<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global protect client to connect using a IPSec tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212262#M61916</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5414"&gt;@Harshit&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;If I didn't already mention i but I think BPry already knows this but I have only two PA's and they are in an HA pair&lt;/P&gt;</description>
    <pubDate>Mon, 30 Apr 2018 14:08:06 GMT</pubDate>
    <dc:creator>jdprovine</dc:creator>
    <dc:date>2018-04-30T14:08:06Z</dc:date>
    <item>
      <title>Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212019#M61820</link>
      <description>&lt;P&gt;I want to create a IPSec tunnel and use the global protect client to access via VPN our PCI internet network can that be done?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 12:37:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212019#M61820</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T12:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212035#M61823</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So you are creating a IPSec Tunnel on the Palo Alto that allows access to a PCI network; and then you want to allow your GlobalProtect clients (or a subset of clients) access to these resources?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Generally I caution people to be very cautious when looking to enable remote access on a PCI network, and to guarantee&amp;nbsp;that you have actually read through and verified you meet all requirements. One such example would be that you need to have MFA on this if you are accessing a PCI network to maintain compliance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 13:22:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212035#M61823</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-27T13:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212036#M61824</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;With already have this process in place using a ASA 5510, (less then 10 people have this access), but the ASA 5510 going end of support so we need to replace it. Currently the use the native client on their PC to connect to the ASA 5510 and go through a IPSec tunnel to access the PCI network.&amp;nbsp; I tried to use the globalprotect portal but it did not offer IKE2.&amp;nbsp; I want to use GP client 4.1 with multiple portal options to connect to the&amp;nbsp; PA and go through a IPSec tunnel to the PCI network and yes we NAT to the PCI network.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 13:27:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212036#M61824</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T13:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212042#M61828</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Yes we already do MFA to access the PCI network&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 13:49:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212042#M61828</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T13:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212072#M61843</link>
      <description>&lt;P&gt;I guess I am not sure the correct way to go about doing this or if the GP client can even be used in this way. If anyone is doing something similar let me know&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 15:11:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212072#M61843</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T15:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212075#M61846</link>
      <description>&lt;P&gt;you probably do not need IKEv2 for global protect,&lt;/P&gt;&lt;P&gt;Scenario:1&lt;/P&gt;&lt;P&gt;you already have a anyconnect client, coming in on an ASA, then it routes to a PaloAlto firewall that has a VPN tunnel and the traffic flows through it, If true, you should be able to configure Paloalto to use SSL and then reroute the traffic through VPN (B2B) tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scenario: 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;you already have a anyconnect client, coming in on an ASA, then it routes to a&amp;nbsp;ASA firewall that has a VPN tunnel (U-Turning the traffic)&amp;nbsp; and the traffic flows through it, If true, you should still be able to configure Paloalto to use SSL and then reroute the traffic to the ASAand eventually&amp;nbsp;VPN (B2B) tunnel, you would just need to make sure routing is set properly on both firewalls, my suggestion would be to use seperate set of pool ip addresses for both.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If there is another scneraio, let me know.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;~HTH&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 15:36:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212075#M61846</guid>
      <dc:creator>Harshit</dc:creator>
      <dc:date>2018-04-27T15:36:55Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212088#M61847</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5414"&gt;@Harshit&lt;/a&gt;&lt;/P&gt;&lt;P&gt;We do not use annyconnect, mostly they currently use the native client on their PC. Yes we are planning on putting an ssl cert on the new tunnel.&amp;nbsp; The plan is to replace the ASA and only use the PA as a VPN IPSec tunnel into the PCI network, I am just trying to figure out what I need to configure to make that happen&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 15:53:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212088#M61847</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T15:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212092#M61849</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So I think some of the terminology is getting crossed here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Couple questions.&lt;/P&gt;&lt;P&gt;1) Do you currently connect to the PCI network via an IPSec Tunnel; by that I mean does the ASA form a tunnel to a payment processor?&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Do you wish to keep the ability to use the internal VPN client or force them to use the GlobalProtect Agent?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How you would likely want to set this up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) You'll need to form the tunnel between the PA and the payment processor, essentially just recreating the tunnel on the Palo Alto. I would generate a completely new zone for this and call it something like 'PCI Network'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) You can either configure security policies that would allow the users who require PCI Network access and keep a single gateway, or you could create a new gateway for the PCI network and they would simply switch between the two.&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) Since this is touching PCI you need to ensure that GlobalProtect would be secured by MFA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ideally, and how I would personally recommend you configure this, is that the PCI network gets it's own VSYS on the firewall. This ensures that you don't have to really worry about misconfiguring something and accidently granting interzone communication that allows non-PCI compliant traffic access to your PCI network. It also makes PCI audits a bit easier to deal with since they don't have to look at your entire firewall configuration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 16:08:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212092#M61849</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-27T16:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212093#M61850</link>
