- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
12-20-2024 05:58 AM
I have some users who travel outside of areas we normally allow connections from (think vacation on a cruise etc). I want to given them access to M365, perhaps a few SAAS apps protected by SSO, but not necessarily to our Hybrid environment. I have several extra IPs on our perimeter NGFW available. Currently the only reason they hit the NGFW is to VPN into a hybrid system or two.
Is there a way to create a public interface they could connect GP to that could then send their traffic out (even over another interface if needed, I have IPs to spare) and thus taking advantage of all the features in my NGFW, security, DPI etc, and limit where they can go, such as M365, and a few other SAAS apps?
Is there a better solution (this one doesn't cost us anything in theory)
I hope I describe that well enough.
12-24-2024 11:14 AM
Hello,
Have you looked into GlobalProtect?
Just a thought.
Regards,
12-27-2024 06:55 AM
we currently use it. The problem is not using GP but in how to configure it for multiple scenarios. A scenario where users can connect to one interface and use that as a split tunnel when they are in the proper approved locations and the other where they can connect and their internet traffic gets proxied for them using another interface. this way when they are not in an approved location they can use a vpn and we can control their access.
still looking for a solution.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!