- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
07-04-2022 02:43 AM
Hi mates,
I was wondering if there are any ways or tools to block the GlobalProtect connection when another type of VPN is up and running.
The main goal of this is to get the right country of origin information on the GlobalProtect logs on the firewall which is not possible when another type of VPN is already running on the end-users machine.
Thank you in advance.
Hamid
07-05-2022 06:45 PM
I don't think you'll have any luck in preventing a Globalprotect Agent from attempting to connect if another VPN instance is running on the client. Unless you block everything but the expected country of origin from accessing the portal/gateway and force the user to disconnect first, but that only works if you only operate in a single country.
What you could do is attempt to maintain a list of VPN processes and use them in HIP-Objects to detect if someone is running a VPN application (outside of those that function directly from a browser). This would allow you to utilize that information in your security rulebase to drop the traffic for these users and provide them with a HIP-Notification that they must disconnect and shutdown all 3rd-party VPN applications prior to connecting to GlobalProtect. It's not a foolproof method and would need to be manually maintained and built-out, but it would function.
07-05-2022 06:45 PM
I don't think you'll have any luck in preventing a Globalprotect Agent from attempting to connect if another VPN instance is running on the client. Unless you block everything but the expected country of origin from accessing the portal/gateway and force the user to disconnect first, but that only works if you only operate in a single country.
What you could do is attempt to maintain a list of VPN processes and use them in HIP-Objects to detect if someone is running a VPN application (outside of those that function directly from a browser). This would allow you to utilize that information in your security rulebase to drop the traffic for these users and provide them with a HIP-Notification that they must disconnect and shutdown all 3rd-party VPN applications prior to connecting to GlobalProtect. It's not a foolproof method and would need to be manually maintained and built-out, but it would function.
07-07-2022 02:12 AM
Thanks, it was brilliant.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!