<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect Clients connection Policies through the NGFW in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-clients-connection-policies-through-the-ngfw/m-p/531067#M466</link>
    <description>&lt;P&gt;Thank you for your advice. However, it looks like the problem is in Authentication.&lt;BR /&gt;The GP client logs in and receives a cookie for 24 hours. However, after expiring this cookie, it is unable to re-authenticate.&lt;BR /&gt;I'll try enabling SAML portal now and see what happens.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Feb 2023 12:34:23 GMT</pubDate>
    <dc:creator>Vachy</dc:creator>
    <dc:date>2023-02-14T12:34:23Z</dc:date>
    <item>
      <title>Global Protect Clients connection Policies through the NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-clients-connection-policies-through-the-ngfw/m-p/530206#M460</link>
      <description>&lt;P&gt;Hi, Comunity,&lt;/P&gt;
&lt;P&gt;I'd like to ask your advice.&lt;BR /&gt;Is there any instruction somewhere on how to do the best set of the rules on Firewall PAN to only allow traffic for global protect clients?&lt;BR /&gt;The clients are on a normal network with DHCP. They have DNS from AD server. &lt;BR /&gt;I want the client to get to the Internet only via Prisma Access/ This means that the client passes through a firewall that only allows access to&amp;nbsp; Mobile Users Gateways.&lt;/P&gt;
&lt;P&gt;I have found via API in Panorama/Cloud Plugin GW addresses, Portals and even IP ranges. I gradually prepared the rules. &lt;BR /&gt;I still have a problem with this. After setting the rules it works. However, the next day it doesn't.&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 23:40:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-clients-connection-policies-through-the-ngfw/m-p/530206#M460</guid>
      <dc:creator>Vachy</dc:creator>
      <dc:date>2023-02-07T23:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Clients connection Policies through the NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-clients-connection-policies-through-the-ngfw/m-p/531043#M464</link>
      <description>&lt;P&gt;You can try on the Firewall to create a policy rule that allows only the Globalprotect Application from your source IP addresses/username/ad groups as a workaround.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nikoolayy1_0-1676366109548.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47918i2209A17C1CABDBAA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="nikoolayy1_0-1676366109548.png" alt="nikoolayy1_0-1676366109548.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Outside of that better make a server that pulls your Prisma Access endpoint addresses using the API as you already saw and then make an External Dynamic List that the Palo Alto Firewalls can ingest but will be complex. You can alse feed in the firewalls using their API and and modify the address object. As Prisma Access addreses change better pull the data every maybe 10 minutes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-panorama-api/get-started-with-the-pan-os-rest-api/work-with-address-objects-rest-api" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-panorama-api/get-started-with-the-pan-os-rest-api/work-with-address-objects-rest-api&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The API to retrive the Prisma Access addresses:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-panorama-api/get-started-with-the-pan-os-rest-api/work-with-address-objects-rest-api" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-panorama-api/get-started-with-the-pan-os-rest-api/work-with-address-objects-rest-api&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 09:21:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-clients-connection-policies-through-the-ngfw/m-p/531043#M464</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-02-14T09:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Clients connection Policies through the NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-clients-connection-policies-through-the-ngfw/m-p/531067#M466</link>
      <description>&lt;P&gt;Thank you for your advice. However, it looks like the problem is in Authentication.&lt;BR /&gt;The GP client logs in and receives a cookie for 24 hours. However, after expiring this cookie, it is unable to re-authenticate.&lt;BR /&gt;I'll try enabling SAML portal now and see what happens.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 12:34:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-clients-connection-policies-through-the-ngfw/m-p/531067#M466</guid>
      <dc:creator>Vachy</dc:creator>
      <dc:date>2023-02-14T12:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Clients connection Policies through the NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-clients-connection-policies-through-the-ngfw/m-p/531151#M467</link>
      <description>&lt;P&gt;Also check if the cookies are correctly configured as maybe the portal cookie timeout is different of the gateway one:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class="slds-text-heading_large"&gt;How to generate cookies on GlobalProtect Portal and use cookies for Gateway Authentication&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boODCAY" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boODCAY&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class="slds-text-heading_large"&gt;GlobalProtect portal and gateway authentication override cookie lifetime does not expire or last for set lifetime&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004NCxCAM&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004NCxCAM&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 20:04:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/global-protect-clients-connection-policies-through-the-ngfw/m-p/531151#M467</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-02-14T20:04:59Z</dc:date>
    </item>
  </channel>
</rss>

