<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple GlobalProtect profiles based on LDAP groups in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/multiple-globalprotect-profiles-based-on-ldap-groups/m-p/514476#M377</link>
    <description>&lt;P&gt;I have tried multiple searches, but can't seem to find the answer that I am looking for.&amp;nbsp; I am migrating from Cisco ASA firewalls to a PA-440.&amp;nbsp; The PA-440 is running PanOS 10.1.6-h6.&amp;nbsp; On the Cisco we have multiple VPN profiles.&amp;nbsp; Each profile has access to only specific networks and/or hosts.&amp;nbsp; When you initiate a VPN session, you select the session that you need (usually based on job function). We you are connected, you only have access to the systems that you need.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have the PA-440 running mostly isolated.&amp;nbsp; The management interface is connected to the LAN.&amp;nbsp; I can connect a laptop to the WAN interface and connect to GlobalProtect using my domain credentials.&amp;nbsp; If can browse my AD groups in Device &amp;gt; User Identification &amp;gt; Group Mapping Settings, and add a group.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I go into the Network &amp;gt; GlobalProtect &amp;gt; Gateways &amp;gt; *mygateway* &amp;gt; Agent &amp;gt; *myagent* &amp;gt; Config Selection Critia and try to add the mapped group in the Source User block Global protect stops workings.&amp;nbsp; When I clock on Ok, it replaces the mapped group (domain\group) with the full LDAP bind string.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What am I missing?&lt;/P&gt;</description>
    <pubDate>Fri, 09 Sep 2022 19:31:14 GMT</pubDate>
    <dc:creator>darisb</dc:creator>
    <dc:date>2022-09-09T19:31:14Z</dc:date>
    <item>
      <title>Multiple GlobalProtect profiles based on LDAP groups</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/multiple-globalprotect-profiles-based-on-ldap-groups/m-p/514476#M377</link>
      <description>&lt;P&gt;I have tried multiple searches, but can't seem to find the answer that I am looking for.&amp;nbsp; I am migrating from Cisco ASA firewalls to a PA-440.&amp;nbsp; The PA-440 is running PanOS 10.1.6-h6.&amp;nbsp; On the Cisco we have multiple VPN profiles.&amp;nbsp; Each profile has access to only specific networks and/or hosts.&amp;nbsp; When you initiate a VPN session, you select the session that you need (usually based on job function). We you are connected, you only have access to the systems that you need.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have the PA-440 running mostly isolated.&amp;nbsp; The management interface is connected to the LAN.&amp;nbsp; I can connect a laptop to the WAN interface and connect to GlobalProtect using my domain credentials.&amp;nbsp; If can browse my AD groups in Device &amp;gt; User Identification &amp;gt; Group Mapping Settings, and add a group.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I go into the Network &amp;gt; GlobalProtect &amp;gt; Gateways &amp;gt; *mygateway* &amp;gt; Agent &amp;gt; *myagent* &amp;gt; Config Selection Critia and try to add the mapped group in the Source User block Global protect stops workings.&amp;nbsp; When I clock on Ok, it replaces the mapped group (domain\group) with the full LDAP bind string.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What am I missing?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 19:31:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/multiple-globalprotect-profiles-based-on-ldap-groups/m-p/514476#M377</guid>
      <dc:creator>darisb</dc:creator>
      <dc:date>2022-09-09T19:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple GlobalProtect profiles based on LDAP groups</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/multiple-globalprotect-profiles-based-on-ldap-groups/m-p/514485#M378</link>
      <description>&lt;P&gt;I'm playing around while I am waiting for answers and I am beginning to think maybe security policies based on LDAP user groups is the way to go.&amp;nbsp; The only issue is I have a group that needs a different IP address then the rest of my users.&amp;nbsp; It looked like they way to go was to create a special Agent in a Gateway Configuration but when I do that based on defined group mapping (LDAP) the VPN client won't connect.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 22:51:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/multiple-globalprotect-profiles-based-on-ldap-groups/m-p/514485#M378</guid>
      <dc:creator>darisb</dc:creator>
      <dc:date>2022-09-09T22:51:14Z</dc:date>
    </item>
  </channel>
</rss>

