Globalprotect Admin Guide
Globalprotect Admin Guide
Administrators
Guide
Version7.1
ContactInformation
CorporateHeadquarters:
PaloAltoNetworks
4401GreatAmericaParkway
SantaClara,CA95054
[Link]/company/contactsupport
AboutthisGuide
ThisguidedescribeshowtodeployGlobalProtecttoextendthesamenextgenerationfirewallbasedpoliciesthat
areenforcedwithinthephysicalperimetertoyourroamingusers,nomatterwheretheyarelocated:
ForinformationonhowtoconfigureothercomponentsinthePaloAltoNetworksNextGenerationSecurity
Platform,gototheTechnicalDocumentationportal:[Link]
searchthedocumentation.
Foraccesstotheknowledgebase,completedocumentationset,discussionforums,andvideos,referto
[Link]
Forcontactingsupport,forinformationonsupportprograms,tomanageyouraccountordevices,ortoopena
supportcase,referto[Link]
ForthemostcurrentPANOSandGlobalProtect7.1releasenotes,goto
[Link]
Toprovidefeedbackonthedocumentation,pleasewritetousat:documentation@[Link].
PaloAltoNetworks,Inc.
[Link]
2016PaloAltoNetworks,[Link]
at[Link]
respectivecompanies.
RevisionDate:November21,2016
2 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
TableofContents
GlobalProtectOverview............................................... 7
AbouttheGlobalProtectComponents ................................................ 8
GlobalProtectPortal ............................................................ 8
GlobalProtectGateways ......................................................... 8
GlobalProtectClient ............................................................ 9
WhatClientOSVersionsareSupportedwithGlobalProtect? ...........................10
WhatFeaturesDoesGlobalProtectSupport? .........................................11
AboutGlobalProtectLicenses .......................................................13
SetUptheGlobalProtectInfrastructure ................................ 15
CreateInterfacesandZonesforGlobalProtect........................................16
EnableSSLBetweenGlobalProtectComponents......................................18
AboutGlobalProtectCertificateDeployment......................................18
GlobalProtectCertificateBestPractices..........................................18
DeployServerCertificatestotheGlobalProtectComponents .......................21
SetUpGlobalProtectUserAuthentication ............................................25
AboutGlobalProtectUserAuthentication.........................................25
SetUpExternalAuthentication ..................................................28
SetUpClientCertificateAuthentication ..........................................32
SetUpTwoFactorAuthentication ...............................................38
SetUpAuthenticationforstrongSwanUbuntuandCentOSClients..................47
EnableGroupMapping.............................................................54
ConfigureGlobalProtectGateways..................................................57
PrerequisiteTasksforConfiguringtheGlobalProtectGateway ......................57
ConfigureaGlobalProtectGateway ..............................................57
ConfiguretheGlobalProtectPortal..................................................65
PrerequisiteTasksforConfiguringtheGlobalProtectPortal .........................65
SetUpAccesstotheGlobalProtectPortal ........................................66
DefinetheGlobalProtectClientAuthenticationConfigurations ......................67
GatewayPriorityinaMultipleGatewayConfiguration..............................68
DefinetheGlobalProtectAgentConfigurations....................................69
CustomizetheGlobalProtectAgent ..............................................74
CustomizetheGlobalProtectPortalLogin,Welcome,andHelpPages ................82
EnableDeliveryofGlobalProtectClientVSAstoaRADIUSServer .......................84
DeploytheGlobalProtectClientSoftware ............................................85
DeploytheGlobalProtectAgentSoftware ........................................85
DownloadandInstalltheGlobalProtectMobileApp ...............................90
DownloadandInstalltheGlobalProtectAppforChromeOS........................93
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 3
TableofContents
DeployAgentSettingsTransparently................................................. 97
CustomizableAgentSettings .................................................... 98
DeployAgentSettingstoWindowsClients .......................................104
DeployAgentSettingstoMacClients ...........................................113
Reference:GlobalProtectAgentCryptographicFunctions..............................117
GlobalProtectMIBSupport........................................................118
MobileEndpointManagement....................................... 119
MobileEndpointManagementOverview............................................120
SetUpaMobileEndpointManagementSystem ......................................121
ManagetheGlobalProtectAppUsingAirWatch......................................122
DeploytheGlobalProtectMobileAppUsingAirWatch.............................122
ConfiguretheGlobalProtectAppforiOSUsingAirWatch ..........................123
ConfiguretheGlobalProtectAppforAndroidUsingAirWatch......................126
ConfiguretheGlobalProtectAppforWindows10UWPUsingAirWatch ............130
ManagetheGlobalProtectAppUsingaThirdPartyMDM.............................133
ConfiguretheGlobalProtectAppforiOS.........................................133
Example:GlobalProtectiOSAppDeviceLevelVPNConfiguration ..................134
Example:GlobalProtectiOSAppAppLevelVPNConfiguration .....................135
ConfiguretheGlobalProtectAppforAndroid.....................................136
Example:SetVPNConfiguration ................................................137
Example:RemoveVPNConfiguration............................................137
4 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
TableofContents
GlobalProtectReferenceArchitecture .................................189
GlobalProtectReferenceArchitectureTopology...................................... 190
GlobalProtectPortal .......................................................... 190
GlobalProtectGateways ....................................................... 191
GlobalProtectReferenceArchitectureFeatures...................................... 192
EndUserExperience .......................................................... 192
ManagementandLogging ..................................................... 192
MonitoringandHighAvailability ................................................ 193
GlobalProtectReferenceArchitectureConfigurations ................................. 194
GatewayConfiguration ........................................................ 194
PortalConfiguration .......................................................... 194
PolicyConfigurations.......................................................... 194
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 5
TableofContents
6 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
GlobalProtectOverview
Whethercheckingemailfromhomeorupdatingcorporatedocumentsfromtheairport,themajorityof
today'[Link]
[Link]
usersleavethebuildingwiththeirlaptopsormobiledevicestheyarebypassingthecorporatefirewalland
[Link]
securitychallengesintroducedbyroamingusersbyextendingthesamenextgenerationfirewallbased
policiesthatareenforcedwithinthephysicalperimetertoallusers,nomatterwheretheyarelocated.
ThefollowingsectionsprovideconceptualinformationaboutthePaloAltoNetworksGlobalProtectoffering
anddescribethecomponentsofGlobalProtectandthevariousdeploymentscenarios:
AbouttheGlobalProtectComponents
WhatClientOSVersionsareSupportedwithGlobalProtect?
WhatFeaturesDoesGlobalProtectSupport?
AboutGlobalProtectLicenses
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 7
AbouttheGlobalProtectComponents GlobalProtectOverview
AbouttheGlobalProtectComponents
GlobalProtectprovidesacompleteinfrastructureformanagingyourmobileworkforcetoenablesecure
accessforallyourusers,[Link]
infrastructureincludesthefollowingcomponents:
GlobalProtectPortal
GlobalProtectGateways
GlobalProtectClient
GlobalProtectPortal
[Link]
clientsystemthatparticipatesintheGlobalProtectnetworkreceivesconfigurationinformationfromthe
portal,includinginformationaboutavailablegatewaysaswellasanyclientcertificatesthatmayberequired
toconnecttotheGlobalProtectgateway(s).Inaddition,theportalcontrolsthebehavioranddistributionof
theGlobalProtectagentsoftwaretobothMacandWindowslaptops.(Onmobiledevices,theGlobalProtect
appisdistributedthroughtheAppleAppStoreforiOSdevicesorthroughGooglePlayforAndroiddevices.)
IfyouareusingtheHostInformationProfile(HIP)feature,theportalalsodefineswhatinformationtocollect
fromthehost,[Link]
interfaceonanyPaloAltoNetworksnextgenerationfirewall.
GlobalProtectGateways
GlobalProtectgatewaysprovidesecurityenforcementfortrafficfromGlobalProtectagents/apps.
Additionally,iftheHIPfeatureisenabled,thegatewaygeneratesaHIPreportfromtherawhostdatathe
clientssubmitandcanusethisinformationinpolicyenforcement.
ExternalgatewaysProvidesecurityenforcementand/orvirtualprivatenetwork(VPN)accessforyour
remoteusers.
InternalgatewaysAninterfaceontheinternalnetworkconfiguredasaGlobalProtectgatewayfor
[Link]/or
HIPchecks,aninternalgatewaycanbeusedtoprovideasecure,accuratemethodofidentifyingand
controllingtrafficbyuserand/[Link]
[Link]
eithertunnelmodeornontunnelmode.
YouConfigureGlobalProtectGatewaysonaninterfaceonanyPaloAltoNetworksnextgeneration
[Link],oryoucanhavemultiple,
distributedgatewaysthroughoutyourenterprise.
8 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
GlobalProtectOverview AbouttheGlobalProtectComponents
GlobalProtectClient
TheGlobalProtectclientsoftwarerunsonendusersystemsandenablesaccesstoyournetworkresources
[Link]:
TheGlobalProtectAgentRunsonWindowsandMacOSsystemsandisdeployedfromthe
[Link],whichtabstheuserscansee,
whetherornotuserscanuninstalltheagentintheclientconfiguration(s)[Link]
DefinetheGlobalProtectAgentConfigurations,CustomizetheGlobalProtectAgent,andDeploythe
GlobalProtectAgentSoftwarefordetails.
TheGlobalProtectAppRunsoniOS,Android,WindowsUWP,[Link]
obtaintheGlobalProtectappfromtheAppleAppStore(foriOS),GooglePlay(forAndroid),Microsoft
Store(forWindowsUWP),orChromeWebStore(forChromebook).
SeeWhatClientOSVersionsareSupportedwithGlobalProtect?formoredetails.
ThefollowingdiagramillustrateshowtheGlobalProtectportals,gateways,andagents/appsworktogether
toenablesecureaccessforallyourusers,regardlessofwhatdevicestheyareusingorwheretheyare
located.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 9
WhatClientOSVersionsareSupportedwithGlobalProtect? GlobalProtectOverview
WhatClientOSVersionsareSupportedwithGlobalProtect?
PaloAltoNetworkssupportstheGlobalProtectapp(alsoreferredtoastheGlobalProtectagent)oncommon
desktop,laptop,[Link]
PANOS6.1oralaterreleaseandthatyouinstallonlysupportedreleasesoftheGlobalProtectappon
[Link];todeterminetheminimum
GlobalProtectappreleaseforaspecificoperatingsystem,refertothefollowingtopicsinthePaloAlto
NetworksCompatibilityMatrix:
WhereCanIInstalltheGlobalProtectApp?
WhatXAuthIPSecClientsareSupported?
OlderversionsoftheGlobalProtectapp(releases1.0through2.1)arestillsupportedontheoperating
[Link]
GlobalProtectapp2.1andolderreleases,refertotheGlobalProtectagent(app)releasenotesforyour
specificreleaseontheSoftwareUpdatessite(youmustbearegisteredusertoaccessthissite).
10 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
GlobalProtectOverview WhatFeaturesDoesGlobalProtectSupport?
WhatFeaturesDoesGlobalProtectSupport?
[Link]
[Link]
recommendedminimumGlobalProtectagentandappversions,seeWhatClientOSVersionsareSupported
withGlobalProtect?
ConnectMethods
Modes
SingleSignOn(SSO)
SSO(Credential 1.2.0
Provider)
KerberosSSO 3.0.0
Customization
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 11
WhatFeaturesDoesGlobalProtectSupport? GlobalProtectOverview
12 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
GlobalProtectOverview AboutGlobalProtectLicenses
AboutGlobalProtectLicenses
IfyousimplywanttouseGlobalProtecttoprovideasecure,remoteaccessorvirtualprivatenetwork(VPN)
solutionviasingleormultipleinternal/externalgateways,youdonotneedanyGlobalProtectlicenses.
However,tousesomeofthemoreadvancedfeatures,suchHIPchecksandassociatedcontentupdatesand
supportfortheGlobalProtectmobileapp,[Link]
mustbeinstalledoneachfirewallrunningagateway(s)thatperformsHIPchecksandthatsupportsthe
GlobalProtectapponmobiledevices.
Feature GatewaySubscription
Single,externalgateway(WindowsandMac)
Singleormultipleinternalgateways
Multipleexternalgateways
HIPChecks
MobileappforiOSendpoints,Androidendpoints,
Chromebooks,andWindows10UWPendpoints
SeeActivateLicensesforinformationoninstallinglicensesonthefirewall.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 13
AboutGlobalProtectLicenses GlobalProtectOverview
14 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure
ForGlobalProtecttowork,youmustsetuptheinfrastructurethatallowsallofthecomponentsto
[Link],thismeanssettinguptheinterfacesandzonestowhichtheGlobalProtectend
[Link]
communicateoversecurechannels,youmustacquireanddeploytherequiredSSLcertificatestothevarious
[Link]:
CreateInterfacesandZonesforGlobalProtect
EnableSSLBetweenGlobalProtectComponents
SetUpGlobalProtectUserAuthentication
EnableGroupMapping
ConfigureGlobalProtectGateways
ConfiguretheGlobalProtectPortal
EnableDeliveryofGlobalProtectClientVSAstoaRADIUSServer
DeploytheGlobalProtectClientSoftware
DeployAgentSettingsTransparently
Reference:GlobalProtectAgentCryptographicFunctions
GlobalProtectMIBSupport
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 15
CreateInterfacesandZonesforGlobalProtect SetUptheGlobalProtectInfrastructure
CreateInterfacesandZonesforGlobalProtect
YoumustconfigurethefollowinginterfacesandzonesforyourGlobalProtectinfrastructure:
GlobalProtectportalRequiresaLayer3orloopbackinterfacefortheGlobalProtectclientsconnection.
Iftheportalandgatewayareonthesamefirewall,[Link]
inazonethatisaccessiblefromoutsideyournetwork,forexample:DMZ.
GlobalProtectgatewaysTheinterfaceandzonerequirementsforthegatewaydependonwhetherthe
gatewayyouareconfiguringisexternalorinternal,asfollows:
ExternalgatewaysRequiresaLayer3orloopbackinterfaceandalogicaltunnelinterfaceforthe
clienttoestablishaVPNtunnel.TheLayer3/loopbackinterfacemustbeinanexternalzone,such
[Link]
resources(forexampletrust).Foraddedsecurityandbettervisibility,youcancreateaseparate
zone,[Link],youmustcreate
securitypoliciesthatenabletraffictoflowbetweentheVPNzoneandthetrustzone.
[Link]
atunnelinterfaceforaccesstoyourinternalgateways,butthisisnotrequired.
FortipsonhowtousealoopbackinterfacetoprovideaccesstoGlobalProtectondifferentportsandaddresses,
refertoCanGlobalProtectPortalPagebeConfiguredtobeAccessedonanyPort?
Formoreinformationaboutportalsandgateways,seeAbouttheGlobalProtectComponents.
SetUpInterfacesandZonesforGlobalProtect
16 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure CreateInterfacesandZonesforGlobalProtect
SetUpInterfacesandZonesforGlobalProtect(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 17
EnableSSLBetweenGlobalProtectComponents SetUptheGlobalProtectInfrastructure
EnableSSLBetweenGlobalProtectComponents
AllinteractionbetweentheGlobalProtectcomponentsoccursoveranSSL/[Link],you
mustgenerateand/orinstalltherequiredcertificatesbeforeconfiguringeachcomponentsothatyoucan
referencetheappropriatecertificate(s)[Link]
methodsofcertificatedeployment,descriptionsandbestpracticeguidelinesforthevariousGlobalProtect
certificates,andprovideinstructionsforgeneratinganddeployingtherequiredcertificates:
AboutGlobalProtectCertificateDeployment
GlobalProtectCertificateBestPractices
DeployServerCertificatestotheGlobalProtectComponents
AboutGlobalProtectCertificateDeployment
TherearethreebasicapproachestoDeployServerCertificatestotheGlobalProtectComponents:
(Recommended)CombinationofthirdpartycertificatesandselfsignedcertificatesBecausetheend
clientswillbeaccessingtheportalpriortoGlobalProtectconfiguration,theclientmusttrustthe
certificatetoestablishanHTTPSconnection.
