<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect SSL VPN and 802.1x in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-802-1x/m-p/9772#M7168</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;802.1x is not supported in GlobalProtect vpn&lt;/P&gt;&lt;P&gt;You can however leverage user identification to grant users access based on their AD group membership. This will allow you to build security policy based on a source user group (admins/marketing/sales/...) and the GP IP pool towards several resources while blocking unauthorized access to other resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be accomplished by enabling user identification on the inbound zone of GP and configuring an ldap profile plus userID group filter to retrieve group information. These groups can then be used in security policy to limit access for GlobalProtect users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Jan 2013 11:36:50 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2013-01-08T11:36:50Z</dc:date>
    <item>
      <title>Global Protect SSL VPN and 802.1x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-802-1x/m-p/9771#M7167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I currently have 802.1x setup on our switches and it works very well for us in our environment. It allows our users to roam around the office and basically plug in wherever they want and they always live on the same VLAN and always have access to the same VLANs. We have many users outside of the office who need access to internal resources while on the go. We want to setup Global Protect to use SSL VPN to accomodate them. I have most of it setup and I can connect to the internal network and the internet just fine. The problem I am having is that I need to come up with a solution that gives GP Client users access to only the networks they should have access to and NOT the entire network. Is there a way for GP Client to authenticate via 802.1x, just as any user would inside the network? If so, how would I go about doing this? If not, are there other options?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2013 15:58:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-802-1x/m-p/9771#M7167</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2013-01-03T15:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect SSL VPN and 802.1x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-802-1x/m-p/9772#M7168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;802.1x is not supported in GlobalProtect vpn&lt;/P&gt;&lt;P&gt;You can however leverage user identification to grant users access based on their AD group membership. This will allow you to build security policy based on a source user group (admins/marketing/sales/...) and the GP IP pool towards several resources while blocking unauthorized access to other resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be accomplished by enabling user identification on the inbound zone of GP and configuring an ldap profile plus userID group filter to retrieve group information. These groups can then be used in security policy to limit access for GlobalProtect users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 11:36:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-802-1x/m-p/9772#M7168</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2013-01-08T11:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect SSL VPN and 802.1x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-802-1x/m-p/9773#M7169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tpiens, thank you for your response. User identification is a good idea, however, we are an all Linux environment and we are having troubles coming up with a solid solution implementing it. We are unable to use captive portal options because there isn't anyway our 300+ users would respond well to having to log in via web form. It seems as if for now, we'll have to postpone using GP until we can figure out user identification. Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 16:07:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-ssl-vpn-and-802-1x/m-p/9773#M7169</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2013-01-08T16:07:54Z</dc:date>
    </item>
  </channel>
</rss>

