<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article GlobalProtect: Expanded Setup in GlobalProtect Articles</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-expanded-setup/ta-p/322234</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="GlobalProtect: Expanded Setup" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25090i71694B3D3150D289/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Expanded Setup.png" alt="GlobalProtect: Expanded Setup" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;GlobalProtect: Expanded Setup&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;In my previous article, "&lt;A title="GlobalProtect: Initial Setup | LIVEcommunity | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-Initial-Set-Up/ta-p/322232" target="_self"&gt;GlobalProtect: Initial Setup&lt;/A&gt;," we covered the initial setup of GlobalProtect, which included a portal, external gateway, and user authentication via local database.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;In this post, we are going to configure multiple external authentication types as well as add an internal gateway. You can see a diagram of the environment &lt;A href="https://live.paloaltonetworks.com/t5/Blogs/GlobalProtect-Overview/ba-p/322170" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Internal Gateways &amp;amp; External Authentication&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;The value of adding an internal gateway means that when users are on the local network, user-to-IP address mappings will be supplied to the firewall along with device context. This data can then be used as security policy match conditions, allowing for much more granular, identity-based visibility and enforcement.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;External authentication types are recommended for a production environment. In this case, we are going to configure the deployment to leverage LDAP authentication for the portal, MFA via RADIUS (AD credentials and Duo) for the external gateway, and LDAP authentication for the internal gateway. This will provide the best possible user experience for users when they are internal, while also enforcing additional factors of authentication when users are remote.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="alert alert-warning" align="left"&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; This article assumes that you have already followed the initial setup, which is the previous article in this series. This article also assumes that you already have a domain controller (I am running Windows Server 2012 R2) in your environment installed with &lt;A title="Authentication Proxy Reference | DUO" href="https://duo.com/docs/authproxy-reference" target="_blank" rel="noopener"&gt;DUO authentication proxy&lt;/A&gt; installed and running. For details on DUO integration, see &lt;A title="Palo Alto Networks Duo Integration | Palo Alto Networks" href="https://networkwiki.blogspot.com/2020/04/palo-alto-networks-duo-integration-via.html" target="_blank" rel="noopener"&gt;this post&lt;/A&gt;.&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Part II - Expanded Setup&lt;/STRONG&gt;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Server Profiles &amp;gt; LDAP &amp;gt; Add&lt;/STRONG&gt; to create an&amp;nbsp;&lt;STRONG&gt;LDAP Server Profile&lt;/STRONG&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;Best practices dictate that a dedicated service account be used for integrating your domain controller with Palo Alto Networks&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LDAP Server Profile" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25091iA2FAD6B03B2CB418/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP Server Profile.png" alt="LDAP Server Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;LDAP Server Profile&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Server Profiles &amp;gt; RADIUS &amp;gt; Add&lt;/STRONG&gt; to create a &lt;STRONG&gt;RADIUS Server Profile&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;Per my note above, this post assumes that you already have Duo Authentication Proxy installed and running on your domain controller&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS Server Profile" style="width: 600px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25092i1C2492FD265B4002/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS Server Profile.png" alt="RADIUS Server Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;RADIUS Server Profile&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; User-ID &amp;gt; Group Mapping Settings &amp;gt; Add&lt;/STRONG&gt;&amp;nbsp;to create a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Group Mapping&lt;/STRONG&gt;&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Server Profile&lt;/STRONG&gt;, select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;LDAP&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;profile that was previously created&lt;/LI&gt;
&lt;LI&gt;Enter the domain name under&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;User Domain&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Group Mapping - Server Profile tab" style="width: 623px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25093i3C2EE0351E4A0137/image-size/large?v=v2&amp;amp;px=999" role="button" title="Group Mapping - Server Profile tab.png" alt="Group Mapping - Server Profile tab" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Group Mapping - Server Profile tab&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Group Include List&amp;nbsp;&lt;/STRONG&gt;and add the group where your users are stored
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;If you are unable to expand the available groups, this typically means that your credentials in the LDAP Server Profile are incorrect&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Authentication Profile &amp;gt; Add&lt;/STRONG&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Type&lt;/STRONG&gt;&amp;nbsp;select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;LDAP&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Server Profile&lt;/STRONG&gt;&amp;nbsp;select the LDAP profile that was previously created&lt;/LI&gt;
