<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect Agent prisma Access in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-agent-prisma-access/m-p/1219622#M1077</link>
    <description>&lt;P&gt;First you need to answer the question why do you need IPSEC when the internal gateway is internal because for outside connections you use Remote network (SPN) with ipsec tunnel to prisma access&amp;nbsp; as double ipsec encryption is bad news? The internal gateway is just to collect the user id and HIP data and send it in XML that could be over SSL (maybe that is what you are seeing).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma-access/administration/prisma-access-advanced-deployments/prisma-access-remote-network-advanced-deployments/prisma-access-internal-gateway" target="_blank" rel="noopener"&gt;Prisma Access Internal Gateway&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other than that if you are using on-prem Firewall as as internal gateway you need to select tunnel mode and enable the IPSec checkmark as I proved the link below. If IPsec is blocked the tunnel will failover to SSL so check your security policies on the NGFW and on any network devices in between. Configure the host detection as well as the NGFW to know when to switch to the internal gateway. If you reach the internal gateway Palo Alto NGFW Firewall through Prisma Access tunnel then better not configure tunnel mode , if traffic goes to prisma access after the internal NGFW gateway then there is a point doing this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-gateways" target="_blank" rel="noopener"&gt;GlobalProtect Gateways&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPY1CAO" target="_blank" rel="noopener"&gt;How to Confirm if GlobalProtect Tunnel is Using IPSec or SSL? - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 08 Feb 2025 12:50:11 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2025-02-08T12:50:11Z</dc:date>
    <item>
      <title>Global Protect Agent prisma Access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-agent-prisma-access/m-p/1219256#M1072</link>
      <description>&lt;P&gt;Hi, i have question. while connecting through internal connection i got ssl protocol in GP agent, but if i connected to external connection i got IPsec protocol on my GP agent. i want to ask how could i get Ipsec protocol while connected to internal connection?&amp;nbsp; my global protect already integrated to prisma access. you can see the pictures below&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 08:10:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-agent-prisma-access/m-p/1219256#M1072</guid>
      <dc:creator>FarrasErdiansyah</dc:creator>
      <dc:date>2025-02-04T08:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Agent prisma Access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-agent-prisma-access/m-p/1219622#M1077</link>
      <description>&lt;P&gt;First you need to answer the question why do you need IPSEC when the internal gateway is internal because for outside connections you use Remote network (SPN) with ipsec tunnel to prisma access&amp;nbsp; as double ipsec encryption is bad news? The internal gateway is just to collect the user id and HIP data and send it in XML that could be over SSL (maybe that is what you are seeing).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma-access/administration/prisma-access-advanced-deployments/prisma-access-remote-network-advanced-deployments/prisma-access-internal-gateway" target="_blank" rel="noopener"&gt;Prisma Access Internal Gateway&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other than that if you are using on-prem Firewall as as internal gateway you need to select tunnel mode and enable the IPSec checkmark as I proved the link below. If IPsec is blocked the tunnel will failover to SSL so check your security policies on the NGFW and on any network devices in between. Configure the host detection as well as the NGFW to know when to switch to the internal gateway. If you reach the internal gateway Palo Alto NGFW Firewall through Prisma Access tunnel then better not configure tunnel mode , if traffic goes to prisma access after the internal NGFW gateway then there is a point doing this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-gateways" target="_blank" rel="noopener"&gt;GlobalProtect Gateways&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPY1CAO" target="_blank" rel="noopener"&gt;How to Confirm if GlobalProtect Tunnel is Using IPSec or SSL? - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Feb 2025 12:50:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-agent-prisma-access/m-p/1219622#M1077</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2025-02-08T12:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Agent prisma Access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-agent-prisma-access/m-p/1219842#M1081</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1155637765"&gt;@FarrasErdiansyah&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hi, i have question. while connecting through internal connection i got ssl protocol in GP agent, but if i connected to external connection i got IPsec protocol on my GP agent. i want to ask how could i get Ipsec protocol while connected to internal connection?&amp;nbsp; my global protect already integrated to prisma access. you can see the pictures below&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1155637765"&gt;@FarrasErdiansyah&lt;/a&gt;&amp;nbsp;, I understand you're experiencing a protocol mismatch between your internal and external gateways connections. To ensure that your GlobalProtect agent uses IPsec for internal connections, you can follow these steps:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1:&amp;nbsp;Check Gateway Configuration&lt;/STRONG&gt;: Navigate to &lt;STRONG&gt;Network &amp;gt; GlobalProtect &amp;gt; Gateways&lt;/STRONG&gt; in your Prisma Access portal. Select the appropriate gateway and ensure that the &lt;STRONG&gt;"Enable IPSec"&lt;/STRONG&gt; checkbox is checked. Check the "&lt;STRONG&gt;Steps from the GUI"&lt;/STRONG&gt; from this documentation for reference&lt;STRONG&gt;;&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPY1CAO" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PPY1CAO&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2:&amp;nbsp;Verify Traffic Flow:&lt;/STRONG&gt; Ensure that traffic on UDP port 4501 is not being blocked anywhere along the path. This port is used for IPsec connections.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3:&amp;nbsp;Debugging&lt;/STRONG&gt;: You can also set the &lt;STRONG&gt;rasmgr&lt;/STRONG&gt; process to debug level by running the command &lt;STRONG&gt;&lt;EM&gt;debug rasmgr on debug&lt;/EM&gt;&lt;/STRONG&gt;. This will generate detailed logs in the &lt;STRONG&gt;rasmgr.log&lt;/STRONG&gt; file, which can help identify why the IPsec connection is not being established.&lt;/P&gt;
&lt;P&gt;By following these steps above, you should be able to configure your GlobalProtect agent to use IPsec for internal connections. If you still encounter issues, it might be helpful to reach out to&amp;nbsp;Palo Alto Networks support for further assistance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope you find this helpful.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Vickynet&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 02:03:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-agent-prisma-access/m-p/1219842#M1081</guid>
      <dc:creator>Vickynet</dc:creator>
      <dc:date>2025-02-09T02:03:47Z</dc:date>
    </item>
  </channel>
</rss>

