<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple GlobalProtect gateways on same firewall- ASA to Palo migration in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-globalprotect-gateways-on-same-firewall-asa-to-palo/m-p/84125#M43335</link>
    <description>&lt;P&gt;Hello there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am working on a migration- ASA to Palo. ASA has muliple remote access vpn's setup - all terminating on outside interface ip address. For example, a RA vpn for employees - authenticating against AD, another for contractors- user accounts created locally on ASA. The IP Pool is different in call instances.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, I want to create a like for like RA vpn setup on Palo. I understand I can use physical interface public ip address for my portal and 1st gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question: what about the second gateway? can it be created utilizing the same public ip address so that whether it's an employee or contractor- they all connect to the same public IP address- and depending on how they authenticate they get different access? I will need multiple gateways so as to define 1. first gateway- authenticate via AD, second via LOCAL accounts created on the firewall. Apologies, I am somewhat new to Palo Alto firewalls and this is my 1st projet.&lt;/P&gt;</description>
    <pubDate>Mon, 13 Jun 2016 01:51:01 GMT</pubDate>
    <dc:creator>Sushilc</dc:creator>
    <dc:date>2016-06-13T01:51:01Z</dc:date>
    <item>
      <title>Multiple GlobalProtect gateways on same firewall- ASA to Palo migration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-globalprotect-gateways-on-same-firewall-asa-to-palo/m-p/84125#M43335</link>
      <description>&lt;P&gt;Hello there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am working on a migration- ASA to Palo. ASA has muliple remote access vpn's setup - all terminating on outside interface ip address. For example, a RA vpn for employees - authenticating against AD, another for contractors- user accounts created locally on ASA. The IP Pool is different in call instances.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, I want to create a like for like RA vpn setup on Palo. I understand I can use physical interface public ip address for my portal and 1st gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question: what about the second gateway? can it be created utilizing the same public ip address so that whether it's an employee or contractor- they all connect to the same public IP address- and depending on how they authenticate they get different access? I will need multiple gateways so as to define 1. first gateway- authenticate via AD, second via LOCAL accounts created on the firewall. Apologies, I am somewhat new to Palo Alto firewalls and this is my 1st projet.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2016 01:51:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-globalprotect-gateways-on-same-firewall-asa-to-palo/m-p/84125#M43335</guid>
      <dc:creator>Sushilc</dc:creator>
      <dc:date>2016-06-13T01:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple GlobalProtect gateways on same firewall- ASA to Palo migration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-globalprotect-gateways-on-same-firewall-asa-to-palo/m-p/84556#M43351</link>
      <description>&lt;P&gt;From the above description i understand that you only want to use multiple gateway so that you can have different authentication profile for different users&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If &amp;nbsp;you have used one ip adderss as your gateway you &amp;nbsp;will not be able to call the same ip address again to create a gateway again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;# One solution for your requirement is to use Authentication Sequence.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;# Call multiple auth profile in authentication sequence and call this auth sequen under your gateway( in place of auth profile )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;some details for auth sequence&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A target="_blank" name="2189552"&gt;&lt;/A&gt;In some environments, user accounts reside in multiple directories (for example, local database, LDAP, and RADIUS). An authentication sequence is a set of authentication profiles that the Palo Alto Networks device tries to use for authenticating users when they log in. The device tries the profiles sequentially from the top of the list to the bottom—applying the authentication, Kerberos single sign-on, allows list, and account lockout values for each—until one profile successfully authenticates the user. The device only denies access if all profiles in the sequence fail to authenticate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this may fulfil you requirements&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank You&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2016 11:37:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-globalprotect-gateways-on-same-firewall-asa-to-palo/m-p/84556#M43351</guid>
      <dc:creator>tsrivastav</dc:creator>
      <dc:date>2016-06-13T11:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple GlobalProtect gateways on same firewall- ASA to Palo migration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-globalprotect-gateways-on-same-firewall-asa-to-palo/m-p/84736#M43354</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think the best way to solve this problem would be to have multiple client configurations but only use 1 portal and 1 gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have grabbed a few screenshots of a simple configuration for you to take a look at below, you can control access based on users &amp;amp; groups in your policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Portal Configuration" style="width: 799px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4404i835A095992E8B497/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="gp portal config.png" alt="gp portal config.png" /&gt;&lt;/span&gt;﻿&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gateway Configuration" style="width: 798px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4405iA7CC81DE5A1A4C9F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="gp gateway config.png" alt="gp gateway config.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;
&lt;P&gt;hope this helps,&lt;/P&gt;
&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2016 14:41:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-globalprotect-gateways-on-same-firewall-asa-to-palo/m-p/84736#M43354</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2016-06-13T14:41:55Z</dc:date>
    </item>
  </channel>
</rss>

