<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security policy for GlobalProtect in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16148#M11794</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check your NAT policy,&lt;/P&gt;&lt;P&gt;you shouldnt have any-untrust rule in your nat. You need to be specific in creating NAT rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Apr 2012 13:31:42 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2012-04-26T13:31:42Z</dc:date>
    <item>
      <title>security policy for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16144#M11790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which applications/services do i have to enable for GlobalProtect (standard license). I can't find any documentation on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;actual SW: 4.1.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Apr 2012 13:28:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16144#M11790</guid>
      <dc:creator>ecirclegmbh</dc:creator>
      <dc:date>2012-04-11T13:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: security policy for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16145#M11791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi...Once you complete the configuration for Global Protect, the VPN feature will be active and ready to accept client connections.&amp;nbsp; You define the security rules to allow specific apps/services through for the VPN clients only and not the the VPN feature itself.&amp;nbsp; Let's say you want to permit only ssh traffic for the VPN clients, you would define the security rule to permit app=ssh.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Apr 2012 13:45:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16145#M11791</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-04-11T13:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: security policy for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16146#M11792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;Ok, no special policy for GlobalProtect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But the portal doesn't show on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://external-ip"&gt;https://external-ip&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Tried with different authentication profiles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any hints?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2012 07:10:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16146#M11792</guid>
      <dc:creator>ecirclegmbh</dc:creator>
      <dc:date>2012-04-12T07:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: security policy for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16147#M11793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please could you check the configuration and ensure that you have the server certificate configured correctly. You may have to open a support case to ensure the configs are correct. Can you telnet to port 443 on that external interface, that way we can ensure that at least port 443 traffic it making it to the PAN Firewall external interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2012 18:33:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16147#M11793</guid>
      <dc:creator>sjamaluddin</dc:creator>
      <dc:date>2012-04-16T18:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: security policy for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16148#M11794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check your NAT policy,&lt;/P&gt;&lt;P&gt;you shouldnt have any-untrust rule in your nat. You need to be specific in creating NAT rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2012 13:31:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16148#M11794</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-04-26T13:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: security policy for GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16149#M11795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm running 4.1.10.&amp;nbsp; In order for the PAN to accept client connections (I'm binding the portal to the "outside" interface) I had to create a security rule - "outside zone to outside zone, destination the external interface of the PAN, apps - SSL, web browsing, and panos-global-protect, services http (80) and https (433)."&amp;nbsp; Without this rule clients were not able to connect.&amp;nbsp; BUT this has to do with the fact that I have an explicit deny rule at the bottom of my policy for logging purposes.&amp;nbsp; So, in my case I need to create explicit zone to zone rules (I didn't recreate the hidden same zone to same zone allow rule - this is by design).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Feb 2013 19:18:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-for-globalprotect/m-p/16149#M11795</guid>
      <dc:creator>CRT-Capital</dc:creator>
      <dc:date>2013-02-10T19:18:44Z</dc:date>
    </item>
  </channel>
</rss>