EnterpriseCertificateAuthorityIfyoualreadyhaveyourownenterpriseCA,youcanusethisinternal
CAtoissuecertificatesforeachoftheGlobalProtectcomponentsandthenimportthemontothe
firewallshostingyourportalandgateway(s).Inthiscase,youmustalsoensurethattheenduser
systems/mobiledevicestrusttherootCAcertificateusedtoissuethecertificatesfortheGlobalProtect
servicestowhichtheymustconnect.
SelfSignedCertificatesYoucangenerateaselfsignedCAcertificateontheportalanduseittoissue
[Link],thissolutionislesssecurethantheother
[Link],enduserswillseeacertificate
[Link],youcandeploytheselfsignedrootCA
certificatetoallendusersystemsmanuallyorusingsomesortofcentralizeddeployment,suchasan
ActiveDirectoryGroupPolicyObject(GPO).
GlobalProtectCertificateBestPractices
ThefollowingtablesummarizestheSSL/TLScertificatesyouwillneed,dependingonwhichfeaturesyou
plantouse:
Table:GlobalProtectCertificateRequirements
Certificate Usage IssuingProcess/BestPractices
18 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure EnableSSLBetweenGlobalProtectComponents
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 19
EnableSSLBetweenGlobalProtectComponents SetUptheGlobalProtectInfrastructure
FordetailsaboutthetypesofkeysforsecurecommunicationbetweentheGlobalProtectendpointandthe
portalsandgateways,seeReference:GlobalProtectAgentCryptographicFunctions.
20 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure EnableSSLBetweenGlobalProtectComponents
DeployServerCertificatestotheGlobalProtectComponents
ThefollowingtableshowsthebestpracticestepsfordeployingSSL/TLScertificatestotheGlobalProtect
components:
DeploySSLServerCertificatestotheGlobalProtectComponents
Importaservercertificatefromawellknown, Beforeyouimportacertificate,makesurethecertificateandkey
thirdpartyCA. filesareaccessiblefromyourmanagementsystemandthatyou
Useaservercertificatefroma havethepassphrasetodecrypttheprivatekey.
wellknown,thirdpartyCAforthe 1. SelectDevice > Certificate Management > Certificates >
[Link] Device Certificates.
ensuresthattheendusersareableto
2. ClickImport.
establishanHTTPSconnectionwithout
seeingwarningsaboutuntrusted 3. UsetheLocalcertificatetype(thedefault).
certificates. 4. EnteraCertificate Name.
TheCNand,ifapplicable,theSANfields
5. EnterthepathandnametotheCertificate Filereceivedfrom
ofthecertificatemustmatchtheFQDN
theCA,orBrowsetofindthefile.
orIPaddressoftheinterfacewhereyou
plantoconfiguretheportalorthedevice 6. SelectEncrypted Private Key and Certificate (PKCS12)asthe
checkininterfaceonathirdparty File Format.
mobileendpointmanagementsystem. 7. EnterthepathandnametothePKCS#12fileintheKey File
Wildcardmatchesaresupported. fieldorBrowsetofindit.
8. EnterandreenterthePassphrasethatwasusedtoencrypt
theprivatekeyandthenclickOKtoimportthecertificateand
key.
CreatetherootCAcertificateforissuing Beforedeployingselfsignedcertificates,youmustcreatetheroot
selfsignedcertificatesfortheGlobalProtect CAcertificatethatsignsthecertificatesfortheGlobalProtect
components. components:
CreatetheRootCAcertificateonthe 1. SelectDevice > Certificate Management > Certificates >
portalanduseittoissueserver Device Certificates andthenclickGenerate.
certificatesforthegatewaysand,
2. UsetheLocalcertificatetype(thedefault).
optionally,forclients.
3. EnteraCertificate Name,suchasGlobalProtect_CA.The
certificatenamecannotcontainspaces.
4. DonotselectavalueintheSigned Byfield.(Withouta
selectionforSigned By,thecertificateisselfsigned.)
5. SelecttheCertificate Authoritycheckbox.
6. ClickOKtogeneratethecertificate.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 21
EnableSSLBetweenGlobalProtectComponents SetUptheGlobalProtectInfrastructure
DeploySSLServerCertificatestotheGlobalProtectComponents(Continued)
22 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure EnableSSLBetweenGlobalProtectComponents
DeploySSLServerCertificatestotheGlobalProtectComponents(Continued)
UseSimpleCertificateEnrollmentProtocol 1. ConfigureaSCEPProfileforeachGlobalProtectportalor
(SCEP)torequestaservercertificatefromyour gateway:
enterpriseCA. a. EnteraNamethatidentifiestheSCEPprofileandthe
ConfigureseparateSCEPprofilesfor [Link]
eachportalandgatewayyouplanto thisprofileisforafirewallwithmultiplevirtualsystems
[Link] capability,selectavirtualsystemorSharedastheLocation
profiletogeneratetheservercertificate wheretheprofileisavailable.
foreachGlobalProtectcomponent. b. (Optional)ConfigureaSCEP Challengeresponse
Inportalandgatewayservercertificates, mechanismbetweenthePKIandportalforeachcertificate
thevalueoftheCNfieldmustincludethe [Link]
FQDN(recommended)orIPaddressof obtainfromtheSCEPserveroraDynamicpasswordwhere
theinterfacewhereyouplanto theportalclientsubmitsausernameandOTPofyour
configuretheportalorgatewayandmust [Link],
beidenticaltotheSANfield. thiscanbethecredentialsofthePKIadministrator.
[Link] c. ConfiguretheServer URLthattheportalusestoreachthe
InformationProcessingStandard(FIPS), SCEPserverinthePKI(forexample,
youmustalsoenablemutualSSL [Link]
authenticationbetweentheSCEPserver d. Enterastring(upto255charactersinlength)inthe
andtheGlobalProtectportal.(FIPSCC CA-IDENT NamefieldtoidentifytheSCEPserver.
operationisindicatedonthefirewall e. EntertheSubjectnametouseinthecertificatesgenerated
loginpageandinitsstatusbar.) [Link]
Afteryoucommittheconfiguration,theportal name(CN)keyintheformatCN=<value>where<value> is
attemptstorequestaCAcertificateusingthe theFQDNorIPaddressoftheportalorgateway.
[Link],the f. SelecttheSubject Alternative Name [Link]
firewallhostingtheportalsavestheCA emailnameinacertificatessubjectorSubjectAlternative
certificateanddisplaysitinthelistofDevice Nameextension,selectRFC 822 [Link]
Certificates. theDNS Name tousetoevaluatecertificates,orthe
Uniform Resource Identifier toidentifytheresourcefrom
whichtheclientwillobtainthecertificate.
g. Configureadditionalcryptographicsettingsincludingthe
keylength(Number of Bits),andDigestalgorithmforthe
certificatesigningrequest.
h. Configurethepermittedusesofthecertificate,eitherfor
signing(Use as digital signature)orencryption(Use for
key encipherment).
i. ToensurethattheportalisconnectingtothecorrectSCEP
server,entertheCA Certificate [Link]
fingerprintfromtheSCEPserverinterfaceinthe
Thumbprintfield.
j. EnablemutualSSLauthenticationbetweentheSCEPserver
andtheGlobalProtectportal.
k. ClickOKandthenCommittheconfiguration.
2. SelectDevice > Certificate Management > Certificates >
Device Certificates andthenclickGenerate.
3. EnteraCertificate [Link].
4. SelecttheSCEP Profiletousetoautomatetheprocessof
issuingaservercertificatethatissignedbytheenterpriseCA
toaportalorgateway,andthenclickOKtogeneratethe
[Link]
SCEPprofiletosubmitaCSRtoyourenterprisePKI.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 23
EnableSSLBetweenGlobalProtectComponents SetUptheGlobalProtectInfrastructure
DeploySSLServerCertificatestotheGlobalProtectComponents(Continued)
Deploytheselfsignedservercertificates. Exportthecertificatefromtheportal:
Exporttheselfsignedserver 1. SelectDevice > Certificate Management > Certificates >
certificatesissuedbytherootCAon Device Certificates.
theportalandimportthemontothe
2. Selectthegatewaycertificateyouwanttodeployandclick
gateways.
Export.
Besuretoissueauniqueserver
certificateforeachgateway. 3. IntheFile Format dropdown,selectEncrypted Private Key
and Certificate (PKCS12).
Ifspecifyingselfsigned
certificates,youmustdistributethe 4. Enter(andreenter)aPassphrasetoencrypttheprivatekey.
RootCAcertificatetotheend 5. ClickOKtodownloadthePKCS12filetoalocationofyour
clientsintheportalclient choice.
configurations.
Importthecertificateonthegateway:
1. SelectDevice > Certificate Management > Certificates >
Device Certificates.
2. ClickImport.
3. EnteraCertificate Name.
4. BrowsetofindandselecttheCertificate Fileyou
downloadedinstep5,above.
5. IntheFile Format dropdown,selectEncrypted Private Key
and Certificate (PKCS12).
6. Enter(andreenter)thePassphraseyouusedtoencryptthe
privatekeywhenyouexporteditfromtheportal.
7. ClickOKtoimportthecertificateandkey.
8. Committhechangestothegateway.
24 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
SetUpGlobalProtectUserAuthentication
TheGlobalProtectportalandgatewaymustauthenticatetheenduserbeforeitallowsaccessto
[Link]
[Link]
configurethem:
AboutGlobalProtectUserAuthentication
SetUpExternalAuthentication
SetUpClientCertificateAuthentication
SetUpTwoFactorAuthentication
SetUpAuthenticationforstrongSwanUbuntuandCentOSClients
AboutGlobalProtectUserAuthentication
ThefirsttimeaGlobalProtectclientconnectstotheportal,theuserispromptedtoauthenticatetothe
[Link],theGlobalProtectportalsendstheGlobalProtectconfiguration,which
includesthelistofgatewaystowhichtheagentcanconnect,andoptionallyaclientcertificateforconnecting
[Link],theclientattemptsto
[Link]
yournetworkresourcesandsettings,theyalsorequiretheendusertoauthenticate.
Theappropriatelevelofsecurityrequiredontheportalandgatewaysvarieswiththesensitivityofthe
[Link]
youtochoosetheauthenticationprofileandcertificateprofilethatareappropriatetoeachcomponent.
SupportedGlobalProtectAuthenticationMethods
HowDoestheAgentorAppKnowWhatCredentialstoSupplytothePortalandGateway?
SupportedGlobalProtectAuthenticationMethods
ThefollowingtabledescribestheauthenticationmethodsthatGlobalProtectsupportsandprovidesusage
guidelines.
AuthenticationMethod Description
LocalAuthentication Boththeuseraccountcredentialsandtheauthenticationmechanismsarelocaltothe
[Link]
everyGlobalProtectuserandis,therefore,advisableforonlyverysmalldeployments.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 25
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
AuthenticationMethod Description
Externalauthentication TheuserauthenticationfunctionsareperformedbyanexternalLDAP,Kerberos,
TACACS+,orRADIUSservice(includingsupportfortwofactor,tokenbased
authenticationmechanisms,suchasonetimepassword(OTP)authentication).Toenable
externalauthentication:
Createaserverprofilewithsettingsforaccesstotheexternalauthenticationservice.
Createanauthenticationprofilethatreferstotheserverprofile.
Specifyclientauthenticationintheportalandgatewayconfigurationsandoptionally
specifytheOSoftheendpointthatwillusethesesettings.
[Link]
[Link](Authentication
Profile)foranexampleconfiguration.
Clientcertificate Forenhancedsecurity,youcanconfiguretheportalorgatewaytouseaclientcertificate
authentication toobtaintheusernameandauthenticatetheuserbeforegrantingaccesstothesystem.
Toauthenticatetheuser,oneofthecertificatefields,suchastheSubjectNamefield,
mustidentifytheusername.
Toauthenticatetheendpoint,theSubjectfieldofthecertificatemustidentifythedevice
typeinsteadoftheusername.(Withtheprelogonconnectmethods,theportalor
gatewayauthenticatestheendpointbeforetheuserlogsin.)
Foranagentconfigurationprofilethatspecifiesclientcertificates,eachuserreceivesa
[Link]
certificateisuniquetoeachclientorthesameforallclientsunderthatagentconfiguration:
Todeployclientcertificatesthatareuniquetoeachuseranddevice,[Link]
userfirstlogsin,[Link]
obtainsauniquecertificateanddeploysittotheclient.
Todeploythesameclientcertificatetoallusersthatreceiveanagentconfiguration,
deployacertificatethatisLocaltothefirewall.
Useanoptionalcertificateprofiletoverifytheclientcertificatethataclientpresentswith
[Link]
userdomainfields;listsCAcertificates;criteriaforblockingasession;andofferswaysto
[Link]
incertificateprofilestotheendpointsbeforetheusersinitialportalloginbecausethe
certificateispartoftheauthenticationoftheendpointoruserforanewsession.
[Link]
certificateprofilespecifiesSubjectintheUsernameField,thecertificatepresentedbythe
[Link]
specifiesaSubjectAltwithanEmailorPrincipalNameastheUsernameField,the
certificatefromtheclientmustcontainthecorrespondingfields,whichwillbeusedasthe
usernamewhentheGlobalProtectagentauthenticatestotheportalorgateway.
GlobalProtectalsosupportsauthenticationbycommonaccesscards(CACs)andsmart
cards,[Link],thecertificateprofilemust
containtherootCAcertificatethatissuedthecertificatetothesmartcardorCAC.
Ifyouspecifyclientcertificateauthentication,youshouldnotconfigureaclientcertificate
intheportalconfigurationbecausetheclientsystemprovidesitwhentheuserconnects.
Foranexampleofhowtoconfigureclientcertificateauthentication,seeRemoteAccess
VPN(CertificateProfile).
26 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
AuthenticationMethod Description
Twofactor Withtwofactorauthentication,theportalorgatewayusestwomechanismsto
authentication authenticateauser,[Link]
canenabletwofactorauthenticationontheportalandgatewaysbyconfiguringa
certificateprofileandanauthenticationprofileandaddingthembothtotheportaland/or
gatewayconfiguration.
Youcanconfiguretheportalandgatewaystousethesameauthenticationmethodsoruse
[Link],withtwofactorauthentication,theclientmustsuccessfully
authenticatebythetwomechanismsthatthecomponentdemandsbeforeitgrantsaccess.
IfthecertificateprofilespecifiesaUsernameFieldfromwhichGlobalProtectcanobtaina
username,theexternalauthenticationserviceautomaticallyusestheusernameto
authenticatetheusertotheexternalauthenticationservicespecifiedintheauthentication
[Link],iftheUsernameFieldinthecertificateprofileissettoSubject,the
valueinthecommonnamefieldofthecertificateisusedastheusernamewhenthe
[Link]
authenticatewithausernamefromthecertificate,makesurethecertificateprofileissetto
[Link]
anexampleconfiguration.
HowDoestheAgentorAppKnowWhatCredentialstoSupplytothePortalandGateway?
Bydefault,theGlobalProtectagentattemptstousethesamelogincredentialsforthegatewaythatitused
[Link],wherethegatewayandtheportalusethesameauthenticationprofile
and/orcertificateprofile,theagentwillconnecttothegatewaytransparently.
Onaperagentconfigurationbasis,youcanalsocustomizewhichGlobalProtectportalandgateways
internal,external,ormanualonlyrequiredifferentcredentials(suchasuniqueOTPs).Thisenablesthe
GlobalProtectportalorgatewaytopromptfortheuniqueOTPwithoutfirstpromptingforthecredentials
specifiedintheauthenticationprofile.
Therearetwooptionsformodifyingthedefaultagentauthenticationbehaviorsothatauthenticationisboth
strongerandfaster:
CookieAuthenticationonthePortalorGateway
CredentialForwardingtoSomeorAllGateways
CookieAuthenticationonthePortalorGateway
Cookieauthenticationsimplifiestheauthenticationprocessforendusersbecausetheywillnolongerbe
requiredtologintoboththeportalandthegatewayinsuccessionorentermultipleOTPsforauthenticating
[Link]
[Link],cookiesenableuseofatemporarypasswordtoreenableVPNaccessaftertheusers
passwordexpires.
