GlobalProtect with MFA Dual Authentication

Reply
Highlighted
L0 Member

GlobalProtect with MFA Dual Authentication

We have set up a GP slit tunnel we allow SSO using LDAP and Certificate based authentication this allows access to everything in the corporate network. However for applications we have specifically listed by service and destination we have created additional authentication rules that force the user to authenticate using a MFA (Entrust) method through the captive portal. We are having issues narrowing down the DFS file share traffic to create a specific authentication rule. Our goal is to only allow corporate network file share access from a Windows 10 client after the additional MFA authentication has been successful. At the moment the traffic is accessible without the additional MFA (ENTRUST) authentication – HELP!

Highlighted
Cyber Elite

@mwagnerbi1,

Can you share how you have your current policy setup. 

Highlighted
L0 Member

We have a Security policy in place that allows all known GP users access to the vpn_private zone (any/any). We have a no decrypt policy in place for skype traffic all other traffic is decrypted. Finally we have specific authentication policies in place for specific corporate resources based on port/ destination IP

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!