<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to control global protect resources access by username in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170208#M53997</link>
    <description>&lt;P&gt;I think the best way to have a new zone for teh GP tunnel interface and for the user access&amp;nbsp;control you need user-id enabled with AD integration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Agentless (buildin):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-Agentless-User-ID/ta-p/62122" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-Agentless-User-ID/ta-p/62122&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Agent software installation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=pqNCSNJicKU" target="_blank"&gt;https://www.youtube.com/watch?v=pqNCSNJicKU&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 06 Aug 2017 11:57:37 GMT</pubDate>
    <dc:creator>TranceforLife</dc:creator>
    <dc:date>2017-08-06T11:57:37Z</dc:date>
    <item>
      <title>How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170201#M53996</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to control access to resources "for users connecting through global protect" by username level.&lt;/P&gt;&lt;P&gt;How to do this?&lt;/P&gt;&lt;P&gt;And which is better assign the tunnel interface to a new zone or to the trust-zone?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 06 Aug 2017 11:28:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170201#M53996</guid>
      <dc:creator>myasin</dc:creator>
      <dc:date>2017-08-06T11:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170208#M53997</link>
      <description>&lt;P&gt;I think the best way to have a new zone for teh GP tunnel interface and for the user access&amp;nbsp;control you need user-id enabled with AD integration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Agentless (buildin):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-Agentless-User-ID/ta-p/62122" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-Agentless-User-ID/ta-p/62122&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Agent software installation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=pqNCSNJicKU" target="_blank"&gt;https://www.youtube.com/watch?v=pqNCSNJicKU&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Aug 2017 11:57:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170208#M53997</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-08-06T11:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170213#M54000</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70047"&gt;@myasin&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no 'right' configuration in your situation. It depends on some more details:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the c2s vpn for internal or external employees?&lt;/LI&gt;&lt;LI&gt;Will the users use their private computers or corpotate ones?&lt;/LI&gt;&lt;LI&gt;If company computers will be used: are these devices completely under your &amp;nbsp;or your companys control (updates, antivirus, group policies - if AD integrated, ...)?&lt;/LI&gt;&lt;LI&gt;How much do you trust these devices which connect by vpn?&lt;/LI&gt;&lt;LI&gt;Do you have internet access for internal clients on the same firewall?&lt;/LI&gt;&lt;LI&gt;What do you use for vpn login: AD users or local firewallusers or may be users stored on a radius server?&lt;/LI&gt;&lt;LI&gt;Do you intend to use full or split tunneling?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In most cases it is the best way to use a separate zone for the tunnel interface...&lt;/P&gt;&lt;P&gt;User-ID also works with local firewallusers. You can simply enter the usernames into the security policy to restrict access to specific users and/or groups. But if you use AD users there are some more steps needed to get there (--&amp;gt;links posted by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Sun, 06 Aug 2017 16:02:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170213#M54000</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-06T16:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170274#M54012</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------------------------------------------------------&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the c2s vpn for internal or external employees? &lt;FONT color="#FF0000"&gt;(for external employees connecting from home)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Will the users use their private computers or corpotate ones? &lt;FONT color="#FF0000"&gt;(both)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;If company computers will be used: are these devices completely under your &amp;nbsp;or your companys control (updates, antivirus, group policies - if AD integrated, ...)? &lt;FONT color="#FF0000"&gt;(corporate devices under full control)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;How much do you trust these devices which connect by vpn?&lt;/LI&gt;&lt;LI&gt;Do you have internet access for internal clients on the same firewall? &lt;FONT color="#FF0000"&gt;(yes same firewall)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;What do you use for vpn login: AD users or local firewallusers or may be users stored on a radius server? &lt;FONT color="#FF0000"&gt;(both)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Do you intend to use full or split tunneling? &lt;FONT color="#FF0000"&gt;(split)&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;----------------------------------------------------------&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;So if I want to use the local user database, then all what I need is to enable user identification under the zone assigned for the tunnel interface, and then reference the users in the policies from untrust to the new zone, right?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;But what will be the case for the AD users scenario?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;And can I use both local and AD users simultanously for the VPN authentication?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Thanks&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 07:54:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170274#M54012</guid>
      <dc:creator>myasin</dc:creator>