Youcanconfigurecookieauthenticationsettingsindependentlyfortheportalandforindividualgateways,
(forexample,youcanimposeashortercookielifetimeongatewaysthatprotectsensitiveresources).After
theportalorgatewaysdeployanauthenticationcookietotheendpoint,theportalandgatewaysbothrely
[Link],theportalorgateway
[Link],
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 27
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
[Link]
authenticationissuccessful,theportalorgatewayissuesthereplacementauthenticationcookietothe
endpointandthevalidityperiodstartsover.
Considerthefollowingexamplewhereyouconfigurethecookielifetimefortheportalwhichdoesnot
protectsensitiveinformationas15days,butconfigurethecookielifetimeforgatewayswhichdoprotect
[Link],theportalissuesthe
[Link],theuserattemptedtoconnecttotheportal,theauthentication
[Link],ifafterfivedaystheuserattemptedtoconnecttothegateway,the
gatewaywouldevaluatethecookielifetimeanddetermineitexpired(5days>24hours).Theagentwould
thenautomaticallyprompttheusertoauthenticatewiththegatewayand,onsuccessfulauthentication,
[Link]
15daysontheportalandanother24hoursonthegateways.
Foranexampleofhowtousethisoption,seeSetUpTwoFactorAuthentication.
CredentialForwardingtoSomeorAllGateways
Withtwofactorauthentication,youcanspecifytheportaland/ortypesofgateways(internal,external,or
manualonly)[Link]
whentheportalandthegatewayrequiredifferentcredentials(eitherdifferentOTPsordifferentlogin
credentialsentirely).Foreachportalorgatewaythatyouselect,theagentwillnotforwardcredentials,
[Link],youcanhave
thesamesecurityonyourportalsandinternalgateways,whilerequiringasecondfactorOTPoradifferent
passwordforaccesstothosegatewaysthatprovideaccesstoyourmostsensitiveresources.
Foranexampleofhowtousethisoption,seeSetUpTwoFactorAuthentication.
SetUpExternalAuthentication
ThefollowingworkflowdescribeshowtosetuptheGlobalProtectportalandgatewaystouseanexternal
[Link],Kerberos,RADIUS,orTACACS+.
Thisworkflowalsodescribeshowtocreateanoptionalauthenticationprofilethataportalorgatewaycanuse
[Link]
authenticationprofilealsocanspecifythelocalauthenticationdatabaseorNone.
[Link],createalocaluserdatabase(Device
> Local User Database)thatcontainstheusersandgroupstowhichyouwanttoallowVPNaccessandthen
refertothatdatabaseintheauthenticationprofile.
Formoreinformation,seeSupportedGlobalProtectAuthenticationMethodsorwatchavideo.
28 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
SetUpExternalUserAuthentication
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 29
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
SetUpExternalUserAuthentication(Continued)
30 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
SetUpExternalUserAuthentication(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 31
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
SetUpClientCertificateAuthentication
Withtheoptionalclientcertificateauthentication,theagent/apppresentsaclientcertificatealongwithits
[Link]
uniqueclientcertificatetovalidatethattheuserordevicebelongstoyourorganization.
Themethodsfordeployingclientcertificatesdependonthesecurityrequirementsforyourorganization:
DeploySharedClientCertificatesforAuthentication
DeployMachineCertificatesforAuthentication
DeployUserSpecificClientCertificatesforAuthentication
DeploySharedClientCertificatesforAuthentication
Toconfirmthatanendpointuserbelongstoyourorganization,youcanusethesameclientcertificateforall
[Link]
workflowtoissueselfsignedclientcertificatesforthispurposeanddeploythemfromtheportal.
DeploySharedClientCertificatesforAuthentication
32 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
DeployMachineCertificatesforAuthentication
Toconfirmthattheendpointbelongstoyourorganization,useyourownpublickeyinfrastructure(PKI)to
issueanddistributemachinecertificatestoeachendpoint(recommended)orgenerateaselfsignedmachine
[Link],amachinecertificateisrequiredandmustbe
installedontheendpointbeforeGlobalProtectcomponentswillgrantaccess.
Toconfirmthattheendpointbelongstoyourorganization,youmustalsoconfigureanauthenticationprofile
[Link].
[Link]
information,[Link],seeRemote
AccessVPN(CertificateProfile).
DeployMachineCertificatesforAuthentication
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 33
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
DeployMachineCertificatesforAuthentication(Continued)
4. ExpandCertificatesandselectPersonalandtheninthe
ActionscolumnselectPersonal > More Actions > All Tasks >
ImportandfollowthestepsintheCertificateImportWizardto
importthePKCSfileyougotfromtheCA.
5. Browsetothe.p12certificatefiletoimport(selectPersonal
Information Exchangeasthefiletypetobrowsefor)andenter
[Link]
PersonalastheCertificate store.
34 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
DeployMachineCertificatesforAuthentication(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 35
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
DeployMachineCertificatesforAuthentication(Continued)
DeployUserSpecificClientCertificatesforAuthentication
Toauthenticateindividualusers,youmustissueauniqueclientcertificatetoeachGlobalProtectuserand
[Link]
anddeploymentofuserspecificclientcertificates,youcanconfigureyourGlobalProtectportaltoactasa
SimpleCertificateEnrollmentProtocol(SCEP)clienttoaSCEPserverinyourenterprisePKI.
SCEPoperationisdynamicinthattheenterprisePKIgeneratesauserspecificcertificatewhentheportal
[Link]
[Link],theagentorappcanthenpresenttheclientcertificatetoauthenticate
withtheportalorgateway.
TheGlobalProtectportalorgatewayusesidentifyinginformationaboutthedeviceandusertoevaluate
[Link]
[Link]
aninvalidSCEPbasedclientcertificate,theGlobalProtectclienttriestoauthenticatewiththeportalperthe
[Link]
fromtheportal,thedeviceisnotabletoconnect.
DeployUserSpecificClientCertificatesforAuthentication
36 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
DeployUserSpecificClientCertificatesforAuthentication(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 37
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
DeployUserSpecificClientCertificatesforAuthentication(Continued)
SetUpTwoFactorAuthentication
Ifyourequirestrongauthenticationtoprotectsensitiveassetsortocomplywithregulatoryrequirements,
suchasPCI,SOX,orHIPAA,configureGlobalProtecttouseanauthenticationservicethatusesatwofactor
[Link]:somethingtheenduser
knows(suchasaPINorpassword)andsomethingtheenduserhas(ahardwareorsoftwaretoken/OTP,
smartcard,orcertificate).Youcanalsoenabletwofactorauthenticationusingacombinationofexternal
authenticationservices,andclientandcertificateprofiles.
ThefollowingtopicsprovideexamplesforhowtosetuptwofactorauthenticationonGlobalProtect:
EnableTwoFactorAuthenticationUsingCertificateandAuthenticationProfiles
EnableTwoFactorAuthenticationUsingOneTimePasswords(OTPs)
EnableTwoFactorAuthenticationUsingSmartCards
38 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
EnableTwoFactorAuthenticationUsingCertificateandAuthenticationProfiles
ThefollowingworkflowdescribeshowtoconfigureGlobalProtectclientauthenticationrequiringtheuserto
[Link]
authenticateusingbothmethodsinordertoconnecttotheportal/[Link]
configuration,seeRemoteAccessVPNwithTwoFactorAuthentication.
EnableTwoFactorAuthenticationUsingCertificateandAuthenticationProfiles
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 39
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
EnableTwoFactorAuthenticationUsingCertificateandAuthenticationProfiles(Continued)
40 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
EnableTwoFactorAuthenticationUsingOneTimePasswords(OTPs)
Usethisworkflowtoconfiguretwofactorauthenticationusingonetimepasswords(OTPs)ontheportal
[Link],[Link]
authenticationservicesendstheOTPasatokentotheusersRSAdevice.
Settingupatwofactorauthenticationschemeissimilartosettingupothertypesofauthenticationand
requiresyoutoconfigure:
Aserverprofile(usuallyforaRADIUSservicefortwofactorauthentication)assignedtoan
authenticationprofile.
Aclientauthenticationprofilethatincludestheauthenticationprofilefortheservicethatthese
componentsuse.
Bydefault,[Link]
caseofOTPauthentication,thisbehaviorwillcausetheauthenticationtoinitiallyfailonthegatewayand,
becauseofthedelaythiscausesinpromptingtheuserforalogin,[Link]
this,youmustconfiguretheportalsandgatewaysthatpromptfortheOTPinsteadofusingthesame
credentialsonaperagentconfigurationbasis.
YoucanalsoreducethefrequencyinwhichusersarepromptedforOTPsbyconfiguringanauthentication
[Link]
[Link]/orgatewayswillnotrequireanewOTP
untilthecookieexpiresthusreducingthenumberoftimesusersmustprovideanOTP.
EnableTwoFactorAuthenticationUsingOTPs
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 41
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
EnableTwoFactorAuthenticationUsingOTPs(Continued)
42 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
EnableTwoFactorAuthenticationUsingOTPs(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 43
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
EnableTwoFactorAuthenticationUsingOTPs(Continued)
44 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
EnableTwoFactorAuthenticationUsingOTPs(Continued)
ThesecondpromptrequestsyourtokenorOTP:
EnableTwoFactorAuthenticationUsingSmartCards
Ifyouwanttoenableyourenduserstoauthenticateusingasmartcardorcommonaccesscard(CAC),you
mustimporttheRootCAcertificatethatissuedthecertificatescontainedontheenduserCACorsmart
[Link]
applyittoyourportaland/orgatewayconfigurationstoenableuseofthesmartcardintheauthentication
process.
EnableSmartCardAuthentication
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 45
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
EnableSmartCardAuthentication(Continued)
46 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
EnableSmartCardAuthentication(Continued)
ThesecondpromptrequestsyourtokenorOTP:
SetUpAuthenticationforstrongSwanUbuntuandCentOSClients
ToextendGlobalProtectVPNremoteaccesssupporttostrongSwanUbuntuandCentOSclients,setup
authenticationforthestrongSwanclients.
ToviewtheminimumGlobalProtectreleaseversionthatsupportsstrongSwanonUbuntuLinuxandCentOS,see
WhatClientOSVersionsareSupportedwithGlobalProtect?.
ToconnecttotheGlobalProtectgateway,[Link]
[Link]
strongSwan,seethestrongSwanwiki.
EnableAuthenticationUsingaCertificateProfile
EnableAuthenticationUsinganAuthenticationProfile
EnableAuthenticationUsingTwoFactorAuthentication
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 47
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
EnableAuthenticationUsingaCertificateProfile
ThefollowingworkflowshowshowtoenableauthenticationforstrongSwanclientsusingacertificate
profile.
EnableAuthenticationUsingaCertificateProfile
48 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
EnableAuthenticationUsingaCertificateProfile(Continued)
EnableAuthenticationUsinganAuthenticationProfile
ThefollowingworkflowshowshowtoenableauthenticationforstrongSwanclientsusinganauthentication
[Link]
clients.
EnableAuthenticationUsinganAuthenticationProfile
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 49
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
EnableAuthenticationUsinganAuthenticationProfile(Continued)
50 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
EnableAuthenticationUsinganAuthenticationProfile(Continued)
EnableAuthenticationUsingTwoFactorAuthentication
Withtwofactorauthentication,thestrongSwanclientneedstosuccessfullyauthenticateusingbotha
[Link]
workflowshowshowtoenableauthenticationforstrongSwanclientsusingtwofactorauthentication.
EnableAuthenticationUsingTwoFactorAuthentication
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 51
SetUpGlobalProtectUserAuthentication SetUptheGlobalProtectInfrastructure
EnableAuthenticationUsingTwoFactorAuthentication(Continued)
52 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure SetUpGlobalProtectUserAuthentication
EnableAuthenticationUsingTwoFactorAuthentication(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 53
EnableGroupMapping SetUptheGlobalProtectInfrastructure
EnableGroupMapping
Becausetheagentorapprunningonyourendusersystemsrequirestheusertosuccessfullyauthenticate
beforebeinggrantedaccesstoGlobalProtect,[Link],if
youwanttobeabletodefineGlobalProtectconfigurationsand/orsecuritypoliciesbasedongroup
membership,thefirewallmustretrievethelistofgroupsandthecorrespondinglistofmembersfromyour
[Link].
Toenablethisfunctionality,youmustcreateanLDAPserverprofilethatinstructsthefirewallhowto
connectandauthenticatetothedirectoryserverandhowtosearchthedirectoryfortheuserandgroup
[Link],youcanselect
[Link]
LDAPdirectoryservers,includingMicrosoftActiveDirectory(AD),NovelleDirectory,andSunONE
DirectoryServer.
UsethefollowingproceduretoconnecttoyourLDAPdirectorytoenablethefirewalltoretrieve
usertogroupmappinginformation:
54 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure EnableGroupMapping
MapUserstoGroups
Step2 AddtheLDAPserverprofiletothe 1. SelectDevice > User Identification > Group Mapping Settings
UserIDGroupMappingconfiguration. andclickAdd.
2. EnteraNamefortheconfiguration.
3. SelecttheServer Profileyoujustcreated.
4. MakesuretheEnabledcheckboxisselected.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 55
EnableGroupMapping SetUptheGlobalProtectInfrastructure
MapUserstoGroups(Continued)
56 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfigureGlobalProtectGateways
ConfigureGlobalProtectGateways
BecausetheGlobalProtectconfigurationthattheportaldeliverstotheagentsincludesthelistofgateways
theclientcanconnectto,itisagoodideatoconfigurethegatewaysbeforeconfiguringtheportal.
TheGlobalProtectGatewayscanbeconfiguredtoprovidetwomainfunctions:
[Link]
[Link]
checks,seeUseHostInformationinPolicyEnforcement.
Providevirtualprivatenetwork(VPN)[Link]
anIPSecorSSLtunnelbetweentheclientandatunnelinterfaceonthegatewayfirewall.
[Link]
theVMSeriesfirewallintheAWScloudyoucanquicklyandeasilydeployGlobalProtectgatewaysinanyregion
withouttheexpenseorITlogisticsthataretypicallyrequiredtosetupthisinfrastructureusingyourown
[Link],seeUseCase:VMSeriesFirewallsasGlobalProtectGatewaysinAWS.
PrerequisiteTasksforConfiguringtheGlobalProtectGateway
BeforeyoucanconfiguretheGlobalProtectgateway,youmusthavecompletedthefollowingtasks:
Createdtheinterfaces(andzones)[Link]
gatewaysthatrequiretunnelconnectionsyoumustconfigureboththephysicalinterfaceandthevirtual
[Link].
SetupthegatewayservercertificatesandSSL/TLSserviceprofilerequiredfortheGlobalProtectagent
[Link].
Definedtheauthenticationprofilesand/orcertificateprofilesthatwillbeusedtoauthenticate
[Link].
ConfigureaGlobalProtectGateway
Afteryouhavecompletedtheprerequisitetasks,configuretheGlobalProtectGateways:
ConfiguretheGateway
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 57
ConfigureGlobalProtectGateways SetUptheGlobalProtectInfrastructure
ConfiguretheGateway(Continued)
58 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfigureGlobalProtectGateways
ConfiguretheGateway(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 59
ConfigureGlobalProtectGateways SetUptheGlobalProtectInfrastructure
ConfiguretheGateway(Continued)
60 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfigureGlobalProtectGateways
ConfiguretheGateway(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 61
ConfigureGlobalProtectGateways SetUptheGlobalProtectInfrastructure
ConfiguretheGateway(Continued)
62 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfigureGlobalProtectGateways
ConfiguretheGateway(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 63
ConfigureGlobalProtectGateways SetUptheGlobalProtectInfrastructure
ConfiguretheGateway(Continued)
64 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
ConfiguretheGlobalProtectPortal
[Link]
endpointthatparticipatesintheGlobalProtectnetworkreceivesconfigurationinformationfromtheportal,
includinginformationaboutavailablegatewaysaswellasanyclientcertificatesthatmayberequiredto
[Link],theportalcontrolsthebehavioranddistributionoftheGlobalProtect
agentsoftwaretobothMacandWindowslaptops.
