<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VSYS with Shared Gateway and Existing Global Protect in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vsys-with-shared-gateway-and-existing-global-protect/m-p/197658#M58754</link>
    <description>&lt;P&gt;Bumping for any help.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jan 2018 17:47:12 GMT</pubDate>
    <dc:creator>jeff6strings</dc:creator>
    <dc:date>2018-01-30T17:47:12Z</dc:date>
    <item>
      <title>VSYS with Shared Gateway and Existing Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vsys-with-shared-gateway-and-existing-global-protect/m-p/197105#M58618</link>
      <description>&lt;P&gt;We have a 3050 with one VSYS and is connected to an ISP with one IP address as we also use this VSYS for user VPN (Global Protect). All is working fine but we will be adding another VSYS to segregate another department’s Internet traffic. I would like both VSYS to share the same Internet and IP but I’m concerned if I read correctly about our existing Global Protect VPN configuration and the Shared Gateway being a problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate any help or insight.&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2018 15:13:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vsys-with-shared-gateway-and-existing-global-protect/m-p/197105#M58618</guid>
      <dc:creator>jeff6strings</dc:creator>
      <dc:date>2018-01-26T15:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: VSYS with Shared Gateway and Existing Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vsys-with-shared-gateway-and-existing-global-protect/m-p/197658#M58754</link>
      <description>&lt;P&gt;Bumping for any help.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2018 17:47:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vsys-with-shared-gateway-and-existing-global-protect/m-p/197658#M58754</guid>
      <dc:creator>jeff6strings</dc:creator>
      <dc:date>2018-01-30T17:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: VSYS with Shared Gateway and Existing Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vsys-with-shared-gateway-and-existing-global-protect/m-p/197661#M58757</link>
      <description>&lt;P&gt;Jeff,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are correct that there can only be one VPN&amp;nbsp;Profile/Gateway per IP (I believe it is just the gateway side).&lt;/P&gt;&lt;P&gt;I am not an expert at making VSYS interact with eachother properly but from what you are describing (and having a 3050) it may make more sense to put the GP on its own VSYS and setup multiple profiles within both the GP Profile &amp;amp; Gateway to force different departments to different traffic (we use Group Policy for allowing VPN access).&amp;nbsp; The bottom line with GP is that you allow access to connect but it is the security rules that allow access to different components so using the same VPN but different AD groups with security rules and GP Profile/Gateway rules will allow you to limit both what IPs are displayed and what they are allowed to access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2018 18:05:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vsys-with-shared-gateway-and-existing-global-protect/m-p/197661#M58757</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-01-30T18:05:43Z</dc:date>
    </item>
  </channel>
</rss>

