<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Create VPN Profile or Group for a vendor to access specific internal server in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229542#M65990</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/96571"&gt;@colesch&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Correct, you just want to add another Portal configuration. As long as everything uses the same gateway this avoids additional licensing as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;mentioned.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally I recommend running everything through the VPN when connected simply so you can tell what the user is actually doing; did they just download a file to their local desktop and then upload it to Dropbox, is that an allowed action? It simply adds a little bit of extra security.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When setting up Vendor access I would definately limit there ability to only the resources they actually need to access. I would also ensure that they are granted there own seperate IP Pool and disallow that IP range from accessing any sensitive resources at all. Your vendor probably doesn't need access to your File Servers and stuff like that; so I block that all with an overarching rule just so I know it'll never have access and I can record if they try.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Sep 2018 13:33:40 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-09-05T13:33:40Z</dc:date>
    <item>
      <title>Create VPN Profile or Group for a vendor to access specific internal server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229447#M65965</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We snagged a PA820 to replace an old ASA 5510.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I have everything set and I am almost ready to cut over to the new PA firewall, with one exception: I am drawing a blank on the best way to setup VPN access for a support vendor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With our current Cisco solution, the vendor starts up Cisco AnyConnect, and selects a group from a drop-down menu.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By selecting this group, it tells the ASA to authenticate the user against a local database, rather than our Active DIrectory.&amp;nbsp; Additionally, we control their access, and narrow them down to 2 servers only.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I am currently doing instead is using an authentication sequence that tries the localDb profile first, and then if no match is found, it moves on to the RADIUS auth profile. &amp;nbsp; I am concerned this will cause a login delay for my regular network users while the firewall checks the local db for a match.&amp;nbsp; Is this the only way I can do this?&amp;nbsp; Plus, how can I then change the available routes/hosts the local user can connect to?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 20:43:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229447#M65965</guid>
      <dc:creator>colesch</dc:creator>
      <dc:date>2018-09-04T20:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: Create VPN Profile or Group for a vendor to access specific internal server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229534#M65985</link>
      <description>&lt;P&gt;we used a second portal for our 3rd party support but you may not have this option, although some favour the loopback as a second option.&lt;/P&gt;&lt;P&gt;both portals could point to same gateway to save extra licenses...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if it works as is then I would set Radius&amp;nbsp;to first in auth order and local DB second.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;assuming the largest proportion of users are on Radius.... if not then reverse the order.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so your support vendor will be tested against Radius but this will happen in a flash...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;select "Enable user Identification" on your VPN zone for manipulating user policies.&lt;/P&gt;&lt;P&gt;if you need to be more selective with routing then add gateway agent configs to suit users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would not allow custom access routes (split tunneling) but it's your network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 11:36:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229534#M65985</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-09-05T11:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: Create VPN Profile or Group for a vendor to access specific internal server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229540#M65989</link>
      <description>&lt;P&gt;Hi MickBall,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you say a second portal, are you referring to a completely separate device?&amp;nbsp; Or, just adding another portal configuration under "Portals" on the firewall?&amp;nbsp; We are using a single PA820 so it is both the portal device and the gateway. Additionally, you say that you do not recommend using split tunneling, is that because GlobalProtect cannot filter end user web traffic?&amp;nbsp; I was thinking about routing all traffic through the tunnel so that we could continue to filter/monitor web activity, but I was shutdown from "higher up".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You had mentioned enabling user identification for the VPN zone...my thoughts exactly...I was going to set a security policy to only allow that one user to "See" the two servers I need them to see.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your time, it is appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 13:26:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229540#M65989</guid>
      <dc:creator>colesch</dc:creator>
      <dc:date>2018-09-05T13:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: Create VPN Profile or Group for a vendor to access specific internal server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229542#M65990</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/96571"&gt;@colesch&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Correct, you just want to add another Portal configuration. As long as everything uses the same gateway this avoids additional licensing as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;mentioned.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally I recommend running everything through the VPN when connected simply so you can tell what the user is actually doing; did they just download a file to their local desktop and then upload it to Dropbox, is that an allowed action? It simply adds a little bit of extra security.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When setting up Vendor access I would definately limit there ability to only the resources they actually need to access. I would also ensure that they are granted there own seperate IP Pool and disallow that IP range from accessing any sensitive resources at all. Your vendor probably doesn't need access to your File Servers and stuff like that; so I block that all with an overarching rule just so I know it'll never have access and I can record if they try.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 13:33:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229542#M65990</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-05T13:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: Create VPN Profile or Group for a vendor to access specific internal server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229543#M65991</link>
      <description>&lt;P&gt;yes, network\portals\add&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this will require a second ip address on the external interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you do not have spare ip addresses then others have used a loopback address so you would have one portal address&amp;nbsp;:-&lt;/P&gt;&lt;P&gt;portal.domain.com&amp;nbsp;&amp;nbsp; for your users, and another one :- portal.domain.com:4433&amp;nbsp; for support peeps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes yesy yes force all traffic through VPN, allow from vpn zone to trusted... just the 2 servers.&lt;/P&gt;&lt;P&gt;from vpn zone to internet.. just add common sense filtering to cover your own ar*e.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 13:35:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229543#M65991</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-09-05T13:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: Create VPN Profile or Group for a vendor to access specific internal server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229548#M65996</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if I were to use the loopback option, I would have to craete a NAT translation to translate the WAN IP:&amp;lt;port#&amp;gt; to the loopback:&amp;lt;port#&amp;gt;, right? Or something along those lines?&amp;nbsp; I am sure tha tis in the manual somewhere... I think I got this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt; and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;MickB.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 13:43:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229548#M65996</guid>
      <dc:creator>colesch</dc:creator>
      <dc:date>2018-09-05T13:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: Create VPN Profile or Group for a vendor to access specific internal server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229552#M66000</link>
      <description>&lt;P&gt;ok no problem...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes you've got it.&amp;nbsp; there are loads of stuff on loopback on the interweb...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;seemed a bit clunky for me..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Laters...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 13:47:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229552#M66000</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-09-05T13:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: Create VPN Profile or Group for a vendor to access specific internal server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229553#M66001</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;Ha, yea I was looking at the loopback previously; definitely convoluted. I do have other WAN IPs I can assign, I think I will try that route (no pun intended) first.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Later.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 13:49:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229553#M66001</guid>
      <dc:creator>colesch</dc:creator>
      <dc:date>2018-09-05T13:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: Create VPN Profile or Group for a vendor to access specific internal server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229554#M66002</link>
      <description>&lt;P&gt;Good choice i say...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;easier for diags as well, if anything ever goes wrong you will neeed to go back and re invent the wheel to remember how you set it up in the first place...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;perhaps thats an age thing...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you could also consider cookie authentication overide from the new portal to the shared gateway, this will save having an authentication order with your other users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 14:01:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/create-vpn-profile-or-group-for-a-vendor-to-access-specific/m-p/229554#M66002</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-09-05T14:01:20Z</dc:date>
    </item>
  </channel>
</rss>

