<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Separate IP pool config for two departments when connecting to global protect in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521470#M3433</link>
    <description>&lt;P&gt;You can use Config Selection Criteria under the Gateway Agent configuration to select a different Gateway profile with a different IP pool, based on user. But I am not sure if you can extend that to groups... so it may be a bit of a management headache to do per user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatively, you could create another gateway and then send the first department to the first gateway and the second department to the second gateway via the Portal Agent configuration. That allows Config Selection Criteria based on user and/or user group. But you would need the PA integrated with your AD to be able to poll the user's group.&lt;/P&gt;</description>
    <pubDate>Wed, 16 Nov 2022 21:41:01 GMT</pubDate>
    <dc:creator>Adrian_Jensen</dc:creator>
    <dc:date>2022-11-16T21:41:01Z</dc:date>
    <item>
      <title>Separate IP pool config for two departments when connecting to global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521387#M3432</link>
      <description>&lt;P&gt;&amp;nbsp;Is it possible to assign two different IP pools for two departments on one gateway, when the users connect to Global Protect VPN.?&lt;/P&gt;
&lt;P&gt;Note: We don't have On-Prem ldap server to config User identification &amp;amp; group-mapping on firewall. We are using Azure AD. The client authentication is happening via SAML auth.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 11:48:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521387#M3432</guid>
      <dc:creator>HCLCNNSecurity</dc:creator>
      <dc:date>2022-11-16T11:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: Separate IP pool config for two departments when connecting to global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521470#M3433</link>
      <description>&lt;P&gt;You can use Config Selection Criteria under the Gateway Agent configuration to select a different Gateway profile with a different IP pool, based on user. But I am not sure if you can extend that to groups... so it may be a bit of a management headache to do per user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatively, you could create another gateway and then send the first department to the first gateway and the second department to the second gateway via the Portal Agent configuration. That allows Config Selection Criteria based on user and/or user group. But you would need the PA integrated with your AD to be able to poll the user's group.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 21:41:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521470#M3433</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-11-16T21:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Separate IP pool config for two departments when connecting to global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521559#M3437</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/204857"&gt;@HCLCNNSecurity&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The easiest way to accomplish what you want is to use the Config Selection Criteria under the Network &amp;gt; GlobalProtect &amp;gt; Gateways &amp;gt; Agent &amp;gt; Client Settings as &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt; mentioned.&amp;nbsp; It does support groups, but only LDAP, and you were clear that you did not have LDAP, only SAML.&amp;nbsp; If you want it working today, you can add each user to your 2 Client Settings (1 for each subnet).&amp;nbsp; If you don't have that many users, it shouldn't take too long.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have to ask the question, "What do you want to use the separate IP pools for?"&amp;nbsp; If it is for the security policy, may I suggest configuring the users there instead?&amp;nbsp; That would save the step of configuring the gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another thing you could try is to create 2 Dynamic User Groups for each department.&amp;nbsp; You could manually assign the users the tags under Objects &amp;gt; Log Forwarding &amp;gt; Add &amp;gt; Log Type = auth &amp;gt; Filters.&amp;nbsp; The tags would match the DUGs.&amp;nbsp; You could then use the DUGs in the security policy, gateway client setting, or both.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know!&amp;nbsp; This could be a lot of work!&amp;nbsp; The best solution would be group mapping to support SAML as many customers are moving to Azure AD.&amp;nbsp; Another alternative if you want to query Azure AD via LDAP is to purchase Azure AD Domain Services or perhaps build a DC with Azure AD Connect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 17:43:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521559#M3437</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-11-17T17:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: Separate IP pool config for two departments when connecting to global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521632#M3440</link>
      <description>&lt;P&gt;Hi Tom,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One of the departments is using an application which require directional policy connection like from Trust Zone to GlobalProtect Zone &amp;amp; vice-versa. So, we don't want to allow the traffic from Trust to Global protect for all departments. It's better to allow this for that One department only.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 06:54:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521632#M3440</guid>
      <dc:creator>HCLCNNSecurity</dc:creator>
      <dc:date>2022-11-18T06:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: Separate IP pool config for two departments when connecting to global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521716#M3442</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/204857"&gt;@HCLCNNSecurity&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Very cool.&amp;nbsp; So you could do it through separate IP addresses or just put the users in the security policy.&amp;nbsp; I wonder if Cloud Identity Engine would be able to get your Azure AD groups?&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine&lt;/A&gt;&amp;nbsp; I haven't used it yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 18:22:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/521716#M3442</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-11-18T18:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: Separate IP pool config for two departments when connecting to global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/536663#M3844</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/204857"&gt;@HCLCNNSecurity&lt;/a&gt; - Just curious, what did you end up doing to accomplish this task?&amp;nbsp; I am having a similar issue.&amp;nbsp; I am using SAML and I have an "any" user config which works fine.&amp;nbsp; But I am trying to add a more restrictive config above that one, which contains specific users or groups, and cannot get it to work. I see that Security Policy might be the way to go according to Tom...&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 20:37:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/536663#M3844</guid>
      <dc:creator>tamerfahmy</dc:creator>
      <dc:date>2023-03-27T20:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: Separate IP pool config for two departments when connecting to global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/576943#M4957</link>
      <description>&lt;P&gt;Hi... Yes with SAML you can (or must) go via Idendity Engine. We build it in our company that way. You get the Assigned Groups then via CIE...&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2024 19:02:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/separate-ip-pool-config-for-two-departments-when-connecting-to/m-p/576943#M4957</guid>
      <dc:creator>ThomasZetzsche</dc:creator>
      <dc:date>2024-02-11T19:02:45Z</dc:date>
    </item>
  </channel>
</rss>

