- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
06-08-2018 12:20 PM
Absolutely.
Palo is using positive enforcement model - everything that is not permitted is blocked by default.
Are your VPN using landing in dedicated VPN zone?
Best practice would be to permit based on users/groups what they need.
If you allow any then you have to block things that you don't want those specific users to access.
06-08-2018 12:37 PM - edited 06-08-2018 12:38 PM
User ID and AD Groups is how we do it.
The rule look like this take for example SSL only
NAME, SRC Zone=GlobalProtect, Source Address=IP Range of the GP Clients, Src User: DOMAIN\Group name, DestZone= Internal, Dest Address = Group things they need to access, Application=SSL, Service = Port if necessary. ALLOW
06-08-2018 02:18 PM
This is very helpful. We haven't implemented UserID yet, any way to do this with local users?
06-08-2018 02:49 PM
I assume that by VPN you mean GlobalProtect.
Sure you can use local users. GlobalProtect will identify users and you can see them in Monitor > Traffic under Source User Tab.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!