Forced VPN Connection with GlobalProtect

cancel
Showing results for 
Search instead for 
Did you mean: 

Forced VPN Connection with GlobalProtect

L3 Networker

Is it possible to force a VPN Connection so the client can only use wifi or ethernet if he is in the office or has a active VPN Connection?

12 REPLIES 12

L4 Transporter

It's base on the gateway lookup resolution and you have to configure an internal gateway to do that.

and if the client is connected to the internal gateway no ipsec or vpn tunnel is mounted but you can use HIP information or login information to create your secuty rule that limit the accessible ressource for this device.

https://live.paloaltonetworks.com/docs/DOC-3930

L5 Sessionator

Good Morning,

If you are talking about a user who wants to connect to an internal gateway, we can configure the PANFW gateway on a VPN tunnel with in the office as well. By default the PANFW supports the SSL connection to the GP users ( whether connected internally or externally), and we have to manually configure the gateways to accept a  VPN connection.

You can find the information on the below thread:

https://live.paloaltonetworks.com/message/29549#29549

Hope it helps,

BR,

Karthik

Really important for my customer is that the client can never connect directly to the internet.

That is possible?

Sorry if I have to ask it again for my understanding, but that is absolutly important, else i need to buy a other vpn solution.

Can you elaborate more upon the requirement. Your question isn't very  clear.

BR,

Karthik

The Requirement from the Customer say that the Laptop are not allowed to be exposed to the internet.

As soon the Laptop is connected to a network it has to establish a vpn or disable the connection.

You can leverage the single sign on feature, so when the laptop having the agent on it, connects within the network and has been  successfully authenticated, a VPN tunnel gets established and he can go out to the internet via the tunnel. If he fails to get authenticated, the user will get identified as an unknown user, and we can configure a rule to block all unknown users. That way he cannot get access to the internet, although he is connected internally in the network. Like Gregoux mentioned as well, you can use the hip checks to deny access to the machines if they do not match a config criteria.

BR,

Karthik RP

L5 Sessionator

You can create split tunnel by configuring access routes in the global protect gateway.

This way with security policy you can only allow access to ip address that you want and block access to the rest with the security policy.

Hope this helps.

Thanks

Where can I configure a rule on the client side that if he is a unknows user traffic is blocked? On the Firewall of course...but on the laptop??

At home there is no PA to configure such things.

I got a test licesne for globalprotect HIP.

Well I'm pretty sure now there is no way I can force a laptop user that he has to be connected to the vpn to be able to use the internet. In HIP I can't check if he can reach a public ip adress and there is also no way to place a firewall rule that would block his traffic if the vpn is not connected.

I need to buy now a Cisco VPN....

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!