      <description>&lt;P&gt;Ok, makes sense now,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To achieve this, i would put Global Protect and VPN tunnels in seperate zones, and then we can use virtual router in order to route the traffic from one zone to another, and use Security policy to restrict it to specific ip and port too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a nutshell you need:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) global protect&lt;/P&gt;&lt;P&gt;2) b2b tunnel to PCI&lt;/P&gt;&lt;P&gt;3) seperate zones for both mentioned above&lt;/P&gt;&lt;P&gt;4) security rules to allow traffic between these two zones.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you need help setting either of these i can provide you links to them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;~HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 16:10:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212093#M61850</guid>
      <dc:creator>Harshit</dc:creator>
      <dc:date>2018-04-27T16:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212111#M61863</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5414"&gt;@Harshit&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what is b2b tunnel?&lt;/P&gt;&lt;P&gt;Global protect client is what you are referring too&lt;/P&gt;&lt;P&gt;You mentioned I did not need IKE2 but our security guy wants us to use IKE2 that is why I was unable to use a global protect portal and have to look at using an IPSec tunnel instead&lt;/P&gt;&lt;P&gt;PCI&amp;nbsp; already has its own zone configured on the firewall&lt;/P&gt;&lt;P&gt;Yes I would be interested in seeing the links you are referring too&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 16:37:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212111#M61863</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T16:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212114#M61866</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;b2b tunnel is simply an industry term for business to business, in other words you are connecting your university to the PCI Processing network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does your security guy want you to utilize IKE2 for the actual PCI tunnel or for the clients connecting to the firewall? You really shouldn't be allowing X-Auth to even be used on this connection and you should be forcing anyone that needs remote PCI access to login through an actual GlobalProtect Agent.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 16:43:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212114#M61866</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-27T16:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212117#M61868</link>
      <description>&lt;P&gt;Sure,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;B2B , Business-to-Business tunnel , is just another name i use to mention VPN tunnel &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;you can configure VPN tunnel on IKEv2 and Use SSL for Global protect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for site to site&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/vpns/set-up-site-to-site-vpn" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/vpns/set-up-site-to-site-vpn&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for global protect:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/Basic-GlobalProtect-Configuration-with-User-logon/ta-p/136099" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/Basic-GlobalProtect-Configuration-with-User-logon/ta-p/136099&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 16:46:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212117#M61868</guid>
      <dc:creator>Harshit</dc:creator>
      <dc:date>2018-04-27T16:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212118#M61869</link>
      <description>&lt;P&gt;1) Do you currently connect to the PCI network via an IPSec Tunnel; by that I mean does the ASA form a tunnel to a payment processor?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not to the payment processor but for our users to access the PCI network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Do you wish to keep the ability to use the internal VPN client or force them to use the GlobalProtect Agent? -&amp;nbsp;&lt;/P&gt;&lt;P&gt;They have been using a native client and L2TP. The PA does not support L2TP so they will no longer be able to use the native client anymore so I have to provide them with a client that is compatible with the PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How you would likely want to set this up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) You'll need to form the tunnel between the PA and the payment processor, essentially just recreating the tunnel on the Palo Alto. I would generate a completely new zone for this and call it something like 'PCI Network'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Already have a zone on the PA for the PCI network&lt;/P&gt;&lt;P&gt;2) You can either configure security policies that would allow the users who require PCI Network access and keep a single gateway, or you could create a new gateway for the PCI network and they would simply switch between the two.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I plan on creating a new gateway - but my big issue is the IPSec tunnel configuration on the PA how to do it and if it will work with the GP client and if not what client will it work with&lt;/P&gt;&lt;P&gt;3) Since this is touching PCI you need to ensure that GlobalProtect would be secured by MFA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Yes we intend on continuing to use MFA, using radius&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 16:47:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212118#M61869</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T16:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212119#M61870</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does your security guy want you to utilize IKE2 for the actual PCI tunnel or for the clients connecting to the firewall?&amp;nbsp; good question if I know him he would want both if it can be done.