Global Protect at the inside truted interface

L3 Networker

Global Protect at the inside truted interface

PAN 5060

Outisde untrusted interface

Inside trusted interface


Wifi guest network inside


Most Global Protect corporate users go to


WiFi users normally PAT to the Internet using that same interface IP So all source addresses to the Internet appear to be Like most guest networks the users have no access (for the most part) to internal IP private addresses. Just Internet.


But let's say that WiFi user wants to to user Global Protect like the outside users so he can access internal resources. Is there a NAT that would say if you see traffic from the WiFi network destined for the external interface address at VPN port whatever - instead of PATting it, terminate that traffic and create the tunnel just as is it had originated from the outside untrusted network. Is that possible? 


Thank you.

L7 Applicator

Re: Global Protect at the inside truted interface

hi @palomed

you'll need a NAT rule at the top of your NAT policy that actually does not do NAT for that specific destination address




trust to untrust, destination ip no-NAT


make sure it is placed above your default outbound NAT

L3 Networker

Re: Global Protect at the inside truted interface

Very helpful. Thank you.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!