<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Limting Globalprotect client access via IP address in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/limting-globalprotect-client-access-via-ip-address/m-p/150467#M49958</link>
    <description>&lt;P&gt;Hi Craig,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No such option exists yet. The only thing (and is broader than what's asked) would be to allow select few IPs in the Security policies but it wouldn't have a user&amp;lt;--&amp;gt;IP pairing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anurag&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 30 Mar 2017 20:02:20 GMT</pubDate>
    <dc:creator>ansharma</dc:creator>
    <dc:date>2017-03-30T20:02:20Z</dc:date>
    <item>
      <title>Limting Globalprotect client access via IP address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/limting-globalprotect-client-access-via-ip-address/m-p/150398#M49944</link>
      <description>&lt;P&gt;Is there a way to allow specific GlobalProtect users to only connect from specific public IP addresses? &amp;nbsp;For example say I only wanted to allow user1 to connect from IP address 1.1.1.1, and if user1 connects from any other public IP address, or&amp;nbsp;if user2 is trying to access from 1.1.1.1, to have that access be denied?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 13:54:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/limting-globalprotect-client-access-via-ip-address/m-p/150398#M49944</guid>
      <dc:creator>craig.brooker</dc:creator>
      <dc:date>2017-03-30T13:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: Limting Globalprotect client access via IP address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/limting-globalprotect-client-access-via-ip-address/m-p/150466#M49957</link>
      <description>&lt;P&gt;I can't really think of a clean way of doing this. The only way that you could limit the public IP to my knowledge is limit who can connected to a specified gateway and then assign the required public IP an access policy that would allow only them to get to the gateway IP. This of course would mean that you would have to have a gateway for any user that you wished to limit in this way.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 20:00:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/limting-globalprotect-client-access-via-ip-address/m-p/150466#M49957</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-03-30T20:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: Limting Globalprotect client access via IP address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/limting-globalprotect-client-access-via-ip-address/m-p/150467#M49958</link>
      <description>&lt;P&gt;Hi Craig,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No such option exists yet. The only thing (and is broader than what's asked) would be to allow select few IPs in the Security policies but it wouldn't have a user&amp;lt;--&amp;gt;IP pairing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anurag&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2017 20:02:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/limting-globalprotect-client-access-via-ip-address/m-p/150467#M49958</guid>
      <dc:creator>ansharma</dc:creator>
      <dc:date>2017-03-30T20:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: Limting Globalprotect client access via IP address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/limting-globalprotect-client-access-via-ip-address/m-p/158559#M51882</link>
      <description>&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;and also &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/51040"&gt;@ansharma&lt;/a&gt;&amp;nbsp;there's no clean way to it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in addition to the solition of &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;, there is may be another (really) unconventional way: Captive Portal. You could allow access to the global Protect Gateway only for your specific user, which will be presented the captive portal login form when he tries to connect with a browser. It also depends on the fact if you have the portal on the same device or on another (it would also work on different devices with user-id-redistribution) because this is probably the only valid website where you can put the captive portal in front of (as I assume you only want to limit the GP access and not access to other ressources which are may be in your DMZ)&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2017 11:59:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/limting-globalprotect-client-access-via-ip-address/m-p/158559#M51882</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-28T11:59:17Z</dc:date>
    </item>
  </channel>
</rss>