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I agree absolutely we need to get rid of x-auth but its hard to get them all off the native client and the cisco client. Even the security guy uses his native client instead of the GP client on his MAC&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 16:50:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212119#M61870</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T16:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212126#M61874</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Okay so referencing the same number scheme as before.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Do you currently connect to the PCI network via an IPSec Tunnel; by that I mean does the ASA form a tunnel to a payment processor?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not to the payment processor but for our users to access the PCI network&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;So you don't have a tunnel to the processor and the PCI Network is simply a zone that you had the ASA located in.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Do you wish to keep the ability to use the internal VPN client or force them to use the GlobalProtect Agent? -&amp;nbsp;&lt;/P&gt;&lt;P&gt;They have been using a native client and L2TP. The PA does not support L2TP so they will no longer be able to use the native client anymore so I have to provide them with a client that is compatible with the PA.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;This is good, you don't want X-Auth on at all and you should be forcing people onto the agent.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How you would likely want to set this up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) You'll need to form the tunnel between the PA and the payment processor, essentially just recreating the tunnel on the Palo Alto. I would generate a completely new zone for this and call it something like 'PCI Network'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Already have a zone on the PA for the PCI network&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Good&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) You can either configure security policies that would allow the users who require PCI Network access and keep a single gateway, or you could create a new gateway for the PCI network and they would simply switch between the two.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I plan on creating a new gateway - but my big issue is the IPSec tunnel configuration on the PA how to do it and if it will work with the GP client and if not what client will it work with&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;If the PCI Network already exists on the Palo Alto and you don't need to make a connection to a payment processing network don't worry about re-creating the tunnel here. If this tunnel truly is to just allow users to connect force them to the GlobalProtect agent.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) Since this is touching PCI you need to ensure that GlobalProtect would be secured by MFA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Yes we intend on continuing to use MFA, using radius&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Good&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 17:05:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212126#M61874</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-27T17:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212127#M61875</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Does your security guy want you to utilize IKE2 for the actual PCI tunnel or for the clients connecting to the firewall?&amp;nbsp; good question if I know him he would want both if it can be done.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;Your security guy should be happier about utilizing an SSL VPN connection over an IPSec tunnel.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I agree absolutely we need to get rid of x-auth but its hard to get them all off the native client and the cisco client. Even the security guy uses his native client instead of the GP client on his MAC&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;This simply needs to get disabled. With the Linux client being available there is no reason to continue to utilize X-Auth with GP at all. The security guy should be making this push more than anyone else.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 17:07:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212127#M61875</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-27T17:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212141#M61880</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Great info.&lt;/P&gt;&lt;P&gt;My plan is to make them use the GP client and that is why I was so glad to see version 4.1 come out but I know there are more&amp;nbsp;types of VPN tunnels that can be created on the PA , IPSec&amp;nbsp; and global protect. I can't use the global protect VPN because there is no IKE2 but quite honestly&amp;nbsp; I don't know how to set up any other kind on the PA. So I need to set up an IPSec VPN tunnel that works with version 4.1 so these same PCI users can VPN into the PCI network and VPN from home into the network. Hope that makes sense&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 18:20:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212141#M61880</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T18:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212143#M61881</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Right but you are addressing that by simply forcing them to use the GlobalProtect Agent and turning off X-Auth and leaving the 'Enable IPSec' checkbox along so that IPSec isn't used. This forces the agent to utilize the more secure SSL VPN process.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 18:29:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212143#M61881</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-27T18:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212150#M61886</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;wish it were that easy but I am&amp;nbsp; trying to build a new tunnel to replace the ASA tunnel, not sure what type of tunnel to build&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 19:02:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212150#M61886</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-27T19:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect client to connect using a IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212155#M61890</link>
      <description>&lt;P&gt;B2B can be built using IKEv2, and i am assuming that is what your security guy wants to do too &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;you can inform him about the GP's SSL and i am sure he will agree.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;~HTH&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 19:28:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-client-to-connect-using-a-ipsec-tunnel/m-p/212155#M61890</guid>
      <dc:creator>Harshit</dc:creator>
      <dc:date>2018-04-27T19:28:49Z</dc:date>
    </item>
  </channel>
</rss>

