<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Internal/External Gateway User-id in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/internal-external-gateway-user-id/m-p/537112#M3850</link>
    <description>&lt;P&gt;Make sure your Global Protect deployment is set for always-on.&amp;nbsp; To obtain User-ID through GlobalProtect in an internal network,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;GlobalProtect must be deployed in user-logon or pre-logon mode and&amp;nbsp;&lt;/SPAN&gt;with internal gateways. GlobalProtect keeps the User-ID up to date by automatically re-authenticating the user every time there is a network status change on the endpoint.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/10-1/user-id-best-practices/user-id-best-practices/user-id-best-practices-for-globalprotect" target="_blank"&gt;https://docs.paloaltonetworks.com/best-practices/10-1/user-id-best-practices/user-id-best-practices/user-id-best-practices-for-globalprotect&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm2uCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm2uCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 30 Mar 2023 14:24:26 GMT</pubDate>
    <dc:creator>aaegerter</dc:creator>
    <dc:date>2023-03-30T14:24:26Z</dc:date>
    <item>
      <title>Internal/External Gateway User-id</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/internal-external-gateway-user-id/m-p/535550#M3819</link>
      <description>&lt;P&gt;Dear Guys,&lt;/P&gt;
&lt;P&gt;I try to configure my global protect portal to connect my clients through external or internal networks.&lt;/P&gt;
&lt;P&gt;I configure my agent with internal detection and external parameters.&lt;/P&gt;
&lt;P&gt;When i connect in the internal networks, the FW see me in the internal network but in the monitor tab i don't see the user-id with my private ip address.&lt;/P&gt;
&lt;P&gt;When i connect to external gateway, the tunnel is up and i see the user-id with the private IP configure in the pool IP vpn gateway&lt;/P&gt;
&lt;P&gt;All my security rules use the user-id.&lt;/P&gt;
&lt;P&gt;My questions are:&lt;/P&gt;
&lt;P&gt;Do i need to create 2 portals gateways ? one with external parameters, the 2nd with internal parameters ( for do this i can create one dns name with external or internal ip depending on the network access).&lt;/P&gt;
&lt;P&gt;Or I can configure one agent with internal and external parameters to receive the user-id ?&lt;/P&gt;
&lt;P&gt;I just want to receive&amp;nbsp; the user-id for matching the security rules.&lt;/P&gt;
&lt;P&gt;Thanks for your help&lt;/P&gt;
&lt;P&gt;Nota: In the internal network i don't need/want use ipsec tunnel.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 13:51:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/internal-external-gateway-user-id/m-p/535550#M3819</guid>
      <dc:creator>SECRES</dc:creator>
      <dc:date>2023-03-23T13:51:59Z</dc:date>
    </item>
    <item>
      <title>Re: Internal/External Gateway User-id</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/internal-external-gateway-user-id/m-p/535555#M3820</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/6094"&gt;@SECRES&lt;/a&gt; .&lt;/P&gt;
&lt;P&gt;No, you don't need to separate GP Portals.&lt;/P&gt;
&lt;P&gt;Your internal users should still be able to connect to the GP Portal that is most probably hosted on your external interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is really important how you have configured your Internal Gateway tab for the Portal agent client config.&lt;/P&gt;
&lt;P&gt;Do you have second GP gateway applied on your internal interface with tunnel mode disabled?&lt;/P&gt;
&lt;P&gt;It will be hard to identify what is the problem without looking at your actual configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you provide the following:&lt;/P&gt;
&lt;P&gt;Note: hide/blur any sensitive information as usernames, IPs FQDNs, etc.&lt;/P&gt;
&lt;P&gt;- GP Portal -&amp;gt; Agent -&amp;gt; Config -&amp;gt; Internal tab&lt;/P&gt;
&lt;P&gt;- GP Gateway -&amp;gt; internal gateway&lt;/P&gt;
&lt;P&gt;- Are you using explicit rule allowing internal users to reach internal GP gateway? Do you apply any security profiles on it? Or are you using the default intra-zone rule? Any sec profiles on it?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 14:09:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/internal-external-gateway-user-id/m-p/535555#M3820</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-03-23T14:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: Internal/External Gateway User-id</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/internal-external-gateway-user-id/m-p/535566#M3821</link>
      <description>&lt;P&gt;Hi, here after the screenshot for the agent configuration. For my test in the security rules, my ip adress have all access to internal gateway without user-id, but i want see my id in the monitor tab &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SECRES_0-1679582108363.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48977i976CB51CD78FCC07/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SECRES_0-1679582108363.png" alt="SECRES_0-1679582108363.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SECRES_1-1679582343254.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48978i84DBA33B1E89DFAE/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SECRES_1-1679582343254.png" alt="SECRES_1-1679582343254.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SECRES_2-1679582716476.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48979i2006353EB45B1D55/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SECRES_2-1679582716476.png" alt="SECRES_2-1679582716476.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Security rule&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SECRES_3-1679583066063.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48980i0EC2D30A5ABE0FB7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SECRES_3-1679583066063.png" alt="SECRES_3-1679583066063.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't know if my need is correct:&lt;/P&gt;
&lt;P&gt;I just want :&lt;/P&gt;
&lt;P&gt;- in my internal network, the gateway see me in internal, i don't need the ipsec tunnel but i want to see my user-id in the firewall for matching security rules&lt;/P&gt;
&lt;P&gt;- in external, i used the same dns name and i connect to my external gateway and i retrieve the user-id and i match the security rule.&lt;/P&gt;
&lt;P&gt;Thanks for your help&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 14:52:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/internal-external-gateway-user-id/m-p/535566#M3821</guid>
      <dc:creator>SECRES</dc:creator>
      <dc:date>2023-03-23T14:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: Internal/External Gateway User-id</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/internal-external-gateway-user-id/m-p/537112#M3850</link>
      <description>&lt;P&gt;Make sure your Global Protect deployment is set for always-on.&amp;nbsp; To obtain User-ID through GlobalProtect in an internal network,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;GlobalProtect must be deployed in user-logon or pre-logon mode and&amp;nbsp;&lt;/SPAN&gt;with internal gateways. GlobalProtect keeps the User-ID up to date by automatically re-authenticating the user every time there is a network status change on the endpoint.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/10-1/user-id-best-practices/user-id-best-practices/user-id-best-practices-for-globalprotect" target="_blank"&gt;https://docs.paloaltonetworks.com/best-practices/10-1/user-id-best-practices/user-id-best-practices/user-id-best-practices-for-globalprotect&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm2uCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm2uCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 14:24:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/internal-external-gateway-user-id/m-p/537112#M3850</guid>
      <dc:creator>aaegerter</dc:creator>
      <dc:date>2023-03-30T14:24:26Z</dc:date>
    </item>
  </channel>
</rss>

