<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to bound an ACL to GP VPN client in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/93130#M43771</link>
    <description>&lt;P&gt;Well, it is kind of hard to grasp to the logic that i need to create a deny rule to everything else in order to limit access to certain resources, as a separate policy. Anyhow, thanks for your suggestion, i managed to get it going by following your suggestion, moving two VPN policies (allow, deny) above a common policy, and applying it to contractor's AD username.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Jun 2016 16:40:48 GMT</pubDate>
    <dc:creator>Kalemegdan</dc:creator>
    <dc:date>2016-06-28T16:40:48Z</dc:date>
    <item>
      <title>How to bound an ACL to GP VPN client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/92728#M43727</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;i have a need to provide a contractor with VPN access to certain resource on internal network (let’s call them 10.20.1.0/24)&lt;BR /&gt;&lt;BR /&gt;I have a working VPN GP/Portal and contractor can connect to VPN with no issue. But contractor is allowed to access all internal resources not just 10.20.1.0/24&lt;BR /&gt;&lt;BR /&gt;I have setup a GP policy (allow access from VPN zone to internal zone, destination 10.20.1.0/24 only), put that policy above generic VPN (allow all) and when user logs in, this policy is not hitting; instead default policy (which will allow al AD users to login) is utilized.&lt;BR /&gt;&lt;BR /&gt;We are using MFA for authentication, AD has user contractor created, all looks fine. For testing i created another GP portal with local authentication, put user into local group and he is able to conenct but still not prevented from accessing internal resources.&lt;BR /&gt;&lt;BR /&gt;The question is - how can i bound a ACL into VPN access policy? I know in other vendors it was mater of assigning ACL to VPN profile that can get pushed down to the user when they connect to VPN.&lt;BR /&gt;&lt;BR /&gt;Apprecaite valuable inputs.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 22:25:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/92728#M43727</guid>
      <dc:creator>Kalemegdan</dc:creator>
      <dc:date>2016-06-27T22:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to bound an ACL to GP VPN client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/92930#M43739</link>
      <description>&lt;P&gt;Usually companies have 2 AD groups.&lt;/P&gt;&lt;P&gt;VPN Users&lt;/P&gt;&lt;P&gt;VPN Users third party&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Policy that permits traffic from Globalprotect zone to LAN has only VPN Users group attached.&lt;/P&gt;&lt;P&gt;VPN Users third party has no default access to lan (ok maybe towards domain controller to auth and resolve dns).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And then you add specific sec policies to every contractor who needsd access to your network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In your case it might be temporary step to create top rule to allow from this user to access resource you need and second rule below it to block anything else from that user (don't forget to put his username to user field).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have 0.0.0.0/0 route towards your network then you probably want to allow contractor to access wan zone aswell not to cut his internet &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2016 06:24:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/92930#M43739</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2016-06-28T06:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to bound an ACL to GP VPN client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/93065#M43767</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4558i730897B1CD7F8480/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="VPN.jpg" alt="VPN.jpg" /&gt;&lt;/span&gt;﻿I do have a vpn access rule, kind of a generic, that covers all users (COMMON-SSL-VPN). Unfortunatelly contractor can login and can access all internal resources and rule actually does not hit... I even tried the rule using locally cretaed user (changed authentication accordingly) with the same results - contractor can access all resources.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2016 14:59:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/93065#M43767</guid>
      <dc:creator>Kalemegdan</dc:creator>
      <dc:date>2016-06-28T14:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to bound an ACL to GP VPN client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/93129#M43770</link>
      <description>&lt;P&gt;Those destinations that you covered with black box.&lt;/P&gt;&lt;P&gt;Are they address objects?&lt;/P&gt;&lt;P&gt;They have 0 at the end so I assume they have some subnetmask also set?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2016 16:39:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/93129#M43770</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2016-06-28T16:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to bound an ACL to GP VPN client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/93130#M43771</link>
      <description>&lt;P&gt;Well, it is kind of hard to grasp to the logic that i need to create a deny rule to everything else in order to limit access to certain resources, as a separate policy. Anyhow, thanks for your suggestion, i managed to get it going by following your suggestion, moving two VPN policies (allow, deny) above a common policy, and applying it to contractor's AD username.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2016 16:40:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-bound-an-acl-to-gp-vpn-client/m-p/93130#M43771</guid>
      <dc:creator>Kalemegdan</dc:creator>
      <dc:date>2016-06-28T16:40:48Z</dc:date>
    </item>
  </channel>
</rss>