[Link]
mobiledevices,endusersmustdownloaditfromthestorefortheirdevice:AppStoreforiOS,GooglePlayfor
Android,ChromeWebStoreforChromebooks,[Link],theagent
configurationsthatgetdeployedtomobileappusersdoescontrolthegateway(s)towhichthemobiledevices
[Link],seeWhatClientOSVersionsareSupportedwith
GlobalProtect?
Thefollowingsectionsprovideproceduresforsettinguptheportal:
PrerequisiteTasksforConfiguringtheGlobalProtectPortal
SetUpAccesstotheGlobalProtectPortal
DefinetheGlobalProtectClientAuthenticationConfigurations
DefinetheGlobalProtectAgentConfigurations
CustomizetheGlobalProtectAgent
CustomizetheGlobalProtectPortalLogin,Welcome,andHelpPages
PrerequisiteTasksforConfiguringtheGlobalProtectPortal
BeforeyoucanconfiguretheGlobalProtectPortal,youmustcompletethefollowingtasks:
Createtheinterfaces(andzones)[Link]
CreateInterfacesandZonesforGlobalProtect.
Setuptheportalservercertificate,gatewayservercertificate,SSL/TLSserviceprofiles,and,optionally,
anyclientcertificatestodeploytoenduserstoenableSSL/TLSconnectionsfortheGlobalProtect
[Link].
Definetheoptionalauthenticationprofilesandcertificateprofilesthattheportalcanuseto
[Link].
ConfigureGlobalProtectGatewaysandunderstandGatewayPriorityinaMultipleGateway
Configuration.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 65
ConfiguretheGlobalProtectPortal SetUptheGlobalProtectInfrastructure
SetUpAccesstotheGlobalProtectPortal
Afteryouhavecompletedtheprerequisitetasks,configuretheGlobalProtectPortalasfollows:
SetUpAccesstothePortal
66 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
DefinetheGlobalProtectClientAuthenticationConfigurations
EachGlobalProtectclientauthenticationconfigurationspecifiesthesettingsthatenabletheuserto
[Link]
[Link],youcanconfigureAndroiduserstouseRADIUS
[Link]
authenticationforuserswhoaccesstheportalfromawebbrowser(todownloadtheGlobalProtectagent)
orforthirdpartyIPSecVPN(XAuth)accesstoGlobalProtectgateways.
DefinetheGlobalProtectClientAuthenticationConfigurations
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 67
ConfiguretheGlobalProtectPortal SetUptheGlobalProtectInfrastructure
GatewayPriorityinaMultipleGatewayConfiguration
Toenablesecureaccessforyourmobileworkforcenomatterwheretheyarelocated,youcanstrategically
deployadditionalPaloAltoNetworksnextgenerationfirewallsandconfigurethemasGlobalProtect
[Link],addthegatewaystoaportal
[Link]
Configurations.
IfaGlobalProtectportalagentconfigurationcontainsmorethanonegateway,theagentwillattemptto
[Link]
[Link]
responsetimeforthehigherprioritygatewayisgreaterthantheaverageresponsetimeacrossallgateways.
Forexample,considerthefollowingresponsetimesforgw1andgw2:
Theagentdeterminesthattheresponsetimeforthegatewaywiththehighestpriority(highernumber)is
greaterthantheaverageresponsetimeforbothgateways(52.5ms)and,asaresult,[Link]
example,theagentdidnotconnecttogw1eventhoughithadahigherprioritybecausearesponsetimeof
80mswashigherthantheaverageforboth.
Nowconsiderthefollowingresponsetimesforgw1,gw2,andathirdgateway,gw3:
Inthisexample,[Link]
gatewaysrespondedfasterthantheaverageresponsetimeandseethatgw1andgw2bothhadfaster
[Link]
example,theagentconnectstogw1becausegw1hasthehighestpriorityofallthegatewayswithresponse
timesbelowtheaverage.
68 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
DefinetheGlobalProtectAgentConfigurations
AfteraGlobalProtectuserconnectstotheportalandisauthenticatedbytheGlobalProtectportal,theportal
sendstheagentconfigurationtotheagentorapp,[Link]
rolesforusersorgroupsthatneedspecificconfigurations,youcancreateaseparateagentconfigurationfor
[Link]
[Link],theportalstartsto
[Link],theportalsendstherightconfigurationto
theagentorapp.
Theconfigurationcanincludethefollowing:
Alistofgatewaystowhichtheclientcanconnect.
Amongtheexternalgateways,anygatewaythattheusercanmanuallyselectforthesession.
TherootCAcertificaterequiredtoenabletheagentorapptoestablishanSSLconnectionwiththe
GlobalProtectgateway(s).
TherootCAcertificateforSSLforwardproxydecryption.
[Link]
configurationisrequiredonlyifmutualauthenticationbetweentheclientandtheportalorgatewayis
required.
Asecureencryptedcookiethattheendpointshouldpresenttotheportalorgatewaywhenitconnects.
Thecookieisincludedonlyifyouenabletheportaltogenerateone.
Thesettingstheendpointusestodeterminewhetheritisconnectedtothelocalnetworkortoan
externalnetwork.
Settingsforthebehavioroftheagentorapp,suchaswhattheenduserscanseeintheirdisplay,whether
theycansavetheirGlobalProtectpassword,andwhethertheyarepromptedtoupgradetheirsoftware.
Iftheportalisdownorunreachable,theagentwillusethecachedversionofitsagentconfigurationfromitslast
successfulportalconnectiontoobtainsettings,includingthegateway(s)towhichtheagentcanconnect,what
rootCAcertificate(s)tousetoestablishsecurecommunicationwiththegateway(s),andwhatconnectmethod
touse.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 69
ConfiguretheGlobalProtectPortal SetUptheGlobalProtectInfrastructure
Usethefollowingproceduretocreateanagentconfiguration.
CreateaGlobalProtectAgentConfiguration
70 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
CreateaGlobalProtectAgentConfiguration(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 71
ConfiguretheGlobalProtectPortal SetUptheGlobalProtectInfrastructure
CreateaGlobalProtectAgentConfiguration(Continued)
72 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
CreateaGlobalProtectAgentConfiguration(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 73
ConfiguretheGlobalProtectPortal SetUptheGlobalProtectInfrastructure
CustomizetheGlobalProtectAgent
TheportalagentconfigurationallowsyoutocustomizehowyourendusersinteractwiththeGlobalProtect
[Link]
[Link]
informationonGlobalProtectclientrequirements,seeWhatClientOSVersionsareSupportedwith
GlobalProtect?
[Link],youcanspecifythefollowing:
Whatmenusandviewsuserscanaccess.
Whetheruserscandisabletheagent(appliestotheuserlogonconnectmethodonly).
[Link]
usercandismissthewelcomepageandyoucancreatecustomwelcomeandhelppagesthatexplainhow
[Link],Welcome,
andHelpPages.
Whetheragentupgradesoccurautomaticallyorwhetherusersarepromptedtoupgrade.
[Link]
WindowsclientsyoucanalsodefineagentsettingsdirectlyfromtheWindowsinstaller(Msiexec).
Settingsdefinedintheportalagentconfigurationsinthewebinterfacetakeprecedenceover
settingsdefinedintheWindowsregistry/[Link],seeDeploy
AgentSettingsTransparently.
AdditionaloptionsthatareavailablethroughtheWindowscommandline(Msiexec)orWindowsregistry
only,enableyouto(formoreinformation,seeCustomizableAgentSettings):
SpecifywhethertheagentshouldprompttheenduserforcredentialsifWindowsSSOfails.
SpecifythedefaultportalIPaddress(orhostname).
EnableGlobalProtecttoinitiateaVPNconnectionbeforetheuserlogsintotheendpoint.
DeployscriptsthatrunbeforeorafterGlobalProtectestablishesaVPNconnectionorafterGlobalProtect
disconnectstheVPNconnection.
EnabletheGlobalProtectagenttowrapthirdpartycredentialsontheWindowsclient,allowingforSSO
whenusingathirdpartycredentialprovider.
74 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
UsethefollowingproceduretocustomizetheGlobalProtectagent.
CustomizetheAgent
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 75
ConfiguretheGlobalProtectPortal SetUptheGlobalProtectInfrastructure
CustomizetheAgent(Continued)
76 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
CustomizetheAgent(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 77
ConfiguretheGlobalProtectPortal SetUptheGlobalProtectInfrastructure
CustomizetheAgent(Continued)
TolimitthenumberoftimesuserscandisabletheGlobalProtect
client,enteravalueintheMax Times User Can Disablefieldin
theDisableGlobalProtectApparea.Avalueof0(thedefault)
indicatesthatusersarenotlimitedinthenumberoftimesthey
candisabletheclient.
Torestricthowlongtheusermaybedisconnected,enteravalue
(inminutes)intheUser Can Disable Timeout (min)fieldinthe
DisableGlobalProtectApparea.Avalueof0(thedefault)means
thatthereisnorestrictiononhowlongtheusercankeepthe
clientdisabled.
78 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
CustomizetheAgent(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 79
ConfiguretheGlobalProtectPortal SetUptheGlobalProtectInfrastructure
CustomizetheAgent(Continued)
80 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
CustomizetheAgent(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 81
ConfiguretheGlobalProtectPortal SetUptheGlobalProtectInfrastructure
CustomizetheGlobalProtectPortalLogin,Welcome,andHelpPages
GlobalProtectprovidesdefaultlogin,welcome,and/[Link],youcancreateyourown
custompageswithyourcorporatebranding,acceptableusepolicies,andlinkstoyourinternalresources.
Youcanalternativelydisablebrowseraccesstotheportalloginpageinordertopreventunauthorizedattempts
toauthenticatetotheGlobalProtectportal(configuretheDisable login pageoptionfromNetwork >
GlobalProtect > Portals > portal_config > General).Withtheportalloginpagedisabled,youcaninsteaduse
asoftwaredistributiontool,suchasMicrosoftsSystemCenterConfigurationManager(SCCM),toallowyour
userstodownloadandinstalltheGlobalProtectagent.
CustomizethePortalLogin,Welcome,andHelpPages
82 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure ConfiguretheGlobalProtectPortal
CustomizethePortalLogin,Welcome,andHelpPages(Continued)
TestthehelppageRightclicktheGlobalProtecticoninthe
notificationarea(systemtray),[Link]
pagewilldisplay.
TestthewelcomepageRightclicktheGlobalProtecticoninthe
notificationarea(systemtray),andselectWelcome [Link]
newwelcomepagewilldisplay.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 83
EnableDeliveryofGlobalProtectClientVSAstoaRADIUSServer SetUptheGlobalProtectInfrastructure
EnableDeliveryofGlobalProtectClientVSAstoaRADIUS
Server
WhencommunicatingwithGlobalProtectportalsorgateways,GlobalProtectclientssendinformationthat
includestheclientIPaddress,operatingsystem(OS),hostname,userdomain,andGlobalProtectagent/app
[Link](VSAs)toa
RADIUSserverduringauthentication(bydefault,thefirewalldoesnotsendtheVSAs).RADIUS
[Link],RADIUS
administratorsmightusetheclientOSattributetodefineapolicythatmandatesregularpassword
authenticationforMicrosoftWindowsusersandonetimepassword(OTP)authenticationforGoogle
Androidusers.
Thefollowingareprerequisitesforthisprocedure:
ImportthePaloAltoNetworksRADIUSdictionaryintoyourRADIUSserver.
ConfigureaRADIUSserverprofileandassignittoanauthenticationprofile:seeSetUpExternal
Authentication.
AssigntheauthenticationprofiletoaGlobalProtectportalorgateway:seeSetUpAccesstothe
GlobalProtectPortalorConfigureaGlobalProtectGateway.
EnableDeliveryofGlobalProtectClientVSAstoaRADIUSServer
Step1 LogintothefirewallCLI.
Step2 EnterthecommandforeachVSAyouwanttosend.
username@hostname> set authentication radius-vsa-on client-source-ip
username@hostname> set authentication radius-vsa-on client-os
username@hostname> set authentication radius-vsa-on client-hostname
username@hostname> set authentication radius-vsa-on user-domain
username@hostname> set authentication radius-vsa-on client-gp-version
IfyoulaterwanttostopthefirewallfromsendingparticularVSAs,runthesamecommandsbutusethe
radius-vsa-offoptioninsteadofradius-vsa-on.
84 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure DeploytheGlobalProtectClientSoftware
DeploytheGlobalProtectClientSoftware
InordertoconnecttoGlobalProtect,[Link]
softwaredeploymentmethoddependsonthetypeofclientasfollows:
MacOSandMicrosoftWindowsendpointsRequiretheGlobalProtectagentsoftware,whichis
[Link],youmustdownloadthe
versionyouwantthehostsinyournetworktousetothefirewallhostingyourGlobalProtectportaland
[Link]
softwareonthefirewall,seeDeploytheGlobalProtectAgentSoftware.
[Link]
mobiledeviceapps,[Link]
instructionsonhowtodownloadandtesttheGlobalProtectappinstallation,seeDownloadandInstall
theGlobalProtectMobileApp.
[Link],theend
usermustdownloadtheGlobalProtectappeitherfromtheAppleAppStore(iOSdevices)orfromGoogle
Play(Androiddevices).ForinstructionsonhowtodownloadandtesttheGlobalProtectappinstallation,
seeDownloadandInstalltheGlobalProtectMobileApp.
[Link]
mobiledeviceapps,[Link]
[Link]
instructionsonhowtodownloadandtesttheGlobalProtectappinstallation,DownloadandInstallthe
GlobalProtectAppforChromeOS.
Formoredetails,seeWhatClientOSVersionsareSupportedwithGlobalProtect?
DeploytheGlobalProtectAgentSoftware
ThereareseveralwaystodeploytheGlobalProtectagentsoftware:
DirectlyfromtheportalDownloadtheagentsoftwaretothefirewallhostingtheportalandactivateit
[Link]
inthatitallowsyoutocontrolhowandwhenendusersreceiveupdatesbasedontheagentconfiguration
settingsyoudefineforeachuser,group,and/[Link],ifyouhavealargenumber
ofagentsthatrequireupdates,[Link]
Portalforinstructions.
FromawebserverIfyouhavealargenumberofhoststhatwillneedtoupgradetheagent
simultaneously,considerhostingtheagentupdatesonawebservertoreducetheloadonthefirewall.
SeeHostAgentUpdatesonaWebServerforinstructions.
TransparentlyfromthecommandlineForWindowsclients,youcanautomaticallydeployagent
settingsintheWindowsInstaller(Msiexec).However,toupgradetoalateragentversionusingMsiexec,
[Link],Msiexecallowsfordeploymentofagentsettings
[Link]
SettingsTransparently.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 85
DeploytheGlobalProtectClientSoftware SetUptheGlobalProtectInfrastructure
UsinggrouppolicyrulesInActiveDirectoryenvironments,theGlobalProtectAgentcanalsobe
distributedtoendusers,[Link]
[Link]
[Link]
automaticallydistributeprogramstohostcomputersorusers.
FromamobileendpointmanagementsystemIfyouuseanmobilemanagementsystemsuchasan
MDMorEMMtomanageyourmobiledevices,youcanusethesystemtodeployandconfigurethe
[Link].
HostAgentUpdatesonthePortal
ThesimplestwaytodeploytheGlobalProtectagentsoftwareistodownloadthenewagentinstallation
packagetothefirewallthatishostingyourportalandthenactivatethesoftwarefordownloadtotheagents
[Link],thefirewallmusthaveaserviceroutethatenablesitto
[Link],youcan
manuallydownloadtheagentsoftwarepackagefromthePaloAltoNetworksSoftwareUpdatessupportsite
usinganInternetconnectedcomputerandthenmanuallyuploadittothefirewall.
YoumusthaveavalidPaloAltoNetworksaccounttologintoanddownloadsoftwarefromtheSoftwareUpdates
[Link],goto
[Link]
Youdefinehowtheagentsoftwareupdatesaredeployedintheagentconfigurationsyoudefineonthe
portalwhethertheyhappenautomaticallywhentheagentconnectstotheportal,whethertheuseris
promptedtoupgradetheagent,orwhethertheendusercanmanuallycheckforanddownloadanewagent
[Link],seeDefinetheGlobalProtectAgentConfigurations.
