- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
10-18-2018 11:46 PM
Hey Guys,
i'm currently testing the GlobalProtect App 5 with iOS Deviecs and Airwatch MDM. Everything works great, but it seems like that it isn't important which setting i've selected in the Portal > Agent > App (Settings). I've tried to enforce GlobalProtect for Network Access on iPhone but i can still deselect "connect on demand", so it is possible to access the Internet without GP.
Any Ideas? Does the Agent Settings effect? Anything else to configure espacially in AirWatch?
Thanks and best regards,
Jochen
10-20-2018 02:46 AM
10-19-2018 02:55 AM
since day one of GP on IOS it has not been possible to force GP...
the user always has the option to disable VPN in the settings menu regardless of app settings.
I use a global proxy to prevent internet browsing when not connected via GP as never found any other way of enforcing this.
10-19-2018 11:40 AM
Hello Mick,
Would be able to get into a bit more detail on the global proxy and how you force mobile devices to use it? I would like to hear how others are solving this solution.
Regards,
10-20-2018 02:46 AM
10-20-2018 06:00 AM
Nice solution for the iOS devices. Need to keep that in mind 😉
I am also interested in the way you solved the problem on windows. The way I used here is set the captive portal timeout to 1 hour and use simple http websites as default websites in the users browsers. The notifications of global protect are not very useful (not to say useless), but this way the user only has to open the browser to be redirected to whatever captive portal there is. This http website does nothing else than redirecting to the https company website, but as it is http it does not break the captive portal redirect.
10-22-2018 02:16 AM
Hey MickBall,
nice solution, a little through the breast into the eye but still fine! 😉
Maybe the option in the agent settings could be extended with "(Windows only)" as some other options.
Regards,
Jochen
10-22-2018 02:42 AM
@Remo,I'm liking the default default web page to invoke captive portal.
we have an icon on the desktop called "Connect to Public WiFi".
this also points to our corp website and invokes the same response pages but it disables the proxy settings for 3 mins...
eva iva are workable solutions but bear in mind that we were using this way before the option of "GP enforce traffic" was ever introduced and have been using pac files long before the Juniper boxes were re-badged... lol....
so... just sticking to what works for us just now but if needs be i would certainly move towards your solution.. (not sure about the 1 hour timeout)...
10-22-2018 02:52 AM
@Jochen.Reinecke, yes understood but please note my previous response to Mr Remo...
we have been using pac files to restrict laptops since day one of VPN and the GP force traffic option has not been around very long.
so as it was already there then its easier to continue as is...
if we did not have pac files in place then the @Remo solution would certainly suffice...
I think most of the App settings should contain (Windows Only (depending of course what mood your IPad is in and which motion was used when removing it from your laptop bag))
Laters...
06-15-2020 10:04 AM
Hello,
We are beginning to roll out GP for iOS devices and having an issue with this same topic. Are you still using the proxy.pac file? If so, can you share some details on how to do it? I'm not sure where to host this or what format for the file to be.
Any help would be appreciated.
Brian
06-15-2020 10:24 AM
Hi @brianjreed .
of course ... no problemo....
the pac file needs to be available to ipads outside the vpn tunnel. So a website somewhere...
the pac file just says,,,, in laymans terms,,, Send all traffic to a duff proxy apart from the global protect connection traffic, and if connected to the private network, cancel the duff proxy...
this blocks all browser traffic by sending it to a proxy that does not exist. But it allows gp connection. When gp is connected it drops the proxy settings so all traffic goes down tunnel.
it reverts if tunnel fails. You actually dont need a proxy, just a pac file of a few lines of text.
06-15-2020 11:10 AM
Thanks. Any chance you could share your (or a sample) pac file? I can successfully block all traffic with the pac but cannot allow any specific websites/urls/domains.
06-15-2020 11:28 AM
Yes of course but it may be easier understood if you postvwhat you have, and inwill edit for the purpose, youbwill then better understand the process.
if not then i will just send an example...
06-15-2020 11:33 AM
Sure, I've tried a few samples I've found online. Really I just want to allow "direct" to my GW (filter.tesd.net) and push all to a fake proxy.
function FindProxyForURL(url, host) {
// If the hostname matches, send direct.
if (dnsDomainIs(host, "filter.tesd.net") ||
shExpMatch(host, "(*.tesd.net|tesd.net)"))
return "DIRECT";
// If the requested website is hosted within the internal network, send direct.
if (isPlainHostName(host) ||
shExpMatch(host, "*.local*") ||
isInNet(dnsResolve(host), "10.0.0.0", "255.0.0.0") ||
isInNet(dnsResolve(host), "172.16.0.0", "255.240.0.0") ||
isInNet(dnsResolve(host), "192.168.0.0", "255.255.0.0")
return "DIRECT";
// DEFAULT RULE: All other traffic, use below proxies, in fail-over order.
return "PROXY 4.5.6.7:8080; PROXY 7.8.9.10:8080";
}
06-16-2020 06:14 AM - edited 06-16-2020 06:16 AM
K a chopped file and some notes below...
function FindProxyForURL(url, host) {
var proxy="PROXY 1.2.3.9:9354";
if (isInNet(host, "x.x.x.x", "255.255.248.0") ||
isInNet(host, "x.x.x.x", "255.255.255.192") ||
isInNet(host, "x.x.x.x", "255.255.255.128") ||
isInNet(host, "x.x.x.x", "255.255.255.224") ||
shExpMatch(host, "*.manage.microsoft.com") ||
isInNet(dnsResolve("any.internal.web.server"), "10.250.1.56", "255.255.255.255")) {
return "DIRECT";
}
return proxy
}
we do not use proxy for GP when connected so proxy address is duff.... if you have internal proxies then can include.
the x.x.x.x subnets are all of our ISP addresses as we use most of these for portals, gateways and some basic web help files ava to the outside world.
the dns resolve, when connected is a good way of removing proxy settings but you may prefer to use subnets as in your example.
HTH.
Edit. and the match host is for InTune as this is how we manage IOS profiles. so if it blows up we can still download a new profile to device,
06-17-2020 10:02 AM
Thank you so much! Exactly what I needed.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!