<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect when Palo behind ASA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/250344#M71209</link>
    <description>&lt;P&gt;Thanks for all your responses. I appreciate it. Let the learning curve begin &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 17 Feb 2019 23:39:14 GMT</pubDate>
    <dc:creator>Hayden-Searle</dc:creator>
    <dc:date>2019-02-17T23:39:14Z</dc:date>
    <item>
      <title>GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249884#M71063</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been tasked with getting GP working and as I'm not as skilled as many of you, I thought I'd ask the brains trust if this is possible.&lt;/P&gt;&lt;P&gt;We have a PA-3020 which sits behind a Cisco ASA. The ASA is the edge firewall and is a yes/no gateway, the PA then filters the requests based on port and destination.&lt;/P&gt;&lt;P&gt;This config isnt changing in the short term, although I have from a reddit discussion started the ball rolling on replacing the ASA, so I am trying to understand how the config would work to let the traffic flow through the ASA to the PA to terminate the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm no expert on either technology, but opinions and thoughts would be greatly appreciated&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 21:29:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249884#M71063</guid>
      <dc:creator>Hayden-Searle</dc:creator>
      <dc:date>2019-02-12T21:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249914#M71073</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/106895"&gt;@Hayden-Searle&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So to understand things a bit more is your NAT process taking place on the ASA or does your Palo Alto firewall have a Public IP and a No-NAT rule configured on the ASA?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 02:38:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249914#M71073</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-13T02:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249917#M71075</link>
      <description>&lt;P&gt;Apologies, I should have mentioned that. NAT is all taking place on the ASA at the moment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 02:45:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249917#M71075</guid>
      <dc:creator>Hayden-Searle</dc:creator>
      <dc:date>2019-02-13T02:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249918#M71076</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/106895"&gt;@Hayden-Searle&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The the last remaining question really is if you have everything behind a sole public IP or if you have one that you could assign solely to the GlobalProtect configuration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 02:49:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249918#M71076</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-13T02:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249919#M71077</link>
      <description>&lt;P&gt;I believe we have a separate one just for GlobalProtect, but if not and it would make this easier, then I will request the business gets one&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 03:07:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249919#M71077</guid>
      <dc:creator>Hayden-Searle</dc:creator>
      <dc:date>2019-02-13T03:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249925#M71080</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/106895"&gt;@Hayden-Searle&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;This should be relatively easy then. Assign the public IP to a new interface on your Palo Alto firewall and configure GlobalProtect as you would normally. Then on the ASA simply allow the traffic and make sure that a NO-NAT statement is applied for that public address to ensure that the ASA doesn't attempt to NAT the traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 04:17:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249925#M71080</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-13T04:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249927#M71082</link>
      <description>&lt;P&gt;Thats what I was thinking but didnt think it would be that simple, or that it would necessarily work that way. I didnt want to put my thoughts out there as sometimes it can send the conversation in a different direction.&lt;/P&gt;&lt;P&gt;I'll get onto the ruleset for it tomorrow starting with the Palo Alto. Thank you for the input, I appreciate it&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 05:14:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/249927#M71082</guid>
      <dc:creator>Hayden-Searle</dc:creator>
      <dc:date>2019-02-13T05:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/250173#M71158</link>
      <description>&lt;P&gt;Sorry one more thing I've just learnt that is throwing a spanner in the works. The Palo is in Vwire mode. i understand I must have a Layer 3 IP'd interface for GlobalProtect, I'm just wondering what can of worms I'm getting in to and whether it would be easier to replace the ASA with a new PaloAlto just for Edge traversal and GlobalProtect and leave the existing PaloAlto in vwire mode?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 00:54:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/250173#M71158</guid>
      <dc:creator>Hayden-Searle</dc:creator>
      <dc:date>2019-02-15T00:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/250174#M71159</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/106895"&gt;@Hayden-Searle&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Honestly, with this type of configuration, it would be far easier to simply replace the ASA with a Palo Alto and collapse the two devices so that the Palo Alto firewall effectively becomes your external device.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 03:39:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/250174#M71159</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-15T03:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect when Palo behind ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/250344#M71209</link>
      <description>&lt;P&gt;Thanks for all your responses. I appreciate it. Let the learning curve begin &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Feb 2019 23:39:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-when-palo-behind-asa/m-p/250344#M71209</guid>
      <dc:creator>Hayden-Searle</dc:creator>
      <dc:date>2019-02-17T23:39:14Z</dc:date>
    </item>
  </channel>
</rss>