HosttheGlobalProtectAgentonthePortal
86 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure DeploytheGlobalProtectClientSoftware
HosttheGlobalProtectAgentonthePortal(Continued)
HostAgentUpdatesonaWebServer
Ifyouhavealargenumberofendpointsthatwillneedtoinstalland/orupdatetheGlobalProtectagent
software,[Link]
[Link],thefirewall
hostingtheportalmustberunningPANOS4.1.7oralaterrelease.
HostGlobalProtectAgentImagesonaWebServer
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 87
DeploytheGlobalProtectClientSoftware SetUptheGlobalProtectInfrastructure
HostGlobalProtectAgentImagesonaWebServer(Continued)
TesttheAgentInstallation
Usethefollowingproceduretotesttheagentinstallation.
TesttheAgentInstallation
88 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure DeploytheGlobalProtectClientSoftware
TesttheAgentInstallation(Continued)
2. Whenpromptedtorunorsavethesoftware,clickRun.
3. Whenprompted,clickRuntolaunchtheGlobalProtectSetup
Wizard.
WheninitiallyinstallingtheGlobalProtectagent
softwareontheendpoint,theendusermustbelogged
intothesystemusinganaccountthathas
[Link]
updatesdonotrequireadministrativeprivileges.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 89
DeploytheGlobalProtectClientSoftware SetUptheGlobalProtectInfrastructure
TesttheAgentInstallation(Continued)
Todeploytheagenttoendusers,createagentconfigurationsfor
theusergroupsforwhichyouwanttoenableaccessandsetthe
Agent Upgradesettingsappropriatelyandthencommunicatethe
[Link]
fordetailsonsettingupagentconfigurations.
DownloadandInstalltheGlobalProtectMobileApp
TheGlobalProtectappprovidesasimplewaytoextendtheenterprisesecuritypoliciesouttomobile
[Link],themobileappprovidessecureaccess
[Link]
[Link],traffictoandfromthemobiledevice
isautomaticallysubjecttothesamesecuritypolicyenforcementasotherhostsonyourcorporatenetwork.
LiketheGlobalProtectagent,theappcollectsinformationaboutthehostconfigurationandcanusethis
informationforenhancedHIPbasedsecuritypolicyenforcement.
TherearetwoprimarymethodsforinstallingtheGlobalProtectapp:Youcandeploytheappfromyour
thirdpartyMDMandtransparentlypushtheapptoyourmanageddevices;or,youcaninstalltheapp
directlyfromtheofficialstoreforyourdevice:
iOSendpointsAppStore
AndroidendpointsGooglePlay
Windows10phonesandWindows10UWPendpointsMicrosoftStore
ChromebooksFordetailsoninstallingtheGlobalProtectappforChromeOS,seeDownloadandInstall
theGlobalProtectAppforChromeOS.
[Link]
onhowtodeploytheGlobalProtectappfromAirWatch,seeDeploytheGlobalProtectMobileAppUsing
AirWatch.
90 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure DeploytheGlobalProtectClientSoftware
InstalltheGlobalProtectMobileApp
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 91
DeploytheGlobalProtectClientSoftware SetUptheGlobalProtectInfrastructure
InstalltheGlobalProtectMobileApp(Continued)
2. TapConnect andverifythattheappsuccessfullyestablishesa
VPNconnectiontoGlobalProtect.
Ifathirdpartymobileendpointmanagementsystemis
configured,theappwillpromptyoutoenroll.
92 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure DeploytheGlobalProtectClientSoftware
DownloadandInstalltheGlobalProtectAppforChromeOS
TheGlobalProtectappforChromeOSprovidesasimplewaytoextendtheenterprisesecuritypoliciesout
[Link],theappprovidessecure
[Link],the
[Link],traffictoand
fromtheChromebookisautomaticallysubjecttothesamesecuritypolicyenforcementasotherhostson
[Link],theappcollectsinformationaboutthehost
configurationandcanusethisinformationforenhancedHIPbasedsecuritypolicyenforcement.
UsethefollowingprocedurestoinstallandtesttheGlobalProtectappforChromeOS.
InstalltheGlobalProtectAppfromtheChromeWebStore
DeploytheGlobalProtectAppUsingtheChromebookManagementConsole
TesttheGlobalProtectappforChromeOS
InstalltheGlobalProtectAppfromtheChromeWebStore
YoucaninstalltheGlobalProtectapponaChromebookbydownloadingtheappfromtheChromeWeb
[Link]
Console.
InstalltheGlobalProtectAppfromtheChromeWebStore
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 93
DeploytheGlobalProtectClientSoftware SetUptheGlobalProtectInfrastructure
InstalltheGlobalProtectAppfromtheChromeWebStore(Continued)
DeploytheGlobalProtectAppUsingtheChromebookManagementConsole
TheChromebookManagementConsoleenablesyoutomanageChromebooksettingsandappsfroma
central,[Link],youcandeploytheGlobalProtectapptoChromebooksand
customizeVPNsettings.
UsethefollowingworkflowtomanagepoliciesandsettingsfortheGlobalProtectappforChromeOS:
ConfiguretheGlobalProtectAppUsingtheChromebookManagementConsole
94 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure DeploytheGlobalProtectClientSoftware
ConfiguretheGlobalProtectAppUsingtheChromebookManagementConsole(Continued)
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 95
DeploytheGlobalProtectClientSoftware SetUptheGlobalProtectInfrastructure
TesttheGlobalProtectappforChromeOS
UsetheGlobalProtectapptoviewstatusandotherinformationabouttheapportocollectlogs,orresetthe
[Link],itisnotnecessarytoopentheappto
[Link],youcanconnectbyselectingtheportalfromtheVPNsettingsonthe
Chromebook.
TesttheGlobalProtectAppforChromeOS
Toviewadditionalinformationabouttheconnectionincluding
thegatewaytowhichyouareconnected,launchthe
[Link]
informationand(ifapplicable)anyerrorsorwarnings.
96 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure DeployAgentSettingsTransparently
DeployAgentSettingsTransparently
Asanalternativetodeployingagentsettingsfromtheportalconfiguration,youcandefinethemdirectly
fromtheWindowsregistryorglobalMacplistoronWindowsclientsonlyusingtheWindowsInstaller
(Msiexec).ThebenefitisthatitenablesdeploymentofGlobalProtectagentsettingstoendpointspriorto
theirfirstconnectiontotheGlobalProtectportal.
SettingsdefinedintheportalconfigurationalwaysoverridesettingsdefinedintheWindowsregistryorMac
[Link],buttheportalconfigurationspecifiesdifferentsettings,
[Link]
alsoappliestologinrelatedsettings,suchaswhethertoconnectondemand,whethertousesinglesignon
(SSO),[Link],youshouldavoid
[Link],theportalconfigurationiscachedontheendpointandthatcached
configurationisbeusedanytimetheGlobalProtectagentisrestartedortheclientmachineisrebooted.
Thefollowingsectionsdescribethecustomizableagentsettingsavailableandhowtodeploythesesettings
transparentlytoWindowsandMacclients:
CustomizableAgentSettings
DeployAgentSettingstoWindowsClients
DeployAgentSettingstoMacClients
InadditiontousingWindowsregistryandMacplisttodeployGlobalProtectagentsettings,youcanenablethe
GlobalProtectagenttocollectspecificWindowsregistryorMacplistinformationfromclients,includingdataon
applicationsinstalledontheclients,processesrunningontheclients,andattributesorpropertiesofthose
[Link].
Devicetrafficthatmatchesregistrysettingsyouhavedefinedcanbeenforcedaccordingtothesecurityrule.
Additionally,youcansetupcustomcheckstoCollectApplicationandProcessDataFromClients.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 97
DeployAgentSettingsTransparently SetUptheGlobalProtectInfrastructure
CustomizableAgentSettings
Inadditiontopredeployingtheportaladdress,[Link]
DeployAgentSettingstoWindowsClientsyoudefinekeysintheWindowsregistry
(HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect),or,toDeployAgent
SettingstoMacClientsyoudefineentriesinthePanSetupdictionaryoftheMacplist
(/Library/Preferences/[Link]).On
Windowsclientsonly,youcanalsousetheWindowsInstallertoDeployAgentSettingsfromMsiexec.
Table:[Link]
theGlobalProtectportalagentconfigurationtakeprecedenceoversettingsdefinedintheWindowsregistry
ortheMacplist.
Somesettingsdonothaveacorrespondingportalconfigurationsettingsonthewebinterface,andmustbe
[Link]:
can-prompt-user-credential,wrap-cp-guid,andfilter-non-gpcp.
AgentDisplayOptions
UserBehaviorOptions
AgentBehaviorOptions
ScriptDeploymentOptions
AgentDisplayOptions
ThefollowingtableliststheoptionsthatyoucanconfigureintheWindowsregistryandMacplistto
customizethedisplayoftheGlobalProtectagent.
Table:CustomizableAgentSettings
PortalAgentConfiguration WindowsRegistry/MacPlist MsiexecParameter Default
98 GlobalProtect7.1AdministratorsGuide PaloAltoNetworks,Inc.
SetUptheGlobalProtectInfrastructure DeployAgentSettingsTransparently
UserBehaviorOptions
ThefollowingtableliststheoptionsthatyoucanconfigureintheWindowsregistryandMacplistto
customizehowtheusercaninteractwiththeGlobalProtectagent.
Table:CustomizableUserBehaviorOptions
PortalAgentConfiguration WindowsRegistry/MacPlist MsiexecParameter Default
Specifya0toprevent
GlobalProtectfromsaving
credentials,a1tosaveboth
usernameandpassword,ora2
tosavetheusernameonly.
PaloAltoNetworks,Inc. GlobalProtect7.1AdministratorsGuide 99
DeployAgentSettingsTransparently SetUptheGlobalProtectInfrastructure
AgentBehaviorOptions
ThefollowingtableliststheoptionsthatyoucanconfigureintheWindowsregistryandMacplistto
customizethebehavioroftheGlobalProtectagent.
Table:CustomizableAgentBehaviorOptions
PortalAgentConfiguration WindowsRegistry/MacPlist MsiexecParameter Default
(WindowsOnly)
Thissettingenables
GlobalProtecttoinitiateaVPN
tunnelbeforeauserlogsinto
thedeviceandconnectstothe
GlobalProtectportal.
*FordetailedstepstoenablethesesettingsusingtheWindowsregistryorWindowsInstaller(Msiexec),see
SSOWrappingforThirdPartyCredentialProvidersonWindowsClients.
ScriptDeploymentOptions
ThefollowingtabledisplaysoptionsthatenableGlobalProtecttoinitiatescriptsbeforeandafterestablishing
[Link],
youmustdefinethevaluesfortherelevantkeyeitherpre-vpn-connect,post-vpn-connect,or
[Link],see
DeployScriptsUsingtheWindowsRegistry,DeployScriptsUsingMsiexec,orDeployScriptsUsingtheMac
Plist.
Table:CustomizableScriptDeploymentOptions
PortalAgentConfiguration WindowsRegistry/MacPlist MsiexecParameter Default
DeployAgentSettingstoWindowsClients
UseWindowsregistryortheWindowsInstaller(Msiexec)todeploytheGlobalProtectagentandsettingsto
Windowsclientstransparently.
DeployAgentSettingsintheWindowsRegistry
DeployAgentSettingsfromMsiexec
DeployScriptsUsingtheWindowsRegistry
WindowsOSBatchScriptExamples
Example:ExcludeTrafficfromtheVPNTunnelonWindowsEndpoints
Example:MountaNetworkShareonWindowsEndpoints
DeployScriptsUsingMsiexec
Example:UseMsiexectoDeployScriptsthatRunBeforeaConnectEvent
Example:UseMsiexectoDeployScriptsthatRunatPreConnect,PostConnect,andPreDisconnect
Events
SSOWrappingforThirdPartyCredentialProvidersonWindowsClients
EnableSSOWrappingforThirdPartyCredentialswiththeWindowsRegistry
EnableSSOWrappingforThirdPartyCredentialswiththeWindowsInstaller
DeployAgentSettingsintheWindowsRegistry
YoucanenabledeploymentofGlobalProtectagentsettingstoWindowsclientspriortotheirfirst
[Link]
followingtabletobeginusingtheWindowsregistrytocustomizeagentsettingsforWindowsclients.
InadditiontousingWindowsregistrytodeployGlobalProtectagentsettings,youcanenabletheGlobalProtect
[Link]
[Link]
[Link],youcansetupcustomcheckstoCollectApplicationand
ProcessDataFromClients.
UsetheWindowsRegistrytoDeployGlobalProtectAgentSettings
LocatetheGlobalProtectagentcustomization OpentheWindowsregistry(enterregeditatthecommand
settingsintheWindowsregistry. prompt)andgoto:
HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto
Networks\GlobalProtect\Settings\
UsetheWindowsRegistrytoDeployGlobalProtectAgentSettings(Continued)
Settheportalname. Ifyoudonotwanttheusertomanuallyentertheportaladdress
evenforthefirstconnection,youcanpredeploytheportaladdress
throughtheWindowsregistry:
(HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto
Networks\GlobalProtect\PanSetup with key Portal).
DeployvarioussettingstotheWindowsclient ViewTable:CustomizableAgentBehaviorOptionsforafulllistof
fromtheWindowsregistry,including thecommandsandvaluesyoucansetupusingtheWindows
configuringtheconnectmethodforthe registry.
GlobalProtectagentandenablingsinglesignon
(SSO).
EnabletheGlobalProtectagenttowrap EnableSSOWrappingforThirdPartyCredentialswiththe
thirdpartycredentialsontheWindowsclient, WindowsRegistry.
allowingforSSOwhenusingathirdparty
credentialprovider.
DeployAgentSettingsfromMsiexec
OnWindowsendpoints,youhavetheoptiontodeploytheagentandthesettingsautomaticallyfromthe
WindowsInstaller(Msiexec)byusingthefollowingsyntax:
[Link] /i [Link] <SETTING>="<value>"
[Link]
runningMicrosoftWindowsXPoralaterOS,themaximumlengthofthestringthatyoucanuseatthecommand
promptis8,191characters.
MsiexecExample Description
Foracompletelistofsettingsandthecorrespondingdefaultvalues,seeTable:CustomizableAgentBehavior
Options.
TosetuptheGlobalProtectagenttowrapthirdpartycredentialsonaWindowsclientfromMsiexec,seeEnable
SSOWrappingforThirdPartyCredentialswiththeWindowsInstaller.
DeployScriptsUsingtheWindowsRegistry
YoucanenabledeploymentofcustomscriptstoWindowsendpointsusingtheWindowsregistry.
YoucanconfiguretheGlobalProtectagenttoinitiateandrunascriptforanyorallofthefollowingevents:
beforeandafterestablishingthetunnel,[Link]
event,referencethebatchscriptfromacommandregistryentryforthatevent.
Dependingontheconfigurationsettings,theGlobalProtectagentcanrunascriptbeforeandaftertheagent
establishesaVPNtunnelwiththegateway,[Link]
followingworkflowtogetstartedusingtheWindowsregistrytocustomizeagentsettingsforWindows
clients.
TheregistrysettingsthatenableyoutodeployscriptsaresupportedinGlobalProtectclientsrunning
GlobalProtectagent2.3andlaterreleases.
DeployScriptsintheWindowsRegistry
DeployScriptsintheWindowsRegistry
WindowsOSBatchScriptExamples
YoucanconfiguretheGlobalProtectagenttoinitiateandrunascriptforanyorallofthefollowingevents:
beforeandafterestablishingthetunnel,[Link]
event,[Link]
examplesofscriptsyoucanrunonWindowssystemsatpreconnect,postconnect,andpredisconnect
events:
Example:ExcludeTrafficfromtheVPNTunnelonWindowsEndpoints
ToexcludetrafficfromtheVPNtunnelafterestablishingtheVPNconnection,referencethefollowingscript
[Link]
andtosendallothertrafficthroughtheVPNtunnel.
