<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258516#M73313</link>
    <description>&lt;P&gt;have you tried adding both usernames directly to the portal agent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1, test&lt;/P&gt;&lt;P&gt;2, domain\test&lt;/P&gt;</description>
    <pubDate>Wed, 24 Apr 2019 09:49:19 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2019-04-24T09:49:19Z</dc:date>
    <item>
      <title>VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256576#M72799</link>
      <description>&lt;P&gt;Hello, I have a problem.&lt;/P&gt;&lt;P&gt;I just inherited a palo alto firewall.&lt;/P&gt;&lt;P&gt;I noticed that given a specific certificate and given the global protect client, every user of the ldap server can connect to the vpn.&lt;/P&gt;&lt;P&gt;I would like that only users in specific ldap groups could enter.&lt;/P&gt;&lt;P&gt;Let's say the groups come from active directory.&lt;/P&gt;&lt;P&gt;"domain"\user_group_allowed&lt;/P&gt;&lt;P&gt;"domain"\user_group_allowed_limited&lt;/P&gt;&lt;P&gt;how can I do that?&lt;/P&gt;&lt;P&gt;right now everyone on "domain" can open a vpn tunnel.&lt;/P&gt;&lt;P&gt;Could it be that what I'm looking for is under:&lt;/P&gt;&lt;P&gt;Device &amp;gt; Authentication Profile &amp;gt; Advanced &amp;gt; Allow list&amp;nbsp;&lt;/P&gt;&lt;P&gt;and that I should Add the ldap groups there instead of "All" ?&lt;/P&gt;&lt;P&gt;Kindest Regards&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 13:41:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256576#M72799</guid>
      <dc:creator>FWTECNOFORM</dc:creator>
      <dc:date>2019-04-08T13:41:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256584#M72800</link>
      <description>&lt;P&gt;firstly,&amp;nbsp;configure device\server profile\ldap&amp;nbsp;&amp;nbsp; with the required permissions&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then, configure device\user identification\group mapping settings.&lt;/P&gt;&lt;P&gt;here you can add the groups that you want to use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then, network\portals and in the agent\configs you can add the 2 groups, one to each config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this will allow users in both groups to use the VPN but you can then add security policies for each group to either restrict or allow access to the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 12:27:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256584#M72800</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-04-08T12:27:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256585#M72801</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/109042"&gt;@FWTECNOFORM&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Since you're saying that you just encountered the environment I would hold off on any access changes until you get a solid understanding of why it was configured in the way it was. Often in a new environment I see a lot of engineers make "big" changes as far as end-users are concerned, and that can be a massive turnoff from your users.&lt;/P&gt;&lt;P&gt;Find out what the users are connecting to and why. It could be that you simply need to utilizes Agent Configs on your gateway to seperate out the users in groups. One group might just get permission to remote into their computers, or potentially simply access email remotely; another group might rightfully need access to additional resources while working remotely.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 12:33:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256585#M72801</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-04-08T12:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256597#M72810</link>
      <description>&lt;P&gt;"then, configure device\user identification\group mapping settings.&lt;/P&gt;&lt;P&gt;here you can add the groups that you want to use."&lt;/P&gt;&lt;P&gt;Thank you very much.&lt;/P&gt;&lt;P&gt;How can I "&lt;SPAN&gt;then, network\portals and in the agent\configs you can add the 2 groups, one to each config."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;should I select the portal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;then click agent&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;then click the config&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;then under user user groups add the two ldap groups?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 14:15:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256597#M72810</guid>
      <dc:creator>FWTECNOFORM</dc:creator>
      <dc:date>2019-04-08T14:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256599#M72811</link>
      <description>&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;should I select the portal&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;then click agent&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;then click the config&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;then under user user groups add the two ldap groups?&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes you can do that, or you can add config-1&amp;nbsp; and add group1&lt;/P&gt;&lt;P&gt;then add config-2 and add group2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i do a seperate config most of the time as i also use this to direct different groups to different gateways.&lt;/P&gt;&lt;P&gt;you can also use this to give users different portal configs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so group-1 (std users) could have the portal nailed down&lt;/P&gt;&lt;P&gt;group-2 (admin users) could have the portal unrestricted and an extra couple of gateways....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if yours is just for network access restrictions then just use the same portal config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;perhaps if you explain what the difference is between groups then i could advise further but please note &amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;'s comments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 07:53:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/256599#M72811</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-04-09T07:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258507#M73305</link>
      <description>&lt;P&gt;Hmm, I'm doing something wrong.&lt;/P&gt;&lt;P&gt;I get this message: "user is not authorized to connect to Global Protect Portal."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 08:31:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258507#M73305</guid>
