<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Down a Global Protect Gateway in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/down-a-global-protect-gateway/m-p/996599#M6196</link>
    <description>&lt;P&gt;I was presented with a interesting question.&amp;nbsp; If the inside interface of a Firewall hosting an external &lt;LI-PRODUCT title="GlobalProtect" id="GlobalProtect"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;Gateway is down, will the Palo allow users to still connect to that Gateway&lt;BR /&gt;&lt;BR /&gt;My testing has indicated, yes users will connect but be dead in the water because the firewall has no where to send the on-prem traffic.&lt;BR /&gt;&lt;BR /&gt;If this is correct, then is there any method that would allow us to down the outside interface, GP Tunnel interface, or another method that would prevent users from connecting to a gateway that has a downed inside interface.&lt;/P&gt;</description>
    <pubDate>Wed, 04 Dec 2024 21:50:46 GMT</pubDate>
    <dc:creator>DrewNumberTwo</dc:creator>
    <dc:date>2024-12-04T21:50:46Z</dc:date>
    <item>
      <title>Down a Global Protect Gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/down-a-global-protect-gateway/m-p/996599#M6196</link>
      <description>&lt;P&gt;I was presented with a interesting question.&amp;nbsp; If the inside interface of a Firewall hosting an external &lt;LI-PRODUCT title="GlobalProtect" id="GlobalProtect"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;Gateway is down, will the Palo allow users to still connect to that Gateway&lt;BR /&gt;&lt;BR /&gt;My testing has indicated, yes users will connect but be dead in the water because the firewall has no where to send the on-prem traffic.&lt;BR /&gt;&lt;BR /&gt;If this is correct, then is there any method that would allow us to down the outside interface, GP Tunnel interface, or another method that would prevent users from connecting to a gateway that has a downed inside interface.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 21:50:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/down-a-global-protect-gateway/m-p/996599#M6196</guid>
      <dc:creator>DrewNumberTwo</dc:creator>
      <dc:date>2024-12-04T21:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: Down a Global Protect Gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/down-a-global-protect-gateway/m-p/997456#M6216</link>
      <description>&lt;P&gt;interesting take &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;here's a couple ideas:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. set the authentication method for your users to an internal server (behind the internal interface) so authentication becomes impossible if that interface goes down&lt;/P&gt;
&lt;P&gt;2. set your default route up with path monitoring, and target something internal.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. actually attach the globalprotect gateway to the internal interface and use NAT to redirect traffic inbound&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 11:41:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/down-a-global-protect-gateway/m-p/997456#M6216</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-12-10T11:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Down a Global Protect Gateway</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/down-a-global-protect-gateway/m-p/997475#M6217</link>
      <description>&lt;P&gt;Thanks for the reply and all are good ideas.&lt;BR /&gt;1.&amp;nbsp; I think the issue here is that the portal still sends users to a gateway that goes nowhere.&amp;nbsp; The Gateway is not checking to see if it can authenticate prior to accepting users as I understand.&lt;BR /&gt;2.&amp;nbsp; The trick here is that you seemingly cannot pull a route from monitoring that is not pinging from that interface.&amp;nbsp; We were unable to get the outside interface with the 0.0.0.0 route to ping inside successfully.&amp;nbsp; Unless we missed something&lt;BR /&gt;3.&amp;nbsp; Interesting thought I will maybe have to lab it up to see if that works.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 14:22:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/down-a-global-protect-gateway/m-p/997475#M6217</guid>
      <dc:creator>DrewNumberTwo</dc:creator>
      <dc:date>2024-12-10T14:22:56Z</dc:date>
    </item>
  </channel>
</rss>