&lt;LI&gt;Enter&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;sAMAccountName&lt;/I&gt;&amp;nbsp;for the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Login Attribute&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Enter your domain for the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;User Domain&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Authentication Profile - LDAP type" style="width: 600px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25094i9360222B00AA19DF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Authentication Profile - Authentication Tab.png" alt="Authentication Profile - LDAP type" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Authentication Profile - LDAP type&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Advanced&amp;nbsp;&lt;/STRONG&gt;tab and select the user group that was previously added to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Group Include List&lt;/STRONG&gt;, which was part of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Group Mapping&lt;/STRONG&gt;&amp;nbsp;you previously created&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Authentication Profile &amp;gt; Add&lt;/STRONG&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Type&lt;/STRONG&gt;&amp;nbsp;select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;RADIUS&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Server Profile&lt;/STRONG&gt;&amp;nbsp;select the RADIUS profile that was previously created&lt;/LI&gt;
&lt;LI&gt;Enter your domain name of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;User Domain&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Authentication Profile - RADIUS Type" style="width: 600px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25095i52BE430EBF798D6F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Authentication Profile - RADIUS Type.png" alt="Authentication Profile - RADIUS Type" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Authentication Profile - RADIUS Type&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to the&amp;nbsp;&lt;STRONG&gt;Advanced&amp;nbsp;&lt;/STRONG&gt;tab and select the user group that was previously added to the&amp;nbsp;&lt;STRONG&gt;Group&amp;nbsp;Include List&lt;/STRONG&gt;, which was part of the&amp;nbsp;&lt;STRONG&gt;Group Mapping&amp;nbsp;&lt;/STRONG&gt;you previously created&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Network &amp;gt; GlobalProtect &amp;gt; Gateways &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the existing external gateway&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;gt; Authentication &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the client authentication&amp;nbsp;&lt;STRONG&gt;&amp;gt;&amp;nbsp;&lt;/STRONG&gt;change the &lt;STRONG&gt;Authentication Profile&lt;/STRONG&gt; to the RADIUS profile that was previously created&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect Gateway Configuration - Home External Authentication" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25096i0AD9EA26CCB56619/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Gateway Configuration - SSL TSL Service Profile.png" alt="GlobalProtect Gateway Configuration - Home External Authentication" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;GlobalProtect Gateway Configuration - Home External Authentication&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Network &amp;gt; GlobalProtect &amp;gt; Gateways &amp;gt; Add&lt;/STRONG&gt;&amp;nbsp;to create an internal gateway
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Interface&amp;nbsp;&lt;/STRONG&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;IPv4 Address&lt;/STRONG&gt;&amp;nbsp;that correspond to the trust interface&lt;/LI&gt;
&lt;LI&gt;Navigate to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Authentication&lt;/STRONG&gt; tab&amp;nbsp;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;Select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SSL/TLS Service Profile&lt;/STRONG&gt;&amp;nbsp;that was created in the previous post&lt;/LI&gt;
&lt;LI&gt;Create a new&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Client Authentication&lt;/STRONG&gt;&amp;nbsp;profile and select the &lt;STRONG&gt;LDAP&amp;nbsp;Authentication Profile&lt;/STRONG&gt;&amp;nbsp;previously created&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect Gateway Configuration - Home Internal Authentication" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25097iAB86AB07C80147E1/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Gateway Configuration - Internal Authentication.png" alt="GlobalProtect Gateway Configuration - Home Internal Authentication" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;GlobalProtect Gateway Configuration - Home Internal Authentication&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Click&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Network &amp;gt; GlobalProtect &amp;gt; Portals &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the existing portal&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;gt; Agent &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the existing portal config&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;gt; Internal &amp;gt; Internal Gateways &amp;gt; Add&lt;/STRONG&gt;&amp;nbsp;to create an&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Internal Gateway&lt;/STRONG&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;IPv4&amp;nbsp;entry should correspond to the IP address assigned to the trust interface&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Internal Gateway - Home Internal Gateway" style="width: 480px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25098i5CCC6589AE2DF2CC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Internal Gateway - Home Internal Gateway.png" alt="Internal Gateway - Home Internal Gateway" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Internal Gateway - Home Internal Gateway&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&amp;nbsp;the&amp;nbsp;&lt;STRONG&gt;App&lt;/STRONG&gt; tab, and set the&amp;nbsp;&lt;STRONG&gt;Connect Method&lt;/STRONG&gt; to&amp;nbsp;&lt;STRONG&gt;User-logon (Always On)&lt;/STRONG&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;Internal Gateway authentication will fail if the&amp;nbsp;&lt;EM&gt;Connect Method&lt;/EM&gt; is set to&amp;nbsp;&lt;EM&gt;On-demand&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;I&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="55.PNG" style="width: 799px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25145iD7C12DE1BF8F0A91/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="55.PNG" alt="55.PNG" /&gt;&lt;/span&gt;&lt;/I&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Certificate Management &amp;gt; Certificates &amp;gt; Generate&lt;/STRONG&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;As&amp;nbsp;you already created a GlobalProtect certificate in the previous post, you will be creating a new one that both the external and internal gateways can reference. The previous certificate contains a common name that refers to the IP address of the portal and external gateway. As the IP address of the internal gateway is not referenced, this will cause authentication to the internal gateway to fail.&amp;nbsp;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;Keep in mind that you can also leave the current certificate in place and just create a new one for the internal gateway (essentially, having two), but for the purposes of this post, we will be creating a single certificate to be used for everything.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Certificate Name&lt;/I&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Enter the IP address or the DNS name of the interface to which remote users will connect for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Common Name&lt;/I&gt;
