<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global protect with loopback ip address and port number in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/238822#M68401</link>
    <description>Is there a guide how to configure it with groups?</description>
    <pubDate>Wed, 07 Nov 2018 07:05:15 GMT</pubDate>
    <dc:creator>Radmin_85</dc:creator>
    <dc:date>2018-11-07T07:05:15Z</dc:date>
    <item>
      <title>Global protect with loopback ip address and port number</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/238629#M68348</link>
      <description>&lt;P&gt;Hello all&lt;/P&gt;&lt;P&gt;We have one public IP address and two groups of users who must connect to Head Office but get different policies&lt;/P&gt;&lt;P&gt;We decide to use loopback ip address and NAT it to the public one but with different port (for example loopback ip 1.1.1.1 and public ip is 85.10.10.1 and we NATed 85.10.10.1:446 to 1.1.1.1:443)&lt;/P&gt;&lt;P&gt;but when client try to connect to public IP with that port it says :This address was not found&lt;/P&gt;&lt;P&gt;is there any guide how to realize it correctly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Nov 2018 19:13:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/238629#M68348</guid>
      <dc:creator>Radmin_85</dc:creator>
      <dc:date>2018-11-05T19:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect with loopback ip address and port number</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/238639#M68349</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Just another thought on this, what about using AD groups and a VPN zone? This way you can have your different levels of acess using the AD groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a thought.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Nov 2018 19:42:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/238639#M68349</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-11-05T19:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect with loopback ip address and port number</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/238657#M68355</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70049"&gt;@Radmin_85&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;There are a number of guides on using a loopback address for a GP connection, one of which is a knowledge base article &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKPCA0" target="_blank"&gt;HERE&lt;/A&gt;, which further details an article more directly about using a different port for GP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;mentioned though I'm really not sure you need a whole new portal for this short of an unmentioned requirement. You could do what was mentioned and use different AD groups and build policies that focus on those users, or you could simply use the user-id to give both set of users a different ip-pool and build the policies further seperated by different ip-pools.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally I would recommend assigning the two groups different IPs, and then still yet using user-id in the security policies to actually grant them access to things. This ensures that you have multiple layers of security for any important aspect of your environment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Nov 2018 21:39:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/238657#M68355</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-11-05T21:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect with loopback ip address and port number</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/238822#M68401</link>
      <description>Is there a guide how to configure it with groups?</description>
      <pubDate>Wed, 07 Nov 2018 07:05:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/238822#M68401</guid>
      <dc:creator>Radmin_85</dc:creator>
      <dc:date>2018-11-07T07:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect with loopback ip address and port number</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/239463#M68572</link>
      <description>&lt;P&gt;we did it but it seems dont work correctly&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 08:15:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/239463#M68572</guid>
      <dc:creator>Radmin_85</dc:creator>
      <dc:date>2018-11-12T08:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect with loopback ip address and port number</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/239475#M68578</link>
      <description>&lt;P&gt;If your only purpose is to have different policy for the two user groups I would suggest you to use different approach insteead of playing with loopbacks, NATs, ports and etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do you authenticate users: Is it LDAP, local, RADIUS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The simple solution with local users would be:&lt;/P&gt;&lt;P&gt;1 Create users locally and add them in local user-groups&lt;BR /&gt;2 Create Auth profile and select type local, add the two user-groups to allow list&lt;BR /&gt;3 Configure global-protect portal as usual&lt;/P&gt;&lt;P&gt;4 configure global-protect gateway and under client setting configure two profiles, matching the loca user-groups. The tricky part here is that you need to use different pools for the two groups. But you can have the split-tunnel settings different for each group (ex. group A should access only to 10.0.0.0/24 while group B only to 172.16.0.0/24)&lt;BR /&gt;5 configure two security rules filtering on source user-group and put each group in separate rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can choose to skip fourth step and configure one client setting profile for both groups, that way all users will receive same routes through the tunnel, but the policy will decide if the traffic should be indeed allowed or rejected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AD authentiation over LDAP is pretty much similar, but you need additional steps to create group-mapping profile so the firewall can get the AD user group membership.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 13:02:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/239475#M68578</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2018-11-12T13:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect with loopback ip address and port number</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/239477#M68580</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;Alexander&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes the authentication is via LDAP&lt;/P&gt;&lt;P&gt;Thanks we will try ones more&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 13:37:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/239477#M68580</guid>
      <dc:creator>Radmin_85</dc:creator>
      <dc:date>2018-11-12T13:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect with loopback ip address and port number</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/239779#M68692</link>
      <description>&lt;P&gt;Ok we could resolve this solution&lt;/P&gt;&lt;P&gt;But one more point&lt;/P&gt;&lt;P&gt;When the worker connect to corporate network through GP at home with user-logon&amp;nbsp; option it is ok&lt;/P&gt;&lt;P&gt;But when that worker returns to workplace with the same corporate notebook it still remains in GP network&lt;/P&gt;&lt;P&gt;Is it possible to force the PA or GP agent to recognize the internal network when one plugged in the ethernet cable in workplace and dont connect through GP agen with user-logon option?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 08:19:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/239779#M68692</guid>
      <dc:creator>Radmin_85</dc:creator>
      <dc:date>2018-11-14T08:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect with loopback ip address and port number</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/240183#M68819</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70049"&gt;@Radmin_85&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Unless they properly disconnect from within the agent, the agent will attempt to reconnect to the portal once the laptop is turned on again. There is an option called 'Automatic Restoration of VPN Connection Timeout' that by default is enabled and set to 30 minutes,however I've never gotten this option to work correctly when working on a mac OS machine. Try setting this option to '0' to disable the resilient VPN behavior and see if that helps things, it should.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 19:59:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-loopback-ip-address-and-port-number/m-p/240183#M68819</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-11-16T19:59:50Z</dc:date>
    </item>
  </channel>
</rss>

