<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect authentication problem in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34984#M25684</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, we needed to associate the tunnel interface with its own zone rather than the trusted zone.&amp;nbsp; As you stated, this modification now allows additional and needed granularity.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are still two comments/questions, though not critical:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; I was obliged to add a Client Configuration in the GlobalProtect portal, citing an AD group and external gateway IP.&amp;nbsp; Without this, I was getting this error after compiling:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config commit phase 1 aboreted (Module: device)&lt;/P&gt;&lt;P&gt;missing both client config and satellite config&lt;/P&gt;&lt;P&gt;(Module: sslvpn)&lt;/P&gt;&lt;P&gt;Commit failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I can still connect to the portal FQDN and authenticate with ANY account in the AD to download the GlobalProtect client.&amp;nbsp; Thanks to the new rules, it is now not possible to authenticate with ANY account in the AD from GlobalProtect - it is necessary to have an account in the designated allowed group.&amp;nbsp; In any case, shouldn't the authentication be denied when connecting to the portal FQDN and before being able to download the globalprotect MSI?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 Jul 2014 09:01:07 GMT</pubDate>
    <dc:creator>TheBest</dc:creator>
    <dc:date>2014-07-15T09:01:07Z</dc:date>
    <item>
      <title>GlobalProtect authentication problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34980#M25680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The group I use to authenticate GP connections doesn't work properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I followed the advice on this thread:&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-thread-small" data-containerid="2004" data-containertype="14" data-objectid="8661" data-objecttype="1" href="https://live.paloaltonetworks.com/thread/8661"&gt;https://live.paloaltonetworks.com/thread/8661&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was necessary to place the NETBIOS domain name in the LDAP server profile.&amp;nbsp; Output from the CLI now clearly displays the logon format with domain\user, unlike before, for GP clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The GP Portal specifically sites the group allowing VPN connections in the Agent COnfiguration section.&amp;nbsp; Yet, I can still logon with an account that is in the AD but not in that group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is this happening?&amp;nbsp; What is the best practice to limit who can connect via GP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Follow-up question:&amp;nbsp; Is it possible to deploy new GP clients to a group of test users?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2014 15:18:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34980#M25680</guid>
      <dc:creator>TheBest</dc:creator>
      <dc:date>2014-07-07T15:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect authentication problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34981#M25681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/12736"&gt;TheBest&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would remove the AD group from the agent configuration and would use it in a security rule. For example, if your tunnel belongs to a zone called 'GP-VPN', I would create a security rule from 'GP-VPN' to 'Trust' and leverage the user-group feature in the 'source user' column of that policy and then test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2014 16:37:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34981#M25681</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2014-07-07T16:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect authentication problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34982#M25682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK, so it appears that the AD group in the agent configuration would be mainly to target a group for a specific configuration of the agent.&amp;nbsp; Therefore, this parameter has nothing to do with security and access filtering.&amp;nbsp; Still, using this method, I don't think its possible to target a specific group for a newer version of GP client.&amp;nbsp; I think the only way may be to deploy the MSI via GPO.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your idea is a good one but won't work currently with my configuration.&amp;nbsp; The security zone for the VPN tunnel is already "Trust".&amp;nbsp; This explains why we have no granularity and clearly reduces security.&amp;nbsp; However, the physical interface connection to the internet is in the zone "Untrust".&amp;nbsp; It looks like there is a 1:1 relationship between the physical interface and a zone.&amp;nbsp; So, it looks like I would have to change the VPN tunnel zone from "Trust" to "Untrust" and then add the policy as you suggested, right?&amp;nbsp; Otherwise, is it possible to have multiple zones linked to one physical interface?&amp;nbsp; In that case the interface to the outside would include "Untrust" and a new zone "GP-VPN"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your valuable help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2014 06:46:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34982#M25682</guid>
      <dc:creator>TheBest</dc:creator>
      <dc:date>2014-07-08T06:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect authentication problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34983#M25683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/12736"&gt;TheBest&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have multiple interfaces of same type (L2/ L3/ Vwire) in one zone, but cannot tie multiple zones to one interface. Having said that, it was always a best practice to associate the tunnel interface to its own zone - something like GP-VPN and then configure a security rule from GP-VPN to Trust and GP-VPN to Untrust. In that way, you not only have more control over the traffic but you can also turn on PAN's IDS/IPS feature by applying AV, anti-spyware, anti-vulnerability, URL-filtering and data filtering profiles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2014 14:26:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34983#M25683</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2014-07-08T14:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect authentication problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34984#M25684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, we needed to associate the tunnel interface with its own zone rather than the trusted zone.&amp;nbsp; As you stated, this modification now allows additional and needed granularity.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are still two comments/questions, though not critical:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; I was obliged to add a Client Configuration in the GlobalProtect portal, citing an AD group and external gateway IP.&amp;nbsp; Without this, I was getting this error after compiling:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config commit phase 1 aboreted (Module: device)&lt;/P&gt;&lt;P&gt;missing both client config and satellite config&lt;/P&gt;&lt;P&gt;(Module: sslvpn)&lt;/P&gt;&lt;P&gt;Commit failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I can still connect to the portal FQDN and authenticate with ANY account in the AD to download the GlobalProtect client.&amp;nbsp; Thanks to the new rules, it is now not possible to authenticate with ANY account in the AD from GlobalProtect - it is necessary to have an account in the designated allowed group.&amp;nbsp; In any case, shouldn't the authentication be denied when connecting to the portal FQDN and before being able to download the globalprotect MSI?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jul 2014 09:01:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-authentication-problem/m-p/34984#M25684</guid>
      <dc:creator>TheBest</dc:creator>
      <dc:date>2014-07-15T09:01:07Z</dc:date>
    </item>
  </channel>
</rss>

