<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PAN-OS and Global Protect software in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65666#M39160</link>
    <description>&lt;P&gt;Thanks, V., but PA tech support didn't sound as convincing as you ;^).&lt;/P&gt;&lt;P&gt;I'll consider... perhaps there are others seeing this who share your experience? (holla!)&lt;/P&gt;</description>
    <pubDate>Thu, 08 Oct 2015 19:05:34 GMT</pubDate>
    <dc:creator>VSU_ITSEC</dc:creator>
    <dc:date>2015-10-08T19:05:34Z</dc:date>
    <item>
      <title>PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65614#M39149</link>
      <description>&lt;P&gt;I plan to update to PAN-OS 6.1.6 and GP 2.3.1.&lt;/P&gt;&lt;P&gt;Currently at 6.1.0, and 2.1.1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions or issues?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;//moe&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2015 18:50:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65614#M39149</guid>
      <dc:creator>VSU_ITSEC</dc:creator>
      <dc:date>2015-10-07T18:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65616#M39150</link>
      <description>&lt;P&gt;There is a change in the default behaviour in the global protect from 2.3.0&lt;BR /&gt;&lt;BR /&gt;In Global protect 2.2 and previous version if the Trust CA is configured in the Portal then only the agent will validate the gateway certificate.&lt;BR /&gt;&lt;BR /&gt;From agent 2.3 the agent will always check the validity of the gateway server certificate and if the agent cannot validate the certificate, it will not connect to the GlobalProtect gateway.&lt;BR /&gt;&lt;BR /&gt;Validate means whether the certificate is signed by a CA which is trusted by that machine.&lt;BR /&gt;&lt;BR /&gt;Other thing is If the CN of certificate have IP address then it should match to the IP address of the interface used in the portal. If the CN is domain name then the IP it resolves to should match to the IP address of the interface used in portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When defining the gateways (External/Internal) under the portal configuraiton. If CN have FQDN&amp;nbsp; then specify the FQDN, If CN have IP address then specify IP address.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2015 19:44:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65616#M39150</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-10-07T19:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65624#M39153</link>
      <description>&lt;P&gt;Thank you for that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How doe sthis apply to a wildcard cert?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2015 21:27:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65624#M39153</guid>
      <dc:creator>VSU_ITSEC</dc:creator>
      <dc:date>2015-10-07T21:27:52Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65641#M39155</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you really need GP, it can be interesting for you to upgrade to V7. In this release, licence had been simplify.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According the VY RN: "You can now use GlobalProtect to provide a secure, remote access or virtual private network (VPN) solution via single or multiple external gateways, without any GlobalProtect licenses. The portal license, which was required to enable this functionality, has been deprecated. However, advanced features including Host Information Profile (HIP) checks and support for the GlobalProtect mobile app for iOS and Android still require a gateway subscription. To take advantage of the new license structure, you need to upgrade only the device running the GlobalProtect portal to PAN-OS 7.0 or later."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are in 7.0.2 and everything works well &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 07:46:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65641#M39155</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2015-10-08T07:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65645#M39156</link>
      <description>&lt;P&gt;If you are using a certifiacte signed by a trusted CA so you don't have to worry about it.&lt;BR /&gt;&lt;BR /&gt;Just take care of the following part&lt;BR /&gt;&lt;BR /&gt;If the CN of certificate have IP address then it should match to the IP address of the interface used in the portal. If the CN is domain name then the IP it resolves to should match to the IP address of the interface used in portal.&lt;BR /&gt;&lt;BR /&gt;When defining the gateways (External/Internal) under the portal configuraiton. If CN have FQDN&amp;nbsp; then specify the FQDN, If CN have IP address then specify IP address.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 09:11:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65645#M39156</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-10-08T09:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65666#M39160</link>
      <description>&lt;P&gt;Thanks, V., but PA tech support didn't sound as convincing as you ;^).&lt;/P&gt;&lt;P&gt;I'll consider... perhaps there are others seeing this who share your experience? (holla!)&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 19:05:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65666#M39160</guid>
      <dc:creator>VSU_ITSEC</dc:creator>
      <dc:date>2015-10-08T19:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65667#M39161</link>
      <description>&lt;P&gt;Forgive my limited knowlegde of certs, Pakumar.&amp;nbsp; Are you saying that the GP config on the remote device should match what is on the cert?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 19:10:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65667#M39161</guid>
