Hi @HCLCNNSecurity ,
The easiest way to accomplish what you want is to use the Config Selection Criteria under the Network > GlobalProtect > Gateways > Agent > Client Settings as @Adrian_Jensen mentioned. It does support groups, but only LDAP, and you were clear that you did not have LDAP, only SAML. If you want it working today, you can add each user to your 2 Client Settings (1 for each subnet). If you don't have that many users, it shouldn't take too long.
I have to ask the question, "What do you want to use the separate IP pools for?" If it is for the security policy, may I suggest configuring the users there instead? That would save the step of configuring the gateway.
Another thing you could try is to create 2 Dynamic User Groups for each department. You could manually assign the users the tags under Objects > Log Forwarding > Add > Log Type = auth > Filters. The tags would match the DUGs. You could then use the DUGs in the security policy, gateway client setting, or both.
I know! This could be a lot of work! The best solution would be group mapping to support SAML as many customers are moving to Azure AD. Another alternative if you want to query Azure AD via LDAP is to purchase Azure AD Domain Services or perhaps build a DC with Azure AD Connect.
Thanks,
Tom
... View more