- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
11-16-2021 07:08 PM
Hi Team,
Usually we are working from office and there is no issue when accessing PA CLI or web interface.
Now when we are working from home and connecting to GP, we still can access and is there any ways to block the access?
If we are not connecting to GP, there is no issue.
11-17-2021 11:32 AM
Hello,
To add to this, I would suggest to use user-id. This way only the admins have access.
Cheers!
11-17-2021 12:06 AM - edited 11-17-2021 12:08 AM
you could simply add a policy to block all traffic from your GlobalProtect zone thats heading for the Palo management interface address.
11-17-2021 11:32 AM
Hello,
To add to this, I would suggest to use user-id. This way only the admins have access.
Cheers!
11-17-2021 08:51 PM
To add to the already excellent suggestions you have received, you really should be using permitted-ip address configuration to lock down access to your firewall from only select addresses. Your firewalls should be one of the most locked down devices that you have on your network, so use all of the three suggestions in conjunction. You don't need to be allowing traffic to the firewalls management address from any address/zone you don't need it, use user-id to restrict access solely to users that should be accessing the management interface, and use permitted-ip so that only source IPs you've specified will get a response from the firewall's management interface.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!