<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enforce Global protect in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enforce-global-protect/m-p/543736#M4059</link>
    <description>&lt;P&gt;Yes, this is possible and is a very common setup. Your customer wants to set the GlobalProtect client to "Always-On" - the client always connects to the GlobalProtect Gateway and doesn't allow traffic until connected, and enable "Enforce GlobalProtect Connection for Network Access".&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Network -&amp;gt; GloablProtect -&amp;gt; Portals -&amp;gt; &amp;lt;portal_config&amp;gt; -&amp;gt; Agent -&amp;gt; &amp;lt;agent_config&amp;gt; -&amp;gt; App -&amp;gt; Connect Method = User-logon (Always-On)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Network -&amp;gt; GloablProtect -&amp;gt; Portals -&amp;gt; &amp;lt;portal_config&amp;gt; -&amp;gt; Agent -&amp;gt; &amp;lt;agent_config&amp;gt; -&amp;gt; App -&amp;gt;&amp;nbsp;Enforce GlobalProtect Connection for Network Access = Yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You may also want to block local network access when connected to the VPN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Network -&amp;gt; GlobalProtect -&amp;gt; Gateways -&amp;lt;gateway_config&amp;gt; -&amp;gt; Agent -&amp;gt; &amp;lt;agent_config&amp;gt; -&amp;gt; Split Tunnel -&amp;gt; No direct access to local network = checked&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second, you want to enable "Internal Host Detection" to detect when the client is connected to the local network&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;Network -&amp;gt; GloablProtect -&amp;gt; Portals -&amp;gt; &amp;lt;portal_config&amp;gt; -&amp;gt; Agent -&amp;gt; &amp;lt;agent_config&amp;gt; -&amp;gt; Internal -&amp;gt; Internal Host Detection = checked&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to specify an internal IP address and matching reverse-DNS name that the IP will match. If the clients DNS returns a matching value (Note: this is case-sensitive), then the client will know it is on the internal network and will connect directly to the local network without requiring a VPN tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that the client must still connect to the Portal to get the GlobalProtect configuration, before it can determine if it is on a local network. So the GP client will still prompt for user credentials when connecting internally. You can get around this (have nearly transparent internal connection) by using a user/machine certificate for the Portal authentication. The Gateway authentication (for when connecting to the VPN from outside the network) can continue to use your standard user/password credentials.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-portals/enforce-globalprotect-for-network-access" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-portals/enforce-globalprotect-for-network-access&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004NcRCAU" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004NcRCAU&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 28 May 2023 20:37:41 GMT</pubDate>
    <dc:creator>Adrian_Jensen</dc:creator>
    <dc:date>2023-05-28T20:37:41Z</dc:date>
    <item>
      <title>Enforce Global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enforce-global-protect/m-p/543706#M4058</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a query on Global Protect.&lt;/P&gt;
&lt;P&gt;Requirement :&lt;/P&gt;
&lt;P&gt;one of our customer wants the requirement&lt;/P&gt;
&lt;P&gt;if user is working from home internet should only work on his laptop if he is connected to global protect&lt;/P&gt;
&lt;P&gt;if user is not connected to global protect his internet should not work even if he is connected to wifi also. All his traffic should pass through Global Protect itself.&lt;/P&gt;
&lt;P&gt;And if the same user is coming back into office network GP should disconnect and user machine should be working on LAN network.&lt;/P&gt;
&lt;P&gt;Is it possible ?&lt;/P&gt;
&lt;P&gt;If possible please let me know what are configuration changes that are required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and Regards&lt;/P&gt;
&lt;P&gt;Monica Shree&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2023 19:22:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enforce-global-protect/m-p/543706#M4058</guid>
      <dc:creator>Monicashree</dc:creator>
      <dc:date>2023-05-28T19:22:04Z</dc:date>
    </item>
    <item>
      <title>Re: Enforce Global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enforce-global-protect/m-p/543736#M4059</link>
      <description>&lt;P&gt;Yes, this is possible and is a very common setup. Your customer wants to set the GlobalProtect client to "Always-On" - the client always connects to the GlobalProtect Gateway and doesn't allow traffic until connected, and enable "Enforce GlobalProtect Connection for Network Access".&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Network -&amp;gt; GloablProtect -&amp;gt; Portals -&amp;gt; &amp;lt;portal_config&amp;gt; -&amp;gt; Agent -&amp;gt; &amp;lt;agent_config&amp;gt; -&amp;gt; App -&amp;gt; Connect Method = User-logon (Always-On)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Network -&amp;gt; GloablProtect -&amp;gt; Portals -&amp;gt; &amp;lt;portal_config&amp;gt; -&amp;gt; Agent -&amp;gt; &amp;lt;agent_config&amp;gt; -&amp;gt; App -&amp;gt;&amp;nbsp;Enforce GlobalProtect Connection for Network Access = Yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You may also want to block local network access when connected to the VPN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Network -&amp;gt; GlobalProtect -&amp;gt; Gateways -&amp;lt;gateway_config&amp;gt; -&amp;gt; Agent -&amp;gt; &amp;lt;agent_config&amp;gt; -&amp;gt; Split Tunnel -&amp;gt; No direct access to local network = checked&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second, you want to enable "Internal Host Detection" to detect when the client is connected to the local network&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;Network -&amp;gt; GloablProtect -&amp;gt; Portals -&amp;gt; &amp;lt;portal_config&amp;gt; -&amp;gt; Agent -&amp;gt; &amp;lt;agent_config&amp;gt; -&amp;gt; Internal -&amp;gt; Internal Host Detection = checked&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to specify an internal IP address and matching reverse-DNS name that the IP will match. If the clients DNS returns a matching value (Note: this is case-sensitive), then the client will know it is on the internal network and will connect directly to the local network without requiring a VPN tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that the client must still connect to the Portal to get the GlobalProtect configuration, before it can determine if it is on a local network. So the GP client will still prompt for user credentials when connecting internally. You can get around this (have nearly transparent internal connection) by using a user/machine certificate for the Portal authentication. The Gateway authentication (for when connecting to the VPN from outside the network) can continue to use your standard user/password credentials.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-portals/enforce-globalprotect-for-network-access" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-portals/enforce-globalprotect-for-network-access&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004NcRCAU" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004NcRCAU&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2023 20:37:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enforce-global-protect/m-p/543736#M4059</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2023-05-28T20:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Enforce Global protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enforce-global-protect/m-p/1002086#M6333</link>
      <description>&lt;P&gt;Adrian,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Im also looking into doing this. Could I enable one or the other or does it require both to work effectively?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What im saying is, if i only enable "&lt;SPAN&gt;Enforce GlobalProtect Connection for Network Access = Yes"&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;what that be sufficient to block all network traffic until the device connects to VPN?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 19:52:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/enforce-global-protect/m-p/1002086#M6333</guid>
      <dc:creator>Cha_Moua</dc:creator>
      <dc:date>2025-01-09T19:52:42Z</dc:date>
    </item>
  </channel>
</rss>