      <dc:creator>FWTECNOFORM</dc:creator>
      <dc:date>2019-04-24T08:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258509#M73307</link>
      <description>&lt;P&gt;in monitor/system&amp;nbsp; it will show the username that is denied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then in cli,&amp;nbsp;&amp;nbsp; show user group list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then in cli , show user group name "one of the groups from above"&amp;nbsp; to make sure that user is deffo in that group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it may be domain info mising so add the following to the portal/agent/config/user/user group to test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;firstly add user on its own&amp;nbsp;&amp;nbsp; fred smith&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then if that fails, try domain\fred smith&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 08:45:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258509#M73307</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-04-24T08:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258513#M73310</link>
      <description>&lt;P&gt;A: ok firstly, configure device\server profile\ldap with the required permissions&lt;/P&gt;&lt;P&gt;B: that seems fine&lt;/P&gt;&lt;P&gt;A:then, configure device\user identification\group mapping settings.&lt;/P&gt;&lt;P&gt;b:I added to the group include list the group domain\allowed_full&lt;/P&gt;&lt;P&gt;A: here you can add the groups that you want to use.&lt;/P&gt;&lt;P&gt;A: then, network\portals and in the agent\configs you can add the 2 groups, one to each config.&lt;/P&gt;&lt;P&gt;B: network\portals and in the agent\configs user/user group i added the group domain\allowed_full&lt;/P&gt;&lt;P&gt;A: this will allow users in both groups to use the VPN but you can then add security policies for each group to either restrict or allow access to the network.&lt;/P&gt;&lt;P&gt;A:in monitor/system it will show the username that is denied.&lt;BR /&gt;then in cli, show user group list&lt;BR /&gt;then in cli , show user group name "one of the groups from above" to make sure that user is deffo in that group.&lt;BR /&gt;it may be domain info mising so add the following to the portal/agent/config/user/user group to test.&lt;BR /&gt;firstly add user on its own fred smith&lt;BR /&gt;then if that fails, try domain\fred smith&lt;/P&gt;&lt;P&gt;B: The user is in the group, the check in the cli confirmed it. but I'm still getting "You are not authorized to connect to GlobalProtect Portal.", I can see the error in the monitor/system and it says:&amp;nbsp;GlobalProtect portal client configuration failed. Login from: my_ip, Source region: IT, User name: test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I roll back to my previous configuration, user Test can log just fine.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 09:24:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258513#M73310</guid>
      <dc:creator>FWTECNOFORM</dc:creator>
      <dc:date>2019-04-24T09:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258514#M73311</link>
      <description>&lt;P&gt;going back to the beginning...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could you confirm if you are still using certificate authentication.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 09:33:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258514#M73311</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-04-24T09:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258515#M73312</link>
      <description>&lt;P&gt;yes I am.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 09:35:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258515#M73312</guid>
      <dc:creator>FWTECNOFORM</dc:creator>
      <dc:date>2019-04-24T09:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258516#M73313</link>
      <description>&lt;P&gt;have you tried adding both usernames directly to the portal agent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1, test&lt;/P&gt;&lt;P&gt;2, domain\test&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 09:49:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258516#M73313</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-04-24T09:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258517#M73314</link>
      <description>&lt;P&gt;can you post a screenshot of portal/agent/user/user group, group mapping include, output from show user group name?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 10:52:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258517#M73314</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-04-24T10:52:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258558#M73318</link>
      <description>&lt;P&gt;and a screenshot of certificate profile&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 11:31:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258558#M73318</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-04-24T11:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258559#M73319</link>
      <description>&lt;P&gt;And.......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;make sure you have the domain name in the certificate profile "user domain" field.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 11:47:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/258559#M73319</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-04-24T11:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/275218#M75246</link>
      <description>&lt;P&gt;the issue seemed to be a wrong domain name under /device/authentication profile/authentication/user domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jul 2019 13:59:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/275218#M75246</guid>
      <dc:creator>FWTECNOFORM</dc:creator>
      <dc:date>2019-07-07T13:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPN CLIENT GLOBAL PROTECT, MANAGED WITH LDAP GROUPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/415130#M93225</link>
      <description>&lt;P&gt;That was it for me also.&amp;nbsp; &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt; thank you for walking me through the tshooting steps.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 18:38:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-client-global-protect-managed-with-ldap-groups/m-p/415130#M93225</guid>
      <dc:creator>MarkWalters</dc:creator>
      <dc:date>2021-06-24T18:38:43Z</dc:date>
    </item>
  </channel>
</rss>