Asabestpractice,deleteanyexcludenetworkroutesthatwerepreviouslyaddedbeforeaddingthenewexclude
[Link],whenausermovesbetweennetworks(suchaswhenswitchingbetweenWiFiandalocal
network)[Link],
followingthisbestpracticeensuresthattrafficdestinedfortheexcluderouteswillgothroughthegatewayof
thenewnetworkinsteadofthegatewayoftheoldnetwork.
Forascriptthatyoucancopyandpaste,gohere.
@echo off
REM Run this script (route_exclude) post-vpn-connect.
REM Add exclude routes. This allows traffic to these network and hosts to go directly
and not use the tunnel.
REM Syntax: route_exclude <network1> <mask1> <network2> <mask2> ...<networkN> <maskN>
REM Example-1: route_exclude [Link] [Link]
REM Example-2: route_exclude [Link] [Link] [Link] [Link]
REM Example-3: route_exclude [Link] [Link] [Link] [Link]
[Link] [Link]
REM Use the route print command and find the DefaultGateway on the endpoint
@For /f "tokens=3" %%* in (
'[Link] print ^|findstr "\<[Link]\>"'
) Do if not defined DefaultGateway Set "DefaultGateway=%%*"
REM Use the route add command to add the exclude routes
:add_route
if "%1" =="" goto end
route delete %1
route add %1 mask %2 %DefaultGateway%
shift
shift
goto add_route
:end
Example:MountaNetworkShareonWindowsEndpoints
TomountanetworkshareafterestablishingaVPNconnection,referencethefollowingscriptfroma
commandregistryentryforapostvpnconnectevent:
@echo off
REM Mount filer1 to Z: drive
net use Z: \\[Link]\share /user:mycompany\user1
DeployScriptsUsingMsiexec
OnWindowsclients,youcanusetheWindowsInstaller(Msiexec)todeploytheagent,agentsettings,and
scriptsthattheagentwillrunautomatically(seeCustomizableAgentSettings).Todoso,usethefollowing
syntax:
[Link] /i [Link] <SETTING>="<value>"
[Link]
MicrosoftWindowsXPoralaterrelease,themaximumlengthofthestringthatyoucanuseatthecommand
promptis8,191characters.
Thislimitationappliestothecommandline,individualenvironmentvariables(suchastheUSERPROFILEvariable)
thatareinheritedbyotherprocesses,[Link]
commandline,thislimitationalsoappliestobatchfileprocessing.
Forexample,todeployscriptsthatrunatspecificconnectordisconnectevents,youcanusesyntaxsimilar
tothefollowingexamples:
Example:UseMsiexectoDeployScriptsthatRunBeforeaConnectEvent
Example:UseMsiexectoDeployScriptsthatRunatPreConnect,PostConnect,andPreDisconnect
Events
Example:UseMsiexectoDeployScriptsthatRunBeforeaConnectEvent
Forascriptthatyoucancopyandpaste,gohere.
[Link] /i [Link]
PREVPNCONNECTCOMMAND="%userprofile%\pre_vpn_connect.bat c: test_user"
PREVPNCONNECTCONTEXT="user"
PREVPNCONNECTTIMEOUT="60"
PREVPNCONNECTFILE="C:\Users\test_user\pre_vpn_connect.bat"
PREVPNCONNECTCHECKSUM="a48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf599"
PREVPNCONNECTERRORMSG="Failed executing pre-vpn-connect action."
Foracompletelistofsettingsandthecorrespondingdefaultvalues,[Link],
forexamplesofbatchscripts,seeWindowsOSBatchScriptExamples.
Example:UseMsiexectoDeployScriptsthatRunatPreConnect,PostConnect,and
PreDisconnectEvents
Forascriptthatyoucancopyandpaste,gohere.
[Link] /i [Link]
PREVPNCONNECTCOMMAND="%userprofile%\pre_vpn_connect.bat c: test_user"
PREVPNCONNECTCONTEXT="user"
PREVPNCONNECTTIMEOUT="60"
PREVPNCONNECTFILE="C:\Users\test_user\pre_vpn_connect.bat"
PREVPNCONNECTCHECKSUM="a48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf599"
PREVPNCONNECTERRORMSG="Failed executing pre-vpn-connect action."
POSTVPNCONNECTCOMMAND="c:\users\test_user\post_vpn_connect.bat c: test_user"
POSTVPNCONNECTCONTEXT="admin"
POSTVPNCONNECTFILE="%userprofile%\post_vpn_connect.bat"
POSTVPNCONNECTCHECKSUM="b48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf598"
POSTVPNCONNECTERRORMSG="Failed executing post-vpn-connect action."
PREVPNDISCONNECTCOMMAND="%userprofile%\pre_vpn_disconnect.bat c: test_user"
PREVPNDISCONNECTCONTEXT="admin"
PREVPNDISCONNECTTIMEOUT="0"
PREVPNDISCONNECTFILE="C:\Users\test_user\pre_vpn_disconnect.bat"
PREVPNDISCONNECTCHECKSUM="c48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf597"
PREVPNDISCONNECTERRORMSG="Failed executing pre-vpn-disconnect action."
Foracompletelistofsettingsandthecorrespondingdefaultvalues,[Link],
forexamplesofbatchscripts,seeWindowsOSBatchScriptExamples.
SSOWrappingforThirdPartyCredentialProvidersonWindowsClients
OnWindows7andWindowsVistaclients,theGlobalProtectagentutilizestheMicrosoftcredentialprovider
frameworktosupportsinglesignon(SSO).WithSSO,theGlobalProtectcredentialproviderwrapsthe
Windowsnativecredentialprovider,whichenablesGlobalProtecttouseWindowslogincredentialsto
automaticallyauthenticateandconnecttotheGlobalProtectportalandgateway.
Insomescenarioswhenotherthirdpartycredentialprovidersalsoexistontheclient,theGlobalProtect
credentialproviderisunabletogatherauser'sWindowslogincredentialsand,asaresult,GlobalProtectfails
[Link],youcanidentifythe
thirdpartycredentialproviderandthenconfiguretheGlobalProtectagenttowrapthosethirdparty
credentials,whichenablesuserstosuccessfullyauthenticatetoWindows,GlobalProtect,andthethirdparty
credentialproviderallinasinglestepusingonlytheirWindowslogincredentialswhentheylogintotheir
Windowssystem.
Optionally,youcanconfigureWindowstodisplayseparatelogintiles:oneforeachthirdpartycredential
[Link]
additionalfunctionalityinthelogintilethatdoesnotapplytoGlobalProtect.
UsetheWindowsregistryortheWindowsInstaller(Msiexec)toallowGlobalProtecttowrapthirdparty
credentials:
EnableSSOWrappingforThirdPartyCredentialswiththeWindowsRegistry
EnableSSOWrappingforThirdPartyCredentialswiththeWindowsInstaller
GlobalProtectSSOwrappingforthirdpartycredentialproviders(CPs)isdependentonthe
thirdpartyCPsettingsand,insomecases,GlobalProtectSSOwrappingmightnotworkcorrectly
ifthethirdpartyCPimplementationdoesnotallowGlobalProtecttosuccessfullywraptheirCP.
EnableSSOWrappingforThirdPartyCredentialswiththeWindowsRegistry
UsethefollowingstepsintheWindowsregistrytoenableSSOtowrapthirdpartycredentialsonWindows
7andWindowsVistaclients.
UsetheWindowsRegistrytoEnableSSOWrappingforThirdPartyCredentials
UsetheWindowsRegistrytoEnableSSOWrappingforThirdPartyCredentials(Continued)
2. AddanewString Value:
3. EntervaluesfortheString Value:
Name:wrap-cp-guid
Value data:{<third-party credential provider GUID>}
FortheValue datafield,theGUIDvaluethatyou
entermustbeenclosedwithcurlybrackets:{ and
}.
Thefollowingisanexampleofwhatathirdparty
credentialproviderGUIDintheValue data field
mightlooklike:
{A1DA9BCC-9720-4921-8373-A8EC5D48450F}
ForthenewStringValue,wrap-cp-guidisdisplayedasthe
StringValuesNameandtheGUIDisdisplayedastheData.
UsetheWindowsRegistrytoEnableSSOWrappingforThirdPartyCredentials(Continued)
WiththisstringvalueaddedtotheGlobalProtectsettings,twologin
optionsarepresentedtouserswhenloggingintotheirWindows
system:thenativeWindowstileandthethirdpartycredential
providerstile.
EnableSSOWrappingforThirdPartyCredentialswiththeWindowsInstaller
UsethefollowingoptionsintheWindowsInstaller(Msiexec)toenableSSOtowrapthirdpartycredential
providersonWindows7andWindowsVistaclients.
UsetheWindowsInstallertoEnableSSOWrappingforThirdPartyCredentials
[Link]
systemwiththeirnativeWindowscredentialsandthatsingleloginauthenticatesuserstoWindows,
GlobalProtect,andthethirdpartycredentialprovider.
UsethefollowingsyntaxfromtheWindowsInstaller(Msiexec):
[Link] /i [Link] WRAPCPGUID={guid_value} FILTERNONGPCP=yes
Inthesyntaxabove,theFILTERNONGPCP parametersimplifiesauthenticationfortheuserbyfilteringthe
optiontologintothesystemusingthethirdpartycredentials.
Ifyouwouldlikeuserstohavetheoptiontologinwiththethirdpartycredentials,usethefollowingsyntax
fromtheMsiexec:
[Link] /i [Link] WRAPCPGUID={guid_value} FILTERNONGPCP=no
Inthesyntaxabove,theFILTERNONGPCP parameterissettono,whichfiltersoutthethirdpartycredential
[Link],boththenativeWindowstileandthe
thirdpartycredentialprovidertileisdisplayedtouserswhenloggingintotheWindowssystem.
DeployAgentSettingstoMacClients
UsetheMacglobalplist(propertylist)filetosetGlobalProtectagentcustomizationsettingsforortodeploy
scriptstoMacendpoints.
DeployAgentSettingsintheMacPlist
DeployScriptsUsingtheMacPlist
MacOSScriptExamples
Example:TerminateAllEstablishedSSHSessionsonMacEndpoints
Example:MountaNetworkShareonMacEndpoints
DeployAgentSettingsintheMacPlist
YoucansettheGlobalProtectagentcustomizationsettingsintheMacglobalplist(Propertylist)[Link]
enablesdeploymentofGlobalProtectagentsettingstoMacendpointspriortotheirfirstconnectiontothe
GlobalProtectportal.
OnMacsystems,plistfilesareeitherlocatedin/Library/Preferencesorin~/Library/[Link]
(~)symbolindicatesthatthelocationisinthecurrentuser'[Link]
[Link],the
GlobalProtectagentsearchesforplistsettingsin~/Library/Preferences.
InadditiontousingtheMacplisttodeployGlobalProtectagentsettings,youcanenabletheGlobalProtectagent
[Link]
[Link]
[Link],youcansetupcustomcheckstoCollectApplicationandProcessDataFrom
Clients.
UsetheMacPlisttoDeployGlobalProtectAgentSettings
OpentheGlobalProtectplistfileandlocatethe UseXcodeoranalternateplisteditortoopentheplistfile:
GlobalProtectagentcustomizationsettings. /Library/Preferences/[Link]
[Link]
Thengoto:
/Palo Alto Networks/GlobalProtect/Settings
IftheSettingsdictionarydoesnotexist,[Link]
keytotheSettingsdictionaryasastring.
Settheportalname. Ifyoudontwanttheusertomanuallyentertheportaladdresseven
forthefirstconnection,youcanpredeploytheportaladdress
[Link],configurean
entryforPortal.
DeployvarioussettingstotheMacclientfrom ViewCustomizableAgentSettingsforafulllistofthekeysand
theMacplist,includingconfiguringtheconnect valuesthatyoucanconfigureusingtheMacplist.
methodfortheGlobalProtectagent.
DeployScriptsUsingtheMacPlist
WhenauserconnectstotheGlobalProtectgatewayforthefirsttime,theGlobalProtectagentdownloadsa
configurationfileandstoresagentsettingsinaGlobalProtectMacpropertyfile(plist).Inadditiontomaking
changestotheagentsettings,youusetheMacplisttodeployscriptsatanyorallofthefollowingevents:
beforeandafterestablishingthetunnel,[Link]
togetstartedusingtheMacplisttodeployscriptstoMacendpoints.
TheMacplistsettingsthatenableyoutodeployscriptsaresupportedinGlobalProtectclientsrunning
GlobalProtectagent2.3andlaterreleases.
DeployScriptsUsingtheMacPlist
MacOSScriptExamples
YoucanconfiguretheGlobalProtectagenttoinitiateandrunascriptforanyorallofthefollowingevents:
beforeandafterestablishingthetunnel,[Link]
event,[Link]
examplesofscriptsthatyoucanrunatpreconnect,postconnectandpredisconnectevents:
Example:TerminateAllEstablishedSSHSessionsonMacEndpoints
Example:MountaNetworkShareonMacEndpoints
Example:TerminateAllEstablishedSSHSessionsonMacEndpoints
ToforceterminationofallestablishedSSHsessionsbeforesettinguptheVPNtunnel,referencethe
[Link],youcanreestablishthe
sessionsafterestablishingtheGlobalProtectVPNtunnelbyusingascriptthatyoureferencefromthe
[Link]
traversetheGlobalProtectVPNtunnel.
#!bin/bash
# Identify all SSH sessions and force kill them
ps | grep ssh | grep -v grep | awk '{ print $1 }' | xargs kill -9
Example:MountaNetworkShareonMacEndpoints
TomountanetworkshareafterestablishingaVPNconnection,referencethefollowingscriptfromacommand
plistentryforapostvpnconnectevent:
Forascriptthatyoucancopyandpaste,gohere.
#!/bin/bash
mkdir $1
mount -t smbfs
//username:password@[Link]/shares/Departments/Engineering/SW_eng/username/folder
$1
sleep 1
Reference:GlobalProtectAgentCryptographicFunctions
TheGlobalProtectagentusestheOpenSSLlibrary1.0.1htoestablishsecurecommunicationwiththe
[Link]
functionthatrequiresacryptographicfunctionandthecryptographickeystheGlobalProtectagentuses:
GlobalProtectMIBSupport
PaloAltoNetworksdevicessupportstandardandenterprisemanagementinformationbases(MIBs)that
enableyoutomonitorthedevicesphysicalstate,utilizationstatistics,traps,andotherusefulinformation.
MostMIBsuseobjectgroupstodescribecharacteristicsofthedeviceusingtheSimpleNetwork
ManagementProtocol(SNMP)[Link]
theobjects(devicestatisticsandtraps)thataredefinedintheMIBs(fordetails,seeUseanSNMPManager
toExploreMIBsandObjectsinthePANOS7.1AdministratorsGuide).
ThePANCOMMONMIBwhichisincludedwiththeenterpriseMIBsusesthepanGlobalProtectobject
[Link].
Object Description
panGPGWUtilizationPct Utilization(asapercentage)oftheGlobalProtectgateway
panGPGWUtilizationMaxTunnels Maximumnumberoftunnelsallowed
panGPGWUtilizationActiveTunnels Numberofactivetunnels
[Link]
example,ifthenumberofactivetunnelsreaches80%orishigherthanthemaximumnumberoftunnels
allowed,youshouldconsideraddingadditionalgateways.
MobileEndpointManagementOverview
Asmobileendpointsbecomemorepowerful,endusersincreasinglyrelyonthemtoperformbusinesstasks.
However,thesesameendpointsthataccessyourcorporatenetworkalsoconnecttotheinternetwithout
[Link]
suchasamobiledevicemanagement(MDM)orenterprisemobilitymanagement(EMM)systemyoucan
easilymanagebothcompanyprovisionedandemployeeowneddevices(suchasinaBYODenvironment).
Amobileendpointmanagementsystemsimplifiestheadministrationofmobileendpointsbyenablingyouto
[Link]
canalsouseyourmobileendpointmanagementsystemforremediationofsecuritybreachesbyinteracting
[Link]
[Link],ifanenduserlosesanendpoint,youcanremotelylocktheendpointfromthemobile
endpointmanagementsystemorevenwipetheendpoint(eithercompletelyorselectively).
