- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-20-2023 01:04 AM
hi team
is there a way to disable global protect web portal only leaving the actual vpn gateway functioning?
thank you
03-25-2023 05:59 PM - edited 03-25-2023 06:00 PM
Initially GlobalProtect agent will connect to portal and get list of gateways.
After that GlobalProtect agent will establish VPN tunnel to one of gateways (if all gateways have same priority then latency is deciding factor which gateway is chosen).
GlobalProtect agent will then cache this list of gateways. By default for 24 hours before it needs to talk to portal again.
You can disable portal web login but portal itself needs to exist (as mentioned in link shared previously).
03-20-2023 03:04 AM
Hi, thanks for the comment, I was meant to say how to disable the web portal itself (from the firewall side), so palo alto does not listen on 443 to launch the webpage once url us entered
03-20-2023 03:16 AM
@nevolex I do not think it is possible by design to do this.
As GP uses IPSEC/SSL connection to work.
Regards
Mahesh
03-25-2023 01:11 PM
As per my understanding the user is asking if Portal config is not there not the login page.
Thanks for the reply.
Regards
Mahesh
03-25-2023 05:59 PM - edited 03-25-2023 06:00 PM
Initially GlobalProtect agent will connect to portal and get list of gateways.
After that GlobalProtect agent will establish VPN tunnel to one of gateways (if all gateways have same priority then latency is deciding factor which gateway is chosen).
GlobalProtect agent will then cache this list of gateways. By default for 24 hours before it needs to talk to portal again.
You can disable portal web login but portal itself needs to exist (as mentioned in link shared previously).
05-17-2023 06:07 AM
This was the solution I was looking for and worked for me. Thank you!
09-08-2023 06:44 AM - edited 09-08-2023 06:52 AM
Is it possible to keep GP portal (and login page), but disable it listening on port 80 so it only listens on 443?
09-08-2023 08:17 AM
Port 80 will redirect to 443 by default.
If you don't like 80 to be open then don't add this port into firewall rule that permits traffic from Internet towards GlobalProtect Portal.
09-08-2023 09:29 AM
The thing is, I don't have any rule in firewall policy exclusively permitting anything from internet to outside facing interface, that GP portal/gateway run on. Furthermore if I watch traffic log and telnet to public_ip:80, I don't even see that flow logged, although every rule including explicit deny any rule in the end for all to all zones have logging enabled. I can see successful/failed VPN activity on GlobalProtect log page though.
09-08-2023 09:47 AM
If you don't have "Block Any" rule at the end then traffic from outside zone to outside zone is permitted by default rule "intrazone-default".
As step one select intrazone-default rule, click "Override" at the bottom and check "Log at Session End" on Actions tab to enable logging on the rule.
09-08-2023 10:13 AM
I do have deny any configured exclusively in the end with logging enabled. Could this be something related to firewall being a VM version? Also PA VMs don't have an override option for their default rules.
09-16-2024 11:50 AM - edited 09-16-2024 12:56 PM
We found nevolex's link as well - but the problem is that in our portal configuration, the "Disable" option is outright missing, we only have "factory-default" on all our portals. How do we add Disable as an option? We have an 'import' button too though..... but is disabling a portal something we need to import??
edit: oh good grief I just noticed the "disable" option is under "portal login page" NOT "portal landing page" - the image on the article confused me, since the dropdown is extended, it looked as if I should be finding the option to Disable on Portal Landing. All set.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!