<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to setup multiple SSL-VPN  tunnels in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47903#M35211</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@simonbrazil:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. PAN-OS 4.0 supports the use of multiple authentication types on one SSL-VPN&lt;/P&gt;&lt;P&gt;2. addressed by using allowed user lists in an authentication profile&lt;/P&gt;&lt;P&gt;3. unnecessary if you are taking advantage of #1&lt;/P&gt;&lt;P&gt;4. also obviated by #1 and the ability to specify a set of authentication types to try on a single SSL VPN setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Aug 2011 23:19:42 GMT</pubDate>
    <dc:creator>bpappas</dc:creator>
    <dc:date>2011-08-29T23:19:42Z</dc:date>
    <item>
      <title>How to setup multiple SSL-VPN  tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47902#M35210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm hoping I'm missing something obvious here...is there a good way to support SSL-VPN access for different types of users who require different access and use different authentication schemes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to setup multiple SSL-VPN tunnel configurations for different types of users.&amp;nbsp; Initially, I was hoping to use a single SSL-VPN configuration and simply differentiate by user.&amp;nbsp; However, it doesn't appear that PAN is setup in this fashion. My goal is to support different users have different authentication schemes and require different access (Employees versus Contractors).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I set out to create a second SSL-VPN tunnel configuration.&amp;nbsp; Unfortunately, I have hit a problem I don't know how to overcome:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* First, I had to create a separate SSL-VPN tunnel to support different authentication profiles (Radius AND LocalDB) as well as to control access differently for each group.&lt;/P&gt;&lt;P&gt;* Second, I had to create the new User Profiles&lt;/P&gt;&lt;P&gt;* Third, to create a new SSL-VPN tunnel, I have to create a new tunnel interface and associate it with my zone of choice&lt;/P&gt;&lt;P&gt;* Fourth (and this is the issue), I had to create a new IP address on my external interface.&amp;nbsp; This is because I can't use the same IP address on the same external interface as is already used in the first SSL-VPN.&amp;nbsp; (This is the selection on the "Choice" option of the "Gateway Address" configuration section in the Add/Edit SSL VPN dialog window).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, this fourth step is not possible (at least in my environment).&amp;nbsp; I can't add a secondary address to the external interface in the same network as the first address (192.168.1.1/24 and 192.168.1.2/24 for example).&amp;nbsp; And, since I don't have another network of addresses to use on the external interface, I am stuck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2011 22:25:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47902#M35210</guid>
      <dc:creator>simonbrazil</dc:creator>
      <dc:date>2011-08-29T22:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup multiple SSL-VPN  tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47903#M35211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@simonbrazil:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. PAN-OS 4.0 supports the use of multiple authentication types on one SSL-VPN&lt;/P&gt;&lt;P&gt;2. addressed by using allowed user lists in an authentication profile&lt;/P&gt;&lt;P&gt;3. unnecessary if you are taking advantage of #1&lt;/P&gt;&lt;P&gt;4. also obviated by #1 and the ability to specify a set of authentication types to try on a single SSL VPN setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2011 23:19:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47903#M35211</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-08-29T23:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup multiple SSL-VPN  tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47904#M35212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!&amp;nbsp; Took a few minutes to figure out how to do it, so for anyone else interested:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create an Authentication Sequence with the selected user profiles.&amp;nbsp; The Authentication Sequence object is then selectable on the SSL-VPN configuraiton.&amp;nbsp; This will attempt to authenticate the user against each profile in the selected order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I am still falling short of my goal.&amp;nbsp; I have now successfully permitted both user groups, using different authentication mechanisms, to access the same networks through the SSL-VPN.&amp;nbsp; But, I want to control their access uniquely.&amp;nbsp; Since they belong to the same SSL-VPN, get dropped into the same zone, etc, I don't see a way to limit their access.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not yet tried defining users in the security policy rules because one of the goups is for a large group of RADIUS users where I have not previously had to define each user manually in the system and I am hoping to avoid that.&amp;nbsp; Without defining them, it does not appear possible to select a UserProfile in the user column of the security policy.&amp;nbsp; And, I don't even know if it would work.&amp;nbsp; Does the username used to authenticate to the SSL-VPN get passed to the security policy for access verification based on user filtering in the policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the quick answer...any tips on further controlling access to the different groups of users?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 20:47:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47904#M35212</guid>
      <dc:creator>simonbrazil</dc:creator>
      <dc:date>2011-08-30T20:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup multiple SSL-VPN  tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47905#M35213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri;"&gt;Please look at the attached file and tell me, is this the setup your describing?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri;"&gt;If yes there is not a good reason for dropped packets originating from or destine for the broadcast domain local to your inside interface. Configuration would be the logical area to review and viewing the system logs may reveal any proxy id issues. If you are unable to resolve this problem in a timely manner on your own I would direct you to open a case with support so that can help you resolve your problem quickly and efficiently.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri;"&gt;Phil&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 18:07:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47905#M35213</guid>
      <dc:creator>pkruse</dc:creator>
      <dc:date>2011-08-31T18:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup multiple SSL-VPN  tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47906#M35214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Phil,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think this response was meant for this thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 18:41:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47906#M35214</guid>
      <dc:creator>simonbrazil</dc:creator>
      <dc:date>2011-08-31T18:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup multiple SSL-VPN  tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47907#M35215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For #4, have you tried setting up a loopback interface?&amp;nbsp; For example, if your ethernet1/1 interface has IP address 192.168.1.1/24, create an interface called loopback.2 with IP address 192.168.1.2/24 and configure the second SSL VPN to use interface loopback.2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 20:08:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-multiple-ssl-vpn-tunnels/m-p/47907#M35215</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2011-08-31T20:08:04Z</dc:date>
    </item>
  </channel>
</rss>