Inadditiontotheaccountprovisioningandremotedevicemanagementfunctionsthatamobileendpoint
managementsystemcanprovide,whenintegratedwithyourexistingGlobalProtectVPNinfrastructure,you
usehostinformationthattheendpointreportstoenforcesecuritypoliciesforaccesstoappsthroughthe
[Link]
nextgenerationfirewalltomonitormobileendpointtraffic.
SetUpaMobileEndpointManagementSystem
Tosetupamobileendpointmanagementsystem,usethefollowingworkflow:
SetUpanEndpointManagementSystem
ManagetheGlobalProtectAppUsingAirWatch
DeploytheGlobalProtectMobileAppUsingAirWatch
ConfiguretheGlobalProtectAppforiOSUsingAirWatch
ConfiguretheGlobalProtectAppforAndroidUsingAirWatch
ConfiguretheGlobalProtectAppforWindows10UWPUsingAirWatch
DeploytheGlobalProtectMobileAppUsingAirWatch
TheGlobalProtectappprovidesasimplewaytoextendtheenterprisesecuritypoliciesouttomobile
[Link],themobileappprovidessecure
[Link]
[Link],traffictoandfromthemobileendpointis
automaticallysubjecttothesamesecuritypolicyenforcementasotherhostsonyourcorporatenetwork.
LiketheGlobalProtectagent,theappcollectsinformationaboutthehostconfigurationandcanusethis
informationforenhancedHIPbasedsecuritypolicyenforcement.
TherearetwoprimarymethodsforinstallingtheGlobalProtectapp:Youcanyoucaninstalltheappdirectly
fromtheappstoreforyourendpoint(seeDownloadandInstalltheGlobalProtectMobileApp);or,deploy
theappfromathirdpartymobileendpointmanagementsystem(suchasAirWatch)andtransparentlypush
theapptoyourmanagedendpoints.
WithAirWatch,youcandeploytheGlobalProtectapptomanagedendpointsthathaveenrolledwith
[Link]
EDM.Windows10endpointsdonotrequiretheAirWatchagentbutrequireyoutoconfigureenrollmenton
[Link],configureanddeployaVPNprofiletosetuptheGlobalProtectapp
fortheenduserautomatically.
DeploytheGlobalProtectAppfromAirWatch
Step1 Beforeyoubegin,ensurethattheendpointstowhichyouwanttodeploytheGlobalProtectappareenrolled
withAirWatch:
AndroidandiOSDownloadtheAirWatchagentandfollowingthepromptstoenroll.
WindowsPhoneandWindows10UWPConfiguretheWindows10UWPendpointtoenrollwith
AirWatch(fromtheendpoint,selectSettings > Accounts > Work access > Connect).
Step3 Selecttheorganizationgroupbywhichthisappwillbemanaged.
Step5 SearchfortheappintheappstorefortheendpointorentertheURLoftheGlobalProtectapppage:
Apple iOS[Link]
Android[Link]
Windows Phone[Link]
DeploytheGlobalProtectAppfromAirWatch(Continued)
Step6 [Link],youmustalsoSelecttheapp
fromalistofsearchresults.
IfyouchosetosearchfortheGlobalProtectappforAndroidanddidnotseetheappinthelist,contact
yourAndroidforWorkadministratortoaddGlobalProtecttothelistofapprovedcompanyapps.
Step10 Nextsteps:
ConfiguretheGlobalProtectAppforiOSUsingAirWatch
ConfiguretheGlobalProtectAppforAndroidUsingAirWatch
ConfiguretheGlobalProtectAppforWindows10UWPUsingAirWatch
ConfiguretheGlobalProtectAppforiOSUsingAirWatch
AirWatchisanEnterpriseMobilityManagementPlatformthatenablesyoutomanagemobileendpoints,
[Link]
[Link]
connectionallowsconsistentinspectionoftrafficandenforcementofnetworksecuritypolicyforthreat
preventiononthemobileendpoint.
ConfigureaDeviceLevelVPNConfigurationforiOSDevicesUsingAirWatch
ConfigureaPerAppVPNConfigurationforiOSDevicesUsingAirWatch
ConfigureaDeviceLevelVPNConfigurationforiOSDevicesUsingAirWatch
YoucaneasilyenableaccesstointernalresourcesfromyourmanagedmobileendpointsbyconfiguringVPN
[Link],yourouteallofthetrafficthatmatchesthe
accessroutesconfiguredontheGlobalProtectgatewaythroughtheGlobalProtectVPN.
ConfigureaDeviceLevelVPNConfigurationforiOSDevicesUsingAirWatch
Step1 DownloadtheGlobalProtectappforiOS.
DeploytheGlobalProtectMobileAppUsingAirWatch.
DownloadtheGlobalProtectappdirectlyfromtheAppStore.
ConfigureaDeviceLevelVPNConfigurationforiOSDevicesUsingAirWatch(Continued)
Step2 FromtheAirWatchconsole,modifyoraddanewAppleiOSprofile.
1. NavigatetoDevices > Profiles > List View.
2. SelectanexistingprofiletoaddtheVPNconfigurationtoitoraddanewone(selectAdd > Apple iOS).
3. ConfigureGeneralprofilesettings:
DescriptionAbriefdescriptionoftheprofilethatindicatesitspurpose.
DeploymentDeterminesiftheprofilewillbeautomaticallyremoveduponunenrollment,eitherManaged
(theprofileisremoved)orManual(theprofileremainsinstalleduntilremovedbytheenduser).
Assignment [Link]
toallendpointsautomatically,Optional toenabletheendusertoinstalltheprofilefromtheSelfService
Portal(SSP)ortomanuallydeploytheprofiletoindividualendpoints,orCompliancetodeploytheprofile
whenanenduserviolatesacompliancepolicyapplicabletotheendpoint.
Managed ByTheOrganizationGroupwithadministrativeaccesstotheprofile.
Assigned Smart [Link]
tocreateanewSmartGroupwhichcanbeconfiguredwithspecsforminimumOS,devicemodels,
ownershipcategories,organizationgroupsandmore.
Allow RemovalDetermineswhetherornottheprofilecanberemovedbytheendpoint'[Link]
Alwaystoenabletheendusertomanuallyremovetheprofileatanytime,Nevertopreventtheenduser
fromremovingtheprofilefromtheendpoint,orWith Authorizationtoenabletheendusertoremovethe
[Link] AuthorizationaddsarequiredPassword.
ExclusionsIfYesisselected,anewfieldExcluded Smart Groupsdisplays,enablingyoutoselectthose
SmartGroupsyouwishtoexcludefromtheassignmentofthisdeviceprofile.
Step3 ToconfiguretheVPNsettings,selectVPNandthenclickConfigure.
Step4 Configureconnectioninformation,including:
Connection NameEnterthenameoftheconnectionnametobedisplayed.
Connection TypeSelectPalo Alto Networks GlobalProtectasthenetworkconnectionmethod.
ServerEnterthehostnameorIPaddressoftheGlobalProtectportaltowhichtoconnect.
AccountEntertheusernameoftheVPNaccountorclickadd(+)toviewsupportedlookupvaluesyou
caninsert.
[Link]
PasswordoruploadanIdentity Certificatetousetoauthenticateusers;Or,ifyouselectedPassword +
Certificate,followtherelatedpromptsforboth.
ConfigureaPerAppVPNConfigurationforiOSDevicesUsingAirWatch
Youcaneasilyenableaccesstointernalresourcesfromyourmanagedmobileendpointsbyconfiguring
[Link],youcanspecifywhichmanaged
[Link]
toconnectdirectlytotheInternetinsteadofthroughtheGlobalProtectVPNtunnel.
ConfigureaPerAppVPNConfigurationforiOSDevicesUsingAirWatch
Step1 DownloadtheGlobalProtectappforiOS:
DeploytheGlobalProtectMobileAppUsingAirWatch.
DownloadtheGlobalProtectappdirectlyfromtheAppStore.
ConfigureaPerAppVPNConfigurationforiOSDevicesUsingAirWatch(Continued)
Step2 FromtheAirWatchconsole,modifyoraddanewAppleiOSprofile:
1. NavigatetoDevices > Profiles > List View.
2. SelectanexistingprofiletoaddtheVPNconfigurationtoitoraddanewone(selectAdd > Apple iOS).
Step3 ConfigureGeneralprofilesettings:
DescriptionAbriefdescriptionoftheprofilethatindicatesitspurpose.
DeploymentDeterminesiftheprofilewillbeautomaticallyremoveduponunenrollment,eitherManaged
(theprofileisremoved)orManual(theprofileremainsinstalleduntilremovedbytheenduser).
Assignment [Link]
toallendpointsautomatically,Optional toenabletheendusertoinstalltheprofilefromtheSelfService
Portal(SSP)ortomanuallydeploytheprofiletoindividualendpoints,orCompliancetodeploytheprofile
whenanenduserviolatesacompliancepolicyapplicabletotheendpoint.
Managed ByTheOrganizationGroupwithadministrativeaccesstotheprofile.
Assigned Smart [Link]
tocreateanewSmartGroupwhichcanbeconfiguredwithspecsforminimumOS,devicemodels,
ownershipcategories,organizationgroupsandmore.
Allow RemovalDetermineswhetherornottheprofilecanberemovedbytheendpoint'[Link]
Alwaystoenabletheendusertomanuallyremovetheprofileatanytime,Nevertopreventtheenduser
fromremovingtheprofilefromtheendpoint,orWith Authorizationtoenabletheendusertoremovethe
[Link] AuthorizationaddsarequiredPassword.
ExclusionsIfYesisselected,anewfieldExcluded Smart Groupsdisplays,enablingyoutoselectthose
SmartGroupsyouwishtoexcludefromtheassignmentofthisdeviceprofile.
Step4 ToconfiguretheperappVPNsettingsintheAppleiOSprofile,selectVPNandthenclickConfigure.
Step5 Configureconnectioninformation,including:
Connection NameEnterthenameoftheconnectionnametobedisplayed.
Connection TypeSelectPalo Alto Networks GlobalProtectasthenetworkconnectionmethod.
ServerEnterthehostnameorIPaddressoftheGlobalProtectportaltowhichtoconnect.
AccountEntertheusernameoftheVPNaccountorclickadd(+)toviewsupportedlookupvaluesthat
youcaninsert.
Send All TrafficSelectthischeckboxtoforcealltrafficthroughthespecifiednetwork.
Disconnect on IdleAllowtheVPNtoautodisconnectafteraspecificamountoftime.
EnablePer App VPNtorouteallofthetrafficforamanagedapptrafficthroughtheGlobalProtectVPN.
Connect AutomaticallySelectthischeckboxtoallowtheVPNtoconnectautomaticallytochosenSafari
Domains.
Step6 [Link],youmustuse
[Link] Authentication: Certificate,andthenfollowthepromptsto
uploadanIdentity Certificatetouseforauthentication.
ConfigureaPerAppVPNConfigurationforiOSDevicesUsingAirWatch(Continued)
Step9 ConfigureperappVPNsettingsforanewmanagedapp,ormodifythesettingsforanexistingmanagedapps.
AfterconfiguringthesettingsfortheappandenablingperappVPN,youcanpublishtheapptoagroupof
usersandenabletheapptosendtrafficthroughtheGlobalProtectVPNtunnel.
1. Onthemainpage,selectApps & Books > Public.
2. Toaddanewapp,selectAdd [Link],tomodifythesettingsofanexistingapp,locatethe
GlobalProtectappinthelistofPublicappsandthenselecttheediticon intheactionsmenunexttothe
row.
3. Selecttheorganizationgroupbywhichthisappwillbemanaged.
4. SelectApple iOSasthePlatform.
5. Selectyourpreferredmethodforlocatingtheapp,eitherbysearchingtheAppStore(byName),or
specifyingaURLfortheappintheAppStore(forexample,toaddtheBoxapp,enter
[Link]
[Link],youmustSelecttheappfromthelistofsearchresults.
6. OntheAssignmenttab,selectAssigned Smart Groupsthatwillhaveaccesstothisapp.
7. OntheDeploymenttab,selectthePush Mode,eitherAutoorOn Demand.
8. SelectUse VPNandthenselecttheAppleiOSprofilethatyoucreatedearlierinthisworkflow.
OnlyprofilesthathaveperappVPNenabledareavailablefromthedropdown.
ConfiguretheGlobalProtectAppforAndroidUsingAirWatch
[Link]
[Link]
thesecureconnectionbetweentheendpointandthefirewallallowsconsistentinspectionoftrafficand
[Link]
connectionateitherthedeviceorapplicationlevel.
ConfigureaDeviceLevelVPNConfigurationforAndroidDevicesUsingAirWatch
ConfigureaPerAppVPNConfigurationforAndroidDevicesUsingAirWatch
EnableAppScanIntegrationwithWildFire
ConfigureaDeviceLevelVPNConfigurationforAndroidDevicesUsingAirWatch
YoucaneasilyenableaccesstointernalresourcesfromyourmanagedAndroidmobileendpointsby
[Link],yourouteallofthetrafficthat
matchestheaccessroutesconfiguredontheGlobalProtectgatewaythroughtheGlobalProtectVPN.
ConfigureaDeviceLevelVPNConfigurationforAndroidDevicesUsingAirWatch
Step1 DownloadtheGlobalProtectappforAndroid:
DeploytheGlobalProtectMobileAppUsingAirWatch.
DownloadtheGlobalProtectappdirectlyfromGooglePlay.
ConfigureaDeviceLevelVPNConfigurationforAndroidDevicesUsingAirWatch(Continued)
Step2 FromtheAirWatchconsole,modifyoraddanewAndroidprofile.
1. NavigatetoDevices > Profiles > List View.
2. SelectanexistingprofiletowhichtoaddtheVPNconfigurationoraddanewone(selectAdd > Add Profile).
3. SelectAndroid astheplatformandDevice astheconfigurationtype.
Step3 ConfigureGeneralprofilesettings:
NameProvideameaningfulnameforthisconfiguration.
VersionThisfieldisautopopulatedwiththelatestversionnumberoftheconfigurationprofile.
DescriptionAbriefdescriptionoftheprofilethatindicatesitspurpose.
Profile ScopeScopeforthisprofile,eitherProduction,Staging,orBoth.
Assignment [Link]
toallendpointsautomatically,Optional toenabletheendusertoinstalltheprofilefromtheSelfService
Portal(SSP)ortomanuallydeploytheprofiletoindividualendpoints,orCompliancetodeploytheprofile
whenanenduserviolatesacompliancepolicyapplicabletotheendpoint.
Managed ByTheOrganizationGroupwithadministrativeaccesstotheprofile.
Assigned Smart [Link]
tocreateanewSmartGroupwhichcanbeconfiguredwithspecsforminimumOS,devicemodels,
ownershipcategories,organizationgroupsandmore.
Allow RemovalDetermineswhetherornottheprofilecanberemovedbytheendpoint'[Link]
Alwaystoenabletheendusertomanuallyremovetheprofileatanytime,Nevertopreventtheenduser
fromremovingtheprofilefromtheendpoint,orWith Authorizationtoenabletheendusertoremovethe
[Link] AuthorizationaddsarequiredPassword.
ExclusionsIfYesisselected,anewfieldExcluded Smart Groupsdisplays,enablingyoutoselectthose
SmartGroupsyouwishtoexcludefromtheassignmentofthisdeviceprofile.
Step5 ToconfiguretheVPNsettings,selectVPNandthenclickConfigure.
Step7 ConfigureAuthenticationinformation:
1. Choosethemethodtoauthenticateendusers:PasswordorCertificate.
2. EntertheUsernameoftheVPNaccountorclickadd(+)toviewsupportedlookupvaluesthatyoucan
insert.
3. EnteraPasswordoruploadanIdentity CertificatethatGlobalProtectwillusetoauthenticateusers.
ConfigureaPerAppVPNConfigurationforAndroidDevicesUsingAirWatch
Youcaneasilyenableaccesstointernalresourcesfromyourmanagedmobileendpointsbyconfiguring
[Link],youcanspecifywhichmanaged
[Link]
toconnectdirectlytotheInternetinsteadofthroughtheGlobalProtectVPNtunnel.
ConfigureaPerAppVPNConfigurationforAndroidDevicesUsingAirWatch
Step1 DownloadtheGlobalProtectappforAndroid:
DeploytheGlobalProtectMobileAppUsingAirWatch.
