<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Mobile user Protocol in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/mobile-user-protocol/m-p/1219227#M1071</link>
    <description>&lt;P&gt;We have sase prism and have deployed it for mobile users. Currently the mobile user is running, but I have a concert about the protocol used. So when we use private hotspot tathering the protocol used is ipsec, but when we use the internal protocol used is ssl, in the gp config we have enforced for vpn to only use ipsec but still use ssl when using an internal connection. So do you need to check again?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fyi On the firewall there is no blocking for the ipsec port&lt;/P&gt;</description>
    <pubDate>Thu, 06 Feb 2025 08:36:01 GMT</pubDate>
    <dc:creator>DickyAnggara</dc:creator>
    <dc:date>2025-02-06T08:36:01Z</dc:date>
    <item>
      <title>Mobile user Protocol</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/mobile-user-protocol/m-p/1219227#M1071</link>
      <description>&lt;P&gt;We have sase prism and have deployed it for mobile users. Currently the mobile user is running, but I have a concert about the protocol used. So when we use private hotspot tathering the protocol used is ipsec, but when we use the internal protocol used is ssl, in the gp config we have enforced for vpn to only use ipsec but still use ssl when using an internal connection. So do you need to check again?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fyi On the firewall there is no blocking for the ipsec port&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 08:36:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/mobile-user-protocol/m-p/1219227#M1071</guid>
      <dc:creator>DickyAnggara</dc:creator>
      <dc:date>2025-02-06T08:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Mobile user Protocol</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/mobile-user-protocol/m-p/1219843#M1082</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/299797"&gt;@DickyAnggara&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;We have sase prism and have deployed it for mobile users. Currently the mobile user is running, but I have a concert about the protocol used. So when we use private hotspot tathering the protocol used is ipsec, but when we use the internal protocol used is ssl, in the gp config we have enforced for vpn to only use ipsec but still use ssl when using an internal connection. So do you need to check again?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fyi On the firewall there is no blocking for the ipsec port&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/299797"&gt;@DickyAnggara&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;We have sase prism and have deployed it for mobile users. Currently the mobile user is running, but I have a concert about the protocol used. So when we use private hotspot tathering the protocol used is ipsec, but when we use the internal protocol used is ssl, in the gp config we have enforced for vpn to only use ipsec but still use ssl when using an internal connection. So do you need to check again?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fyi On the firewall there is no blocking for the ipsec port&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/299797"&gt;@DickyAnggara&lt;/a&gt;,&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;I understand you're experiencing a protocol mismatch between your internal and external gateways connections. To ensure that your GlobalProtect agent uses IPsec for internal connections, here are the steps I would recommend to check again;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1:&amp;nbsp;Check Gateway Configuration&lt;/STRONG&gt;: Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Network &amp;gt; GlobalProtect &amp;gt; Gateways&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in your Prisma Access portal. Select the appropriate gateway and ensure that the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;"Enable IPSec"&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;checkbox is checked. Check the "&lt;STRONG&gt;Steps from the GUI"&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from this documentation for reference&lt;STRONG&gt;;&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPY1CAO" target="_blank" rel="nofollow noopener noreferrer"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPY1CAO&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2:&amp;nbsp;Verify Traffic Flow:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Ensure that traffic on UDP port 4501 is not being blocked anywhere along the path. This port is used for IPsec connections.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3:&amp;nbsp;Debugging&lt;/STRONG&gt;: You can also set the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;rasmgr&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;process to debug level by running the command&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;debug rasmgr on debug&lt;/EM&gt;&lt;/STRONG&gt;. This will generate detailed logs in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;rasmgr.log&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file, which can help identify why the IPsec connection is not being established.&lt;/P&gt;
&lt;P&gt;By following these steps above, you should be able to configure your GlobalProtect agent to use IPsec for internal connections. If you still encounter issues, it might be helpful to reach out to&amp;nbsp;Palo Alto Networks support for further assistance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope you find this helpful.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Vickynet&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 02:06:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/mobile-user-protocol/m-p/1219843#M1082</guid>
      <dc:creator>Vickynet</dc:creator>
      <dc:date>2025-02-09T02:06:40Z</dc:date>
    </item>
  </channel>
</rss>