      <dc:creator>VSU_ITSEC</dc:creator>
      <dc:date>2015-10-08T19:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65670#M39162</link>
      <description>&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/595i32728099168FD757/image-size/original?v=mpbl-1&amp;amp;px=-1" alt="Certificate.png" title="Certificate.png" border="0" /&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/596i4CE4466038B35EA0/image-size/original?v=mpbl-1&amp;amp;px=-1" alt="Gateway_Config.png" title="Gateway_Config.png" border="0" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check the highlihted area the CN&amp;nbsp; name is a IP&amp;nbsp; address so in the portal config I have&amp;nbsp; sepecified IP address for gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If thhe CN is vpn.abc.com then I have to specify vpn.abc.com in the portal config for gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and the nslookup for vpn.abc.com should map to the IP address that you are using for&amp;nbsp; portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 19:19:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65670#M39162</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-10-08T19:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65671#M39163</link>
      <description>&lt;P&gt;crystal clear! thanks....&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 20:48:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/65671#M39163</guid>
      <dc:creator>VSU_ITSEC</dc:creator>
      <dc:date>2015-10-08T20:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/66446#M39207</link>
      <description>&lt;P&gt;A note to all - the upgrade to 6.1.6 only worked on one of my 2 PA-5020s.&amp;nbsp; The dataplane kept crashing on my primary (Dataplane is down: too many dataplane processes exited).&amp;nbsp; has anyone experienced similar?&amp;nbsp; Rebooting with the interfaces disconnected (all except managment and HA) did not solve.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 20:08:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/66446#M39207</guid>
      <dc:creator>VSU_ITSEC</dc:creator>
      <dc:date>2015-10-12T20:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/66488#M39217</link>
      <description>&lt;P&gt;Try to upgrade to 6.1.7 where multiple dataplane restart issues were solved&lt;/P&gt;
&lt;P&gt;Check the release notes for the following IDs and try to match them with your enviroment,&lt;/P&gt;
&lt;P&gt;80720&lt;/P&gt;
&lt;P&gt;82370&lt;/P&gt;
&lt;P&gt;80251&lt;/P&gt;
&lt;P&gt;79719&lt;/P&gt;
&lt;P&gt;76875&lt;/P&gt;
&lt;P&gt;66681&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that doesn't solve your issue, opean a TAC case,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Gerardo.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 20:17:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/66488#M39217</guid>
      <dc:creator>glastra1</dc:creator>
      <dc:date>2015-10-13T20:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/453319#M101344</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am facing the same issue, I have global protect installed, the version is 5.2.8-23, on the gateway i am using FQDN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when i try to connect GP i am getting the error "the certificate is not signed by a trusted certificate authority". if i install the root certificate on the local machine, it works fine. but I am not doing any certificate based authentication. Could you please tell me is it mandatory to install the root certificate on all the end machines to connect global protect.?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 06:01:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/453319#M101344</guid>
      <dc:creator>CHANDRASHEKHAR.BRAMAPRAKASH</dc:creator>
      <dc:date>2021-12-15T06:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS and Global Protect software</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/453371#M101351</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/198045"&gt;@CHANDRASHEKHAR.BRAMAPRAKASH&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you configure GlobalProtect Portal and Gateway, you need to assign SSL certificate that firewall will provide as server certificate when connecting to GP. It looks like you are using certificate that is self-signed or signed by internal PKI, that is not trusted by default. You have few options:&lt;/P&gt;
&lt;P&gt;- Request SSL server certificate from public Certificate Authority.&lt;/P&gt;
&lt;P&gt;- If you are using self-signed server certificate you must install the root CA (that was used to generate the server cert) to each machined that will connect to GP&lt;/P&gt;
&lt;P&gt;- Strongly against this option, but if you still want to use self-signed certificate, without installing the root CA - there is an option to ignore the invalid SSL certificate and continue with vpn connection. This is under GP portal -&amp;gt; Agent Config -&amp;gt; App&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Astardzhiev_0-1639585190416.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38162iAE0953A4933014DF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Astardzhiev_0-1639585190416.png" alt="Astardzhiev_0-1639585190416.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I would recommend to use this option only in test/PoC environment, because it will completely&amp;nbsp; bypass certificate validation, which is only protection agains man-in-the-middle attack&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 16:22:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-and-global-protect-software/m-p/453371#M101351</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-12-15T16:22:12Z</dc:date>
    </item>
  </channel>
</rss>