DownloadtheGlobalProtectappdirectlyfromGooglePlay.
Step2 FromtheAirWatchconsole,modifyoraddanewAndroidprofile.
1. NavigatetoDevices > Profiles > List View.
2. SelectanexistingprofiletowhichtoaddtheVPNconfigurationoraddanewone(selectAdd > Add Profile).
3. SelectAndroid astheplatformandDevice astheconfigurationtype.
Step3 ConfigureGeneralprofilesettings:
NameProvideameaningfulnameforthisconfiguration.
VersionThisfieldisautopopulatedwiththelatestversionnumberoftheconfigurationprofile.
DescriptionAbriefdescriptionoftheprofilethatindicatesitspurpose.
Profile ScopeScopeforthisprofile,eitherProduction,Staging,orBoth.
Assignment [Link]
toallendpointsautomatically,Optional toenabletheendusertoinstalltheprofilefromtheSelfService
Portal(SSP)ortomanuallydeploytheprofiletoindividualendpoints,orCompliancetodeploytheprofile
whenanenduserviolatesacompliancepolicyapplicabletotheendpoint.
Managed ByTheOrganizationGroupwithadministrativeaccesstotheprofile.
Assigned Smart [Link]
tocreateanewSmartGroupwhichcanbeconfiguredwithspecsforminimumOS,devicemodels,
ownershipcategories,organizationgroupsandmore.
Allow RemovalDetermineswhetherornottheprofilecanberemovedbytheendpoint'[Link]
Alwaystoenabletheendusertomanuallyremovetheprofileatanytime,Nevertopreventtheenduser
fromremovingtheprofilefromtheendpoint,orWith Authorizationtoenabletheendusertoremovethe
[Link] Authorizationaddsarequired
Password.
ExclusionsWhenyouselectYes,theAirWatchconsoledisplaysanExcluded Smart Groupsfieldwhich
youcanusetoselectthoseSmartGroupsyouwishtoexcludefromtheassignmentofthisdeviceprofile.
Step5 ToconfiguretheVPNsettings:
1. SelectVPNandthenclickConfigure.
2. ConfigureConnection Info,including:
Connection TypeSelectGlobalProtectasthenetworkconnectionmethod.
Connection NameEnterthenameoftheconnectionnamethattheendpointwilldisplay.
ServerEnterthehostnameorIPaddressoftheGlobalProtectportaltowhichtoconnect.
EnablePer App VPNtorouteallofthetrafficforamanagedapptrafficthroughtheGlobalProtectVPN.
3. [Link],youmustuse
[Link] Authentication: Certificate,andthenfollowthepromptsto
uploadanIdentity Certificatetouseforauthentication.
4. Save & PublishthisprofiletotheassignedSmartGroups.
ConfigureaPerAppVPNConfigurationforAndroidDevicesUsingAirWatch(Continued)
Step6 ConfigureperappVPNsettingsforanewmanagedapp,ormodifythesettingsforanexistingmanagedapps:
1. Onthemainpage,selectApps & Books > Applications > List View > Public.
2. Toaddanewapp,selectAdd [Link],tomodifythesettingsofanexistingapp,locatetheappin
thelistofPublicappsandthenselecttheediticon intheactionsmenunexttotherow.
3. Selecttheorganizationgroupbywhichthisappwillbemanaged.
4. SelectAndroid asthePlatform.
5. Selectyourpreferredmethodforlocatingtheapp,eitherbyspecifyingaURLorimportingtheappfromthe
appstore(GooglePlay).TosearchbyURL,youmustalsoentertheGooglePlayStoreURLfortheapp(for
example,tosearchfortheBoxappbyURL,enter
[Link]
6. [Link],youmustSelecttheapp
[Link],contactyourAndroidforWork
administratortoapprovetheapp.
7. OntheAssignmenttab,selectAssigned Smart Groupsthatwillhaveaccesstothisapp.
8. OntheDeploymenttab,selectthePush Mode,eitherAutoorOn Demand.
9. SelectUse VPNandthenselecttheAndroidprofilethatyoucreatedearlierinthisworkflow.
OnlyprofilesthathaveperappVPNenabledareavailablefromthedropdown.
Step7 ConfigureAuthenticationinformation:
1. Choosethemethodtoauthenticateendusers:PasswordorCertificate.
2. EntertheUsernameoftheVPNaccountorclickadd(+)toviewsupportedlookupvaluesthatyoucan
insert.
3. EnteraPasswordoruploadanIdentity CertificatethatGlobalProtectwillusetoauthenticateusers.
EnableAppScanIntegrationwithWildFire
ByenablingAppScaninAirWatch,youcanleverageWildFirethreatintelligenceaboutappstodetect
[Link],theAirWatchagentsendsthelistofappsthatareinstalled
[Link]
[Link]
endpointbasedontheverdict.
EnableAppScanIntegrationwithWildFire
Step1 Beforeyoubegin,[Link],contactSupport.
Step2 FromAirWatch,selectGroups & Settings > All Settings > Apps > App Scan > Third Party Integration.
Step6 EnteryourWildFireAPIkey.
EnableAppScanIntegrationwithWildFire
Step8 [Link]
[Link] Nowtoinitiateamanual
syncwithWildFire.
ConfiguretheGlobalProtectAppforWindows10UWPUsingAirWatch
UsingtheGlobalProtectappforWindows10UWPasthesecureconnectionbetweentheendpointandthe
firewallallowsconsistentinspectionoftrafficandenforcementofnetworksecuritypolicyforthreat
prevention.
TheGlobalProtectappforWindows10UWPsupportsthefollowingconfigurationsusingAirWatch:
PerAppVPNSpecifieswhichmanagedappsontheendpointcansendtrafficthroughthesecure
[Link]
connection.
DeviceLevelVPNSendsalltrafficthatmatchesspecificfilters(suchasportandIPaddress)throughthe
[Link]
[Link],youcanenabletheVPN Lockdown
optionwhichbothforcesthesecureconnectiontoalwaysbeonandconnectedanddisablesnetwork
[Link] GlobalProtect for Network
AccessoptionthatyouwouldtypicallyconfigureinaGlobalProtectportalconfiguration.
BecauseAirWatchdoesnotyetlistGlobalProtectasanofficialconnectionproviderforWindowsendpoints,you
mustselectanalternateVPNprovider,editthesettingsfortheGlobalProtectapp,andimporttheconfiguration
backintotheVPNprofileasdescribedinthefollowingworkflow.
ConfiguretheGlobalProtectAppforWindows10UWPUsingAirWatch
Step1 DownloadtheGlobalProtectappforWindows10UWP:
DeploytheGlobalProtectMobileAppUsingAirWatch.
DownloadtheGlobalProtectappdirectlyfromtheMicrosoftStore.
Step2 FromtheAirWatchconsole,addanewWindows10UWPprofile:
1. NavigatetoDevices > Profiles > List View.
2. SelectAdd > Add Profile.
3. SelectWindows astheplatformandWindows Phone astheconfigurationtype.
4. ConfigureGeneralprofilesettingssuchasameaningfulNameforthisconfigurationandabriefDescription
oftheprofilethatindicatesitspurpose.
5. Save and PublishthisprofiletotheassignedSmartGroups.
Step3 ToconfiguretheVPNconnectionsettings,selectVPNandthenclickConfigure.
ServerEnterthehostnameorIPaddressoftheGlobalProtectportaltowhichtoconnect.
Step5 ConfiguretheauthenticationsettingsfortheVPNconnection:
1. SelecttheAuthentication Typetochoosethemethodtoauthenticateendusers.
2. TopermitGlobalProtecttosaveusercredentials,enableRemember CredentialsinthePoliciesarea.
Step6 ConfigureVPNtrafficrulestoapplydevicewideoronaperappbasis:
Add New Per-App VPN RuleSpecifyrulesforspecificlegacyapps([Link])ormodernapps
(typicallydownloadedfromtheMicrosoftStore)thatdeterminewhethertoautomaticallyestablishthe
[Link]
configurespecifictrafficfilterstorouteonlyapptrafficthroughtheVPNifitmatchesmatchcriteriasuch
asIPaddressandport.
Add New Device-Wide VPN RuleSpecifyroutingfilterstosendtrafficmatchingaspecificroutethrough
[Link]
matchesthematchcriteria,itisroutedthroughtheVPN.
Step7 (DevicelevelVPNonly)Ifdesired,configureyourpreferenceofAlwaysOnconnection:
1. TomaintaintheVPNconnectionalways,enableeitherofthefollowingoptions:
Always OnForcethesecureconnectiontobealwayson.
VPN LockdownForcethesecureconnectiontobealwaysonandconnected,anddisablethenetwork
[Link] LockdownoptioninAirWatchissimilartotheEnforce
GlobalProtect for Network AccessoptionthatyouwouldconfigureinaGlobalProtectportalconfiguration.
2. SpecifyTrusted NetworkaddressesifyouwantGlobalProtecttoconnectonlywhenitdetectsatrusted
networkconnection.
3. Save & Publishyourchanges.
ConfiguretheGlobalProtectAppforWindows10UWPUsingAirWatch(Continued)
Step8 ToadapttheconfigurationforGlobalProtect,edittheVPNprofileinXML.
TominimizeadditionaleditsintherawXML,reviewthesettingsinyourVPNprofilebeforeyouexport
[Link],youcanmakethe
changesintherawXMLor,youcanupdatethesettingintheVPNprofileandperformthisstepagain.
1. IntheDevices > Profiles > List View,selecttheradiobuttonnexttothenewprofileyouaddedinthe
previoussteps,andthenselect</> [Link].
2. Exporttheprofileandthenopenitinatexteditorofyourchoice.
3. EditthefollowingsettingsforGlobalProtect:
IntheLoclURIelementthatspecifiesthePluginPackageFamilyName,changetheelementto:
<LocURI>./Vendor/MSFT/VPNv2/PaloAltoNetworks/PluginProfile/PluginPackageFamilyName</LocU
RI>
IntheDataelementthatfollows,changethevalueto:
<Data>PaloAltoNetworks.GlobalProtect_rn9aeerfb38dg</Data>
4. Saveyourchangestotheexportedprofile.
5. ReturntoAirWatchandtheDevices > Profiles > List View
6. Create(selectAdd > Add Profile > Windows > Windows Phone)andnameanewprofile.
7. SelectCustom Settings > Configure,andthencopyandpastetheeditedconfiguration.
8. Save & Publishyourchanges.
Step10 Testtheconfiguration.
ManagetheGlobalProtectAppUsingaThirdPartyMDM
Youcanuseanythirdpartymobiledevicemanagementsystem,suchasamobiledevicemanagement
(MDM)system,thatmanagesanAndroidoriOSmobileendpointtodeployandconfiguretheGlobalProtect
app.
ManagetheGlobalProtectAppforiOSUsingaThirdPartyMDMSystem
ConfiguretheGlobalProtectAppforiOS
Example:GlobalProtectiOSAppDeviceLevelVPNConfiguration
Example:GlobalProtectiOSAppAppLevelVPNConfiguration
ManagetheGlobalProtectAppforAndroidUsingaThirdPartyMDMSystem
ConfiguretheGlobalProtectAppforAndroid
Example:SetVPNConfiguration
Example:RemoveVPNConfiguration
ConfiguretheGlobalProtectAppforiOS
WhileathirdpartyMDMsystemallowsyoutopushconfigurationsettingsthatallowaccesstoyour
corporateresourcesandprovidesamechanismforenforcingdevicerestrictions,itdoesnotsecurethe
[Link]
tunnelconnections,youmustenableVPNsupportontheendpoint.
ThefollowingtabledescribestypicalsettingsthatyoucanconfigureusingyourthirdpartyMDMsystem.
Example:GlobalProtectiOSAppDeviceLevelVPNConfiguration
ThefollowingexampleshowstheXMLconfigurationcontainingaVPNpayloadthatyoucanusetoverify
thedevicelevelVPNconfigurationoftheGlobalProtectappforiOS.
Example:GlobalProtectiOSAppDeviceLevelVPNConfiguration
Example:GlobalProtectiOSAppAppLevelVPNConfiguration
ThefollowingexampleshowstheXMLconfigurationcontainingaVPNpayloadthatyoucanusetoverify
theapplevelVPNconfigurationoftheGlobalProtectappforiOS.
Example:GlobalProtectiOSAppAppLevelVPNConfiguration
Example:GlobalProtectiOSAppAppLevelVPNConfiguration(Continued)
<key>PayloadVersion</key>
<integer>1</integer>
<key>PayloadUUID</key>
<string>5436fc94-205f-7c59-0000-011c</string>
<key>PayloadRemovalDisallowed</key>
<false/>
</dict>
</plist>
ConfiguretheGlobalProtectAppforAndroid
YoucandeployandconfiguretheGlobalProtectapponAndroidForWorkdevicesfromanythirdparty
mobiledevicemanagement(MDM)systemsupportingAndroidForWorkAppdatarestrictions.
OnAndroiddevices,trafficisroutedthroughtheVPNtunnelaccordingtotheaccessroutesconfiguredon
[Link],youcan
furtherrefinethetrafficthatisroutedthoughtheVPNtunnel.
Inanenvironmentwherethedeviceiscorporatelyowned,thedeviceownermanagestheentiredevice
[Link],allinstalledappscansendtrafficthroughtheVPN
tunnelaccordingtotheaccessroutesdefinedonthegateway.
Inabringyourowndevice(BYOD)environment,thedeviceisnotcorporatelyownedandusesaWork
[Link]
[Link]
personalsideofthedevicecannotsendtrafficthroughtheVPNtunnelsetbythemanagedGlobalProtect
appinstalledintheWorkProfile.
Toroutetrafficfromanevensmallersetofapps,youcanenablePerAppVPNsothatGlobalProtectonly
[Link],youcanwhitelistorblacklistspecificmanaged
appsfromhavingtheirtrafficroutedthroughtheVPNtunnel.
AspartoftheVPNconfiguration,[Link]
configuretheVPNconnectionmethodasuser-logon,theGlobalProtectappwillestablishaconnection
[Link]-demand,userscaninitiatea
connectionmanuallywhenattemptingtoconnecttotheVPNremotely.
TheVPNconnectmethoddefinedintheMDMtakesprecedenceovertheconnectmethoddefinedinthe
GlobalProtectportalconfiguration.
RemovingtheVPNconfigurationautomaticallyrestorestheGlobalProtectapptotheoriginalconfiguration
settings.
ToconfiguretheGlobalProtectappforAndroid,configurethefollowingAndroidAppRestrictions.
*Theapp_listkeyspecifiestheconfigurationforPerAppVPN.Beginthestringwitheitherthewhitelistor
blacklist,[Link]
[Link]
inthewhitelistorexpresslylistedintheblacklistwillnotgothroughtheVPNtunnel.
Example:SetVPNConfiguration
Example:RemoveVPNConfiguration
getSystemService(Context.DEVICE_POLICY_SERVICE);
[Link]([Link](this),"com
.[Link]", config);
AboutHostInformation
[Link]
[Link]
matchesthisrawhostinformationsubmittedbytheagentagainstanyHIPobjectsandHIPprofilesyouhave
[Link],[Link],ifitfindsaHIPprofile
matchinapolicyrule,itenforcesthecorrespondingsecuritypolicy.
Usinghostinformationprofilesforpolicyenforcementenablesgranularsecuritythatensuresthatthe
remotehostsaccessingyourcriticalresourcesareadequatelymaintainedandinadherencewithyour
[Link],beforeallowing
accesstoyourmostsensitivedatasystems,youmightwanttoensurethatthehostsaccessingthedatahave
[Link]
[Link],forclientsthatare
notincompliancewiththisrule,youcouldcreateanotificationmessagethatalertsusersastowhytheyhave
beendeniedaccessandlinksthemtothefilesharewheretheycanaccesstheinstallationprogramforthe
missingencryptionsoftware(ofcourse,toallowtheusertoaccessthatfileshareyouwouldhavetocreate
acorrespondingsecurityruleallowingaccesstotheparticularshareforhostswiththatspecificHIPprofile
match).
WhatDataDoestheGlobalProtectAgentCollect?
HowDoestheