Upgrading GlobalProtect while on corp network

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Upgrading GlobalProtect while on corp network

L4 Transporter

Hi everyone,

 

I have a client who said every time they try to upgrade globalprotect, they have mixed results. The issue seems to be that they'll set the GP App to "Allow with prompt". However, the users will never get the prompt while they are on the corporate network. It seems possibly, when the users go home, they'll get the prompt to download and then install, but maybe they shutdown or restart their machines while the install is happening, which then causes issues.  This is an assumption of what might possibly be happening.

 

The real question is, what is the best way to allow the upgrade to happen in the office? 

 

Public DNS record -  gp.domainname.com pointing to public IP of firewall e1/1 interface  (ex 2.2.2.2)

e1/1 - untrust zone  IP 2.2.2.2/24

e1/2 - trust zone  IP 10.10.10.1/24

Client on corp network 10.10.10.100/24

 

1 accepted solution

Accepted Solutions

@ce1028

In this case it is more likely the NAT rule which causes this problem. After you configure a no NAT rule above the existing one it probably looks better, but TLS decryption might still be the next step to check.

 

From what time do you count this minute and more? Start of computer, loginscreen, after successful login when the desktop is shown? And what is the connection method: always-on pre-logon, always-on user-logon, ...?

View solution in original post

9 REPLIES 9

L7 Applicator

@ce1028

What about configuring the setting "Allow users to upgrade global protect app" to "Internal"?

This will update the agent transparently but only when the client is in the internal network and not connected by VPN.

@Remo I believe an Internal gateway is required for this option?  I'd also have to consider the remote workers who are never in the office

No, internal gateway isn't required. Only internal host detection. But yes when you have remote workers who are never in the office then this option does not work. Maybe if it is clear who always works from remote, then you could put them into a group and give them another portal config than your default configuration which then would be to allow the update only internally.

@Remo That's a good suggestion, as an alternative.  Is there anyway for transparent or allow with prompt to work, while on the corporate LAN?

@ce1028 so far I am not aware of problems that the upgrade does not work from internal. Did you test it yourself? Are there any specific version updates that did fail or is the problem in general? Are the clients able to successfully connect to the portal from internal? Is TLS decryption enabled that may be breaks this connection? There could be multiple reasons causing this to fail... the client logs are probably a good place to start the search for a reason.

@Remo I'm going to spin up a lab soon to try it. I did see the problem at their site. This has always been an issue for them.  When internal host detection detects they are internal, they will never receive the prompt.

 

They do have TLS Decryption enabled.  That's a good suggestion to check.  I wasn't sure if it was the outbound NATrule causing the issue. Their internet outbound nat rule translates their internal IP to the same public IP of the GP Portal

 

I also noticed it takes well over 1 minute before GP detects that it's on an internal network.

@ce1028

In this case it is more likely the NAT rule which causes this problem. After you configure a no NAT rule above the existing one it probably looks better, but TLS decryption might still be the next step to check.

 

From what time do you count this minute and more? Start of computer, loginscreen, after successful login when the desktop is shown? And what is the connection method: always-on pre-logon, always-on user-logon, ...?

@Remo I was able to reproduce in my test lab. It was the NAT rule causing the issue!

 

GP is set to always on. I start counting once GP starts spinning.  They have not reported this problem, just something I noticed on all of their machines. 

@ce1028

I noticed that the icon sometimes is way behind the actual status of global protect. But as long as you don't configure the setting "enforce global protect for network access" this isn't a problem, when exactly the internal host detection happens.

  • 1 accepted solution
  • 3758 Views
  • 9 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!