Hi...Once you complete the configuration for Global Protect, the VPN feature will be active and ready to accept client connections. You define the security rules to allow specific apps/services through for the VPN clients only and not the the VPN feature itself. Let's say you want to permit only ssh traffic for the VPN clients, you would define the security rule to permit app=ssh.
Please could you check the configuration and ensure that you have the server certificate configured correctly. You may have to open a support case to ensure the configs are correct. Can you telnet to port 443 on that external interface, that way we can ensure that at least port 443 traffic it making it to the PAN Firewall external interface.
I'm running 4.1.10. In order for the PAN to accept client connections (I'm binding the portal to the "outside" interface) I had to create a security rule - "outside zone to outside zone, destination the external interface of the PAN, apps - SSL, web browsing, and panos-global-protect, services http (80) and https (433)." Without this rule clients were not able to connect. BUT this has to do with the fact that I have an explicit deny rule at the bottom of my policy for logging purposes. So, in my case I need to create explicit zone to zone rules (I didn't recreate the hidden same zone to same zone allow rule - this is by design).
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!