In many GlobalProtect deployments, users might connect from both outside the corporate network (requiring VPN access) and inside the network (where consistent policy enforcement and posture checks are still desired). A mixed internal and external gateway configuration allows a single GlobalProtect infrastructure to cater to both scenarios effectively.
With this setup, the GlobalProtect app uses Internal Host Detection (IHD) to determine its location. Based on whether it can reach internal-only resources:
This provides granular control over resource access and security posture enforcement regardless of the user's physical location.
Because security policies are defined separately for the zones associated with each gateway type, you can create distinct access rules for internal and external users connecting through GlobalProtect.
Consider a scenario where:
gp.acme.com
).
gpvpn.acme.com
) on a separate firewall provides standard remote VPN access.
california.acme.com
,
newyork.acme.com
) on another firewall provide posture checking (HIP) and granular access to sensitive datacenter resources for users already inside the network.
This setup allows consistent policy application and HIP checks whether a user is remote or physically present in an office connected to an internal gateway region.
Configuring a mixed gateway deployment involves several steps across the participating firewalls:
Ensure appropriate Layer 3 interfaces, Tunnel interfaces, and Security Zones are configured on each firewall acting as a Portal or Gateway.
ethernet1/2
, IP
198.51.100.42
) in
l3-untrust
zone. (DNS A record points
gp.acme.com
here).
ethernet1/5
, IP
192.0.2.4
) in
l3-untrust
zone. (DNS A record points
gpvpn.acme.com
here).
tunnel.3
) in a dedicated VPN zone (e.g.,
corp-vpn
). Enable User-ID on this zone.
ethernet1/1
, IP
10.1.1.1
) in
l3-trust
zone. (DNS A records point FQDNs here).
tunnel.10
) in a dedicated internal VPN zone (e.g.,
GP-Internal-VPN
). Enable User-ID on the *internal user source zones* (like
l3-trust
).
Follow Administrative Access Best Practices . Do not enable management services (HTTP/S, SSH) on external-facing interfaces used for GlobalProtect.
Ensure each firewall hosting a
Gateway
(both internal and external) has a valid GlobalProtect subscription activated (
Device > Licenses
). This is required for agent connections and HIP features.
See About GlobalProtect Licenses for details.
SSL/TLS Server Certificates are required for the Portal and all Gateways to secure communications.
Define Authentication Profiles (
Device > Authentication Profile
) and potentially Certificate Profiles (
Device > Certificate Management > Certificate Profile
) for authenticating users to the Portal and Gateways. Different profiles can be used for Portal vs. Gateway, or Internal vs. External Gateways.
If leveraging device posture checks:
Objects > GlobalProtect > HIP Objects
) specifying attributes to check (OS, AV, Patch Mgmt, etc.).
Objects > GlobalProtect > HIP Profiles
) referencing the HIP Objects to define compliance states (e.g., `Compliant-Host`, `Missing-Patches`).
See Host Information for details.
On the firewall(s) hosting Internal Gateways (
Network > GlobalProtect > Gateways
):
See Configure a GlobalProtect Gateway .
Client Authentication configuration on the Internal Gateway might rely on cookies (Authentication Modifier) from the Portal authentication or use methods like Kerberos for seamless internal connections, though standard profiles are also possible.
On the firewall(s) hosting External Gateways (
Network > GlobalProtect > Gateways
):
On the firewall hosting the Portal (
Network > GlobalProtect > Portals
):
Make the agent software available to users. Common methods:
Device > GlobalProtect Client
).
On the gateway firewalls (both internal and external), create Security rules (
Policies > Security
) to control traffic coming from the respective VPN zones:
Commit the changes on the Portal and all Gateway firewalls.