<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect agent external gateway region restriction - portal still accessible in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537500#M3869</link>
    <description>&lt;P&gt;Client connects to portal over tcp/443.&lt;/P&gt;
&lt;P&gt;It will then try to connect to gateway over udp/4501 to establish IPSec tunnel.&lt;/P&gt;
&lt;P&gt;If udp/4501 fails (some firewall blocks this traffic in between agent and gateway) then agent will fail back to tcp/443 and establish VPN tunnel over tcp/443 (slower compared to udp/4501).&lt;/P&gt;</description>
    <pubDate>Mon, 03 Apr 2023 20:14:40 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2023-04-03T20:14:40Z</dc:date>
    <item>
      <title>GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537116#M3851</link>
      <description>&lt;P&gt;I have a couple regions listed under the external gateway config of our GlobalProtect Portal Agent and yet the Portal still is allowing testing of user logins from outside those regions.&amp;nbsp; For example I have US,CA,IN in there and still see regions FR,RU trying portal logins.&lt;/P&gt;
&lt;P&gt;What/How do I stop that so the portal is only accessible from those regions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, I see the log entries for the portal in the GP logs for the source address but when I look for those addresses in the traffic log I don't see entries for them despite all the GP related security policies having logging turned on.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo support wasn't a whole lot of help at the time but to be fair its being researched a bit - just figured this was a simple matter and doesn't appear to be.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can anyone offer some guidance?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 15:04:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537116#M3851</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-03-30T15:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537128#M3852</link>
      <description>&lt;P&gt;Is your GlobalProtect portal running on WAN interface or DMZ interface?&lt;/P&gt;
&lt;P&gt;If on WAN interface then maybe those logins will match to intrazone-default that is not configured to log by default.&lt;/P&gt;
&lt;P&gt;You can use security policies to permit traffic to GlobalProtect portal only from specific countries (expects portal to run on non-wan interface or ruleset to have "block any" rule at the end before default rules).&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 16:19:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537128#M3852</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-30T16:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537130#M3853</link>
      <description>&lt;P&gt;The portal is attached to our Outside WAN interface.&amp;nbsp; I wondered if this was considered INTRAZONE and maybe why it isn't be logged. I'll try logging that traffic for a period to see what turns up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My issue for the BLOCK rule for the Portal is I don't even know what to block without risking cutting off access to something else unintentionally.&amp;nbsp; The security rules configured now are for our GP zone but I don't think that is where portal traffic hits.&amp;nbsp; Do you or someone have an example of a block rule that targets the portal traffic only?&amp;nbsp; Would it simply be blocking HTTPS traffic on the outside interfaces IP address in our untrusted outside zone?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 16:27:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537130#M3853</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-03-30T16:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537310#M3860</link>
      <description>&lt;P&gt;Yes, the Portal and Gateway interfaces (on the WAN) is an Untrust-to-Untrust zone. We use an allow SrcZone:Untrust DstZone:Untrust rule with SrcAddr:US region restriction. This is fairly open and could be much more secure, but all our servers are in a separate DMZ zone (and thus follow other rules) and our PA interfaces are restricted to ping management. This can also be further restricted, we are also using an Untrust-Untrust rule with a specific country code and AppID:panos-global-protect for users on foreign travel to allow inbound GP connections. We then use a final deny Any-Any rule before the intrazone-default to block everything else.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Apr 2023 00:04:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537310#M3860</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2023-04-01T00:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537426#M3865</link>
      <description>&lt;P&gt;Appreciate your comment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My issue is I do not at this time know what other Untrust-&amp;gt;Untrust zone traffic is being allowed and don't want to cut it down to US only for ALL.&amp;nbsp; I specifically want to target the Portal itself.&amp;nbsp; Would the AppID:panos-global-protect with a deny outside of the US (and other countries we don't want to allow) work?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 11:22:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537426#M3865</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-04-03T11:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537436#M3866</link>
      <description>&lt;P&gt;If your GlobalProtect portal and gateway run on Untrust interface and with default config then you can permit apps below from countries your wish GlobalProtect to work from towards Untrust interface IP:&lt;/P&gt;
&lt;P&gt;web-browsing&lt;/P&gt;
&lt;P&gt;ssl&lt;/P&gt;
&lt;P&gt;ipsec&lt;/P&gt;
&lt;P&gt;panos-global-protect&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After that drop tcp/443 and udp/4501 traffic to that Untrust interface IP from any other source.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If users inside the company also use GlobalProtect then don't forget to permit traffic also from internal networks to Untrust IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 12:47:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537436#M3866</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-04-03T12:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537499#M3868</link>
      <description>&lt;P&gt;There was a post that I suspect was deleted mentioning port 443 and port 4501 which is referenced here:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/firewall-administration/reference-port-number-usage/ports-used-for-globalprotect" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/firewall-administration/reference-port-number-usage/ports-used-for-globalprotect&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suspect I can simply block 443 to the outside interface and block portal access that way.&amp;nbsp; It isn't clear at this point if 4501 is needed to block the first stage of the login attempts to the portal by the GP Client but I'll have to check it by logging the traffic and see what it looks like.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 20:02:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537499#M3868</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-04-03T20:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537500#M3869</link>
      <description>&lt;P&gt;Client connects to portal over tcp/443.&lt;/P&gt;
&lt;P&gt;It will then try to connect to gateway over udp/4501 to establish IPSec tunnel.&lt;/P&gt;
&lt;P&gt;If udp/4501 fails (some firewall blocks this traffic in between agent and gateway) then agent will fail back to tcp/443 and establish VPN tunnel over tcp/443 (slower compared to udp/4501).&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 20:14:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537500#M3869</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-04-03T20:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537501#M3870</link>
      <description>&lt;P&gt;Thank you for clarifying.&amp;nbsp; Strange, your previous post I had gotten an email on but it wasn't showing until you just posted this second msg.&amp;nbsp; That was the one I was referring to.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 20:16:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537501#M3870</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-04-03T20:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537502#M3871</link>
      <description>&lt;P&gt;By default this site shows only like 5 posts per page and then you need to click "next" to see other posts.&lt;/P&gt;
&lt;P&gt;Really annoying.&lt;/P&gt;
&lt;P&gt;Maybe this is why you missed it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I went into my account settings and set number way higher to get all posts on single page.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 20:24:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537502#M3871</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-04-03T20:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537503#M3872</link>
      <description>&lt;P&gt;Thanks. I changed those settings also - big help.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 20:29:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/537503#M3872</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-04-03T20:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect agent external gateway region restriction - portal still accessible</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/538157#M3913</link>
      <description>&lt;P&gt;Is all IPSEC needed or can we just get by with the ipsec-esp-udp application?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2023 18:59:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-agent-external-gateway-region-restriction-portal/m-p/538157#M3913</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-04-10T18:59:49Z</dc:date>
    </item>
  </channel>
</rss>

