<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: One portal, multiple gateways for different users in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/one-portal-multiple-gateways-for-different-users/m-p/1241265#M7112</link>
    <description>&lt;P&gt;Certificates are always checked first. Depending on your authentication preference (cert AND auth, or cert OR auth) will take priority and skip SAML, or will be required before going to SAML&lt;/P&gt;
&lt;P&gt;Combining both companies on the same portal would require the OR condition, so no SAML for C1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;after that first hurdle, the different gateways can be set up by creating an agent profile with a config selection criteria set to for example user groups. tricky thing there is that the C1-certificate-only users wont be able to match a group so you'll need to set the C2 profile on top with the group selection criteria and the C1 profile below with no selection criteria ( which could lead to cross-contamination if a C2 user falls outside the group mapping !)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the above is messy, so might i propose you try something different?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can run the same URL on different ports and then use destination NAT to run different portals on loopback interfaces&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;e.g.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;vpn.doamin.com:1443 -&amp;gt; DNAT loopback 172.16.0.1:443&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;vpn.doamin.com:2443 -&amp;gt; DNAT loopback 172.16.0.2:443&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;that way you can run 2 completely separate portals&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Nov 2025 12:39:17 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2025-11-05T12:39:17Z</dc:date>
    <item>
      <title>One portal, multiple gateways for different users</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/one-portal-multiple-gateways-for-different-users/m-p/1241191#M7110</link>
      <description>&lt;P&gt;Posted a diagram of what I am trying to accomplish but seem to get road blocks so maybe there is something I am missing.&lt;/P&gt;
&lt;P&gt;Company A will use an always on config with cert. So I assume the cert will take priority over the saml auth?&lt;/P&gt;
&lt;P&gt;Company B will be using manual/on-demand with no cert. Each company should be able to use the SAME external URL (vpn.doamin.com) But based on global config agent config should use a different gateway that will have different HIP parameters and different policies.&lt;/P&gt;
&lt;P&gt;Is there some way you need to redirect them to a different gateway by using the internal gateway config on agent config?&lt;/P&gt;
&lt;P&gt;Maybe I am struggling to understand the flow.&lt;/P&gt;
&lt;P&gt;User -&amp;gt; connects to portal: vpn.domain dot com-&amp;gt; user auths to some agent config based on AD group membership -&amp;gt; gets sent to corresponding gateway (how does this happen?) -&amp;gt; connects to gateway, passes hip, then proceeds to network policies&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image.png" style="width: 267px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69756i8F313FFDEA4B250D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 15:27:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/one-portal-multiple-gateways-for-different-users/m-p/1241191#M7110</guid>
      <dc:creator>S.Williams091162</dc:creator>
      <dc:date>2025-11-04T15:27:52Z</dc:date>
    </item>
    <item>
      <title>Re: One portal, multiple gateways for different users</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/one-portal-multiple-gateways-for-different-users/m-p/1241260#M7111</link>
      <description>&lt;P class=""&gt;&lt;STRONG&gt;The Missing Link: Portal Agent Configuration Rules&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;The mechanism to route users to the correct Gateway is located on the &lt;STRONG&gt;GlobalProtect Portal&lt;/STRONG&gt; under the &lt;STRONG&gt;Agent&lt;/STRONG&gt; tab, using &lt;STRONG&gt;Configs&lt;/STRONG&gt; (Agent Configurations) and &lt;STRONG&gt;Rules&lt;/STRONG&gt;.&lt;/P&gt;&lt;P class=""&gt;Your flow: &lt;I&gt;User → connects to portal: &lt;/I&gt;&lt;A href="https://www.google.com/search?q=vpn.domain.com" target="_blank" rel="noopener"&gt;&lt;SPAN class=""&gt;&lt;I&gt;https://www.google.com/search?q=vpn.domain.com&lt;/I&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;I&gt; → &lt;/I&gt;&lt;STRONG&gt;&lt;I&gt;user auths to some agent config based on AD group membership&lt;/I&gt;&lt;/STRONG&gt;&lt;I&gt; → gets sent to corresponding gateway (how does this happen?) → connects to gateway, passes hip, then proceeds to network policies.&lt;/I&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;1. Define Two Agent Configurations&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;First, you need to create the two distinct configurations under &lt;STRONG&gt;Network → GlobalProtect → Portals → Your Portal →Agent tab&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;STRONG&gt;Agent Config A (e.g., Config-Company-A)&lt;/STRONG&gt;:&lt;/LI&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;STRONG&gt;Connectivity Tab → External Gateways:&lt;/STRONG&gt; List only &lt;STRONG&gt;Gateway A&lt;/STRONG&gt;'s external address.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Client Settings:&lt;/STRONG&gt; Define the settings for &lt;STRONG&gt;Always-On&lt;/STRONG&gt; (if not already set in a separate Client Configuration).