      <dc:date>2017-08-07T07:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170275#M54013</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------------------------------------------------------&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the c2s vpn for internal or external employees?&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;(for external employees connecting from home)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Will the users use their private computers or corpotate ones?&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;(both)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;If company computers will be used: are these devices completely under your &amp;nbsp;or your companys control (updates, antivirus, group policies - if AD integrated, ...)?&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;(corporate devices under full control)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;How much do you trust these devices which connect by vpn?&lt;/LI&gt;&lt;LI&gt;Do you have internet access for internal clients on the same firewall?&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;(yes same firewall)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;What do you use for vpn login: AD users or local firewallusers or may be users stored on a radius server?&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;(both)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Do you intend to use full or split tunneling?&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;(split)&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;----------------------------------------------------------&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;So if I want to use the local user database, then all what I need is to enable user identification under the zone assigned for the tunnel interface, and then reference the users in the policies from untrust to the new zone, right?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;But what will be the case for the AD users scenario?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;And can I use both local and AD users simultanously for the VPN authentication?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Thanks&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 08:01:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170275#M54013</guid>
      <dc:creator>myasin</dc:creator>
      <dc:date>2017-08-07T08:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170277#M54014</link>
      <description>&lt;P&gt;can i just ask,,, What form of authentication are they using,,,&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 08:36:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170277#M54014</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-08-07T08:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170278#M54015</link>
      <description>&lt;P&gt;Its still under setup.&lt;/P&gt;&lt;P&gt;Will use local and AD auth for global protect connecting users.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 08:41:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170278#M54015</guid>
      <dc:creator>myasin</dc:creator>
      <dc:date>2017-08-07T08:41:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170282#M54016</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;So if I want to use the local user database, then all what I need is to enable user identification under the zone assigned for the tunnel interface, and then reference the users in the policies from untrust to the new zone, right?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;-----Correct&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;But what will be the case for the AD users scenario?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;-----/Device/user Identification/Group Mapping Settings.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;you will need an LDAP profile to connect to AD. In the settings you can&amp;nbsp;select&amp;nbsp;particular groups and then&amp;nbsp;add these (or individual users in the groups) to the policies.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;And can I use both local and AD users simultanously for the VPN authentication?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------ I prefer individual Portals/Gateways for different auths but if this is not practicle then you can use.......&lt;/P&gt;&lt;P&gt;/Device/Authentication Sequence.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it will try&amp;nbsp; all auth requests&amp;nbsp;from top to bottom until it finds a match.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 09:03:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170282#M54016</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-08-07T09:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170290#M54019</link>
      <description>&lt;P&gt;For the authentication sequence, can we authenticate over both local and LDAP simultanously, or will be checked in sequence "like Local Checked only if LDAP wasnt reachable"?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 09:26:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170290#M54019</guid>
      <dc:creator>myasin</dc:creator>
      <dc:date>2017-08-07T09:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170299#M54021</link>
      <description>&lt;P&gt;It will be checked in sequence. And the profiles will be checked in order you configured it until the user is found.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in your case, local wil also checked if LDAP is available but the user wasn't in your AD&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 09:51:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170299#M54021</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-07T09:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to control global protect resources access by username</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170300#M54022</link>
      <description>&lt;P&gt;I can see that vsys_remo has answered if full but alreay typed my answer so will post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes you can use Authentication Sequence for multiple auths at the same time.&lt;/P&gt;&lt;P&gt;It was introduced to get around the issue of different auth options for the same portal/gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;unfortunately it doesn't include certificate auth (happy to be corrected)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if your sequence is as follows&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. LDAP&lt;/P&gt;&lt;P&gt;2. Local&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it will try 1.LDAP first. if 1.LDAP returns unreachable, unknown user, bad username or password or anything else that is not accepted it will then try 2.Local.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you will need to create "Authentication Profiles" for all of your authentication options and then add them in your preferred order to "Authentication Sequence".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 09:59:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-control-global-protect-resources-access-by-username/m-p/170300#M54022</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-08-07T09:59:14Z</dc:date>
    </item>
  </channel>
</rss>

