority *Internal Gateway* listed in its configuration.
    • **If IHD Fails:** Agent marks itself as "External". It then attempts to connect to the highest priority *External Gateway* listed in its configuration.
  5. Policy Enforcement: Security Policy rules are applied based on the zone associated with the Tunnel Interface used by the connected Gateway (either the External VPN zone or the Internal VPN zone).
    graph TD
        Client[GP Agent] --> IHD{Internal Host
Detection}; IHD -- Success --> Internal{Status: Internal}; IHD -- Failure --> External{Status: External}; Internal --> ConnectInternal[Connect to
Internal Gateway]; External --> ConnectExternal[Connect to
External Gateway]; ConnectInternal --> GW_Int(Internal Gateway
Listens on Trust Intf); ConnectExternal --> GW_Ext(External Gateway
Listens on Untrust Intf); GW_Int --> Tun_Int(Tunnel Interface
Zone: GP-Internal); GW_Ext --> Tun_Ext(Tunnel Interface
Zone: GP-External); Tun_Int --> Policy_Int(Security Policy
Src=GP-Internal); Tun_Ext --> Policy_Ext(Security Policy
Src=GP-External); Policy_Int --> Resources[(Internal Resources)]; Policy_Ext --> Resources; style IHD fill:#f9f,stroke:#333,stroke-width:2px style Internal fill:#d5f5e3,stroke:#58d68d,stroke-width:1px style External fill:#fdebd0,stroke:#f5b041,stroke-width:1px
Agent Gateway Selection Logic based on IHD.

Caveats and Considerations

Best Practices

PCNSE Exam Focus

For the PCNSE exam, understand:

GlobalProtect Internal vs. External Gateways Quiz

1. What is the primary function of a GlobalProtect External Gateway?

External Gateways are the standard remote access VPN termination points, providing secure connectivity for users connecting from untrusted networks.

2. What is a primary reason for deploying a GlobalProtect Internal Gateway?

Internal Gateways extend security controls (policy inspection, HIP checks) to users already inside the network, supporting Zero Trust and ensuring consistent posture assessment before resource access.

3. What mechanism does the GlobalProtect agent use to determine whether it should connect to an Internal or External Gateway?

Internal Host Detection (IHD), configured on the Portal, allows the agent to check for the reachability of specific internal resources. Success indicates the agent is internal; failure indicates it's external.

4. Where are the lists of available Internal AND External gateways configured for the GlobalProtect agent?

The Portal is responsible for delivering the agent configuration, which includes separate lists defining the available External Gateways and Internal Gateways the agent can attempt to connect to.

5. An internal user connects from the office LAN. The agent successfully performs Internal Host Detection. Which type of gateway will the agent attempt to connect to?

If IHD succeeds, the agent knows it's inside the corporate network and will prioritize connecting to one of the configured Internal Gateways.

6. On which type of firewall interface is an External GlobalProtect Gateway typically configured to listen?

External Gateways need to be reachable from the internet, so they listen on interfaces connected to external networks, typically placed in the Untrust zone.

7. Applying HIP checks to users already connected to the corporate LAN or WLAN is a primary use case for which component?

Internal Gateways allow the enforcement of device posture checks (HIP) even for users physically inside the network, aligning with Zero Trust principles before granting access to sensitive resources.

8. Can different Split Tunnel Access Routes be configured for users connecting to an Internal Gateway versus users connecting to an External Gateway (even if defined on the same firewall)?

Because Split Tunneling (Access Routes, Excludes, etc.) is configured within the Agent > Client Settings specific to each Gateway object, you can define different routing behaviors for internal connections versus external connections.

9. What is the primary security benefit of forcing internal users through an Internal Gateway before accessing sensitive resources?

The main security driver for Internal Gateways is consistency. It prevents internal users (who might otherwise have direct, less-inspected access) from accessing sensitive resources without first passing through the same policy inspection and posture checks applied to remote users.

10. Internal Host Detection (IHD) relies on the agent's ability to:

IHD works by having the agent attempt to reach resources (IPs via HTTPS probe or Ping, or FQDNs via DNS lookup) that should *only* be accessible when the client is physically connected to the internal corporate network. Success means internal, failure means external.

References