&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;STRONG&gt;Agent Config B (e.g., Config-Company-B)&lt;/STRONG&gt;:&lt;/LI&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;STRONG&gt;Connectivity Tab → External Gateways:&lt;/STRONG&gt; List only &lt;STRONG&gt;Gateway B&lt;/STRONG&gt;'s external address.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Client Settings:&lt;/STRONG&gt; Define the settings for &lt;STRONG&gt;Manual/On-Demand&lt;/STRONG&gt; connection.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;2. Create Selection Rules Based on Group Membership&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;On the same &lt;STRONG&gt;Agent&lt;/STRONG&gt; tab of the Portal configuration, you define the rules that match users to these configs:&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;STRONG&gt;Rule 1 (Company A):&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;STRONG&gt;Criteria:&lt;/STRONG&gt; Use the &lt;STRONG&gt;Source User&lt;/STRONG&gt; column. Select the &lt;STRONG&gt;AD User Group&lt;/STRONG&gt; for Company A (e.g., ldap-profile-A\Company A Users).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Select &lt;STRONG&gt;Config-Company-A&lt;/STRONG&gt; from the drop-down.&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;STRONG&gt;Rule 2 (Company B):&lt;/STRONG&gt;&lt;/LI&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;STRONG&gt;Criteria:&lt;/STRONG&gt; Use the &lt;STRONG&gt;Source User&lt;/STRONG&gt; column. Select the &lt;STRONG&gt;AD User Group&lt;/STRONG&gt; for Company B (e.g., ldap-profile-B\Company B Users).&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Action:&lt;/STRONG&gt; Select &lt;STRONG&gt;Config-Company-B&lt;/STRONG&gt; from the drop-down.&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;STRONG&gt;Default/Final Rule:&lt;/STRONG&gt; A default config must be set at the end.&lt;/LI&gt;&lt;/UL&gt;&lt;P class=""&gt;The Portal processes these rules &lt;STRONG&gt;top-down&lt;/STRONG&gt;. When a user successfully authenticates (via Cert or SAML/LDAP) and their identity is resolved to a group, the Portal applies the first matching rule, and the client device downloads that specific Agent Configuration. The downloaded configuration tells the GlobalProtect client to &lt;STRONG&gt;only use the Gateway(s)&lt;/STRONG&gt; defined within that specific config.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;Authentication Priority for Company A (Cert vs. SAML)&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Your assumption about the certificate taking priority is generally correct and is essential for &lt;STRONG&gt;Always-On&lt;/STRONG&gt; functionality.&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;On the &lt;STRONG&gt;Portal&lt;/STRONG&gt;, under the &lt;STRONG&gt;Authentication&lt;/STRONG&gt; tab, you must define an &lt;STRONG&gt;Authentication Profile Sequence&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;For Company A, the &lt;STRONG&gt;Client Certificate Profile&lt;/STRONG&gt; must be placed &lt;STRONG&gt;before&lt;/STRONG&gt; the SAML Authentication Profile in the sequence.&lt;/LI&gt;&lt;LI&gt;The Always-On client attempts certificate authentication first. If successful, the Portal resolves the user identity (from the certificate's subject) and immediately proceeds to the Agent Configuration Rule matching without prompting for SAML.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://youtu.be/j5LdVWCfxRM" target="_blank" rel="noopener"&gt;https://youtu.be/j5LdVWCfxRM&lt;/A&gt;&amp;nbsp;&amp;lt;- Use this link&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Wed, 05 Nov 2025 10:55:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/one-portal-multiple-gateways-for-different-users/m-p/1241260#M7111</guid>
      <dc:creator>santhuksha</dc:creator>
      <dc:date>2025-11-05T10:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: One portal, multiple gateways for different users</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/one-portal-multiple-gateways-for-different-users/m-p/1241265#M7112</link>
      <description>&lt;P&gt;Certificates are always checked first. Depending on your authentication preference (cert AND auth, or cert OR auth) will take priority and skip SAML, or will be required before going to SAML&lt;/P&gt;
&lt;P&gt;Combining both companies on the same portal would require the OR condition, so no SAML for C1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;after that first hurdle, the different gateways can be set up by creating an agent profile with a config selection criteria set to for example user groups. tricky thing there is that the C1-certificate-only users wont be able to match a group so you'll need to set the C2 profile on top with the group selection criteria and the C1 profile below with no selection criteria ( which could lead to cross-contamination if a C2 user falls outside the group mapping !)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the above is messy, so might i propose you try something different?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can run the same URL on different ports and then use destination NAT to run different portals on loopback interfaces&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;e.g.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;vpn.doamin.com:1443 -&amp;gt; DNAT loopback 172.16.0.1:443&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;vpn.doamin.com:2443 -&amp;gt; DNAT loopback 172.16.0.2:443&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;that way you can run 2 completely separate portals&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 12:39:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/one-portal-multiple-gateways-for-different-users/m-p/1241265#M7112</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-11-05T12:39:17Z</dc:date>
    </item>
  </channel>
</rss>

