As part of migrating from AnyConnect VPN to Global Protect remote access VPN: - Use Case: We are using Azure AD for authentication and the GlobalProtect authentication profile is configured to use Azure AD for SSO authentication; We want remote users to use GlobalProtect remote access VPN to access enterprise data center resources; A GlobalProtect Portal and GlobalProtect Gateway is configured on a pair of PA5260 firewalls in HA; Each Active Directory user group has its own VPN profile, where each VPN profile has its own assigned IP pool; When members of the group connect to the VPN, they should be getting IP addresses only from the ranges assigned to the pool; We have users that are a member of multiple Active Directory groups (which means a user can be a member of multiple VPN profiles); When a user connects to different VPN profile, the user should get IP address from the designated pool; We want to accomplish: The firewall rules on the data center firewalls are set up to permit or deny users based on the IP pool assigned to the VPN profiles (basically based on the group in Active Directory). In the GlobalProtect configuration, how do we make users choose which VPN profile/Group to associate while they are establishing VPN connection? I might not explaining the problem very well here, but please let me know if you have any question. Thank you
... View more