&lt;UL class="lia-list-style-type-square"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;In this series of posts, we will be using the public IP address for the common name (represented by 1.1.1.1). It is recommended to use a DNS name in a production environment, but IP addresses will work as well.&lt;I&gt;&lt;/I&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Select the &lt;STRONG&gt;root CA&lt;/STRONG&gt; that was previously created for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Signed By&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Enter the IP address of the trust interface that corresponds to the internal gateway under&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Certificate Attributes&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect Generate Certificate" style="width: 398px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25099i84734646836D267D/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Generate Certificate.png" alt="GlobalProtect Generate Certificate" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;GlobalProtect Generate Certificate&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; Certificate Management &amp;gt; SSL/TLS Service Profile &amp;gt;&amp;nbsp;&lt;/STRONG&gt;select the existing profile that was created previously and change the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Certificate value&lt;/STRONG&gt; from the old certificate to the new one that was just created&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SSL/TLS Service Profile" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25100i5D750C46A190F1EA/image-size/large?v=v2&amp;amp;px=999" role="button" title="SSL:TLS Service Profile.png" alt="SSL/TLS Service Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;SSL/TLS Service Profile&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Policy &amp;gt; NAT &amp;gt; Add&lt;/STRONG&gt;&lt;/LI&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt;&amp;nbsp;A NAT rule must be created so that the internal users can reach and authenticate to the portal from the internal network&lt;/LI&gt;
&lt;LI&gt;In the&amp;nbsp;&lt;STRONG&gt;General&lt;/STRONG&gt;&amp;nbsp;tab, enter a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Name&amp;nbsp;&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Original Packet&lt;/STRONG&gt;&amp;nbsp;tab, set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Source Zone&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;trust&lt;/I&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Destination Zone&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;untrust&lt;/I&gt;, and the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Destination Address&lt;/STRONG&gt;&amp;nbsp;to the &lt;EM&gt;untrust IP address&lt;/EM&gt; (the IP address to which the GlobalProtect Portal is assigned)&lt;/LI&gt;
&lt;LI&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Translated Packet&lt;/STRONG&gt;&amp;nbsp;tab, leave everything set to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;None&lt;/I&gt;&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Creating a new NAT rule" style="width: 640px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25101iFDD8559D1F33C864/image-size/large?v=v2&amp;amp;px=999" role="button" title="Creating a new NAT rule.png" alt="Creating a new NAT rule" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Creating a new NAT rule&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Commit&lt;/STRONG&gt;&amp;nbsp;the configuration&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;You should now be able to authenticate both internally and externally via the GlobalProtect app and access resources. It is important to note that authentication failures to an internal gateway are notoriously quiet. &lt;STRONG&gt;In other words, it will look as though you are connected even when you are not.&lt;/STRONG&gt; You can validate connectivity by issuing the&lt;SPAN&gt;&amp;nbsp;'&lt;/SPAN&gt;&lt;I&gt;show user ip-user-mapping all type GP'&amp;nbsp;&lt;/I&gt;command. If there is no mapping present, then it means that the app was unable to connect and authenticate to the internal gateway.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;In my next article, "&lt;A title="GlobalProtect: User/Device Context Compliance | LIVEcommunity | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/General-Articles/GlobalProtect-User-Device-Context-and-Compliance/ta-p/322235" target="_self"&gt;GlobalProtect: User/Device Context &amp;amp; Compliance&lt;/A&gt;," we will make changes to the configuration to include security policy matching based on user identity and device context via the GlobalProtect app. We will also enable notifications based on compliance of the endpoint.&lt;/DIV&gt;</description>
    <pubDate>Tue, 12 Jul 2022 06:29:56 GMT</pubDate>
    <dc:creator>SpencerMitchell</dc:creator>
    <dc:date>2022-07-12T06:29:56Z</dc:date>
    <item>
      <title>GlobalProtect: Expanded Setup</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-expanded-setup/ta-p/322234</link>
      <description>&lt;P&gt;See how to configure multiple external authentication types as well as add an internal gateway.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2022 06:29:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-expanded-setup/ta-p/322234</guid>
      <dc:creator>SpencerMitchell</dc:creator>
      <dc:date>2022-07-12T06:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Expanded Setup</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-expanded-setup/tac-p/593078#M152</link>
      <description>&lt;P&gt;Does 2FA part will be similar for on premise RSA Server ?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 22:30:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-expanded-setup/tac-p/593078#M152</guid>
      <dc:creator>B.Alimov</dc:creator>
      <dc:date>2024-07-25T22:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect: Expanded Setup</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-expanded-setup/tac-p/593550#M153</link>
      <description>&lt;P&gt;Great tutorial, but Global protect Portal access part was missing to correct authentication method, if you following from previous tutorial you have to change it to LDAP from portal settings.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2024 18:35:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/globalprotect-expanded-setup/tac-p/593550#M153</guid>
      <dc:creator>B.Alimov</dc:creator>
      <dc:date>2024-07-30T18:35:05Z</dc:date>
    </item>
  </channel>
</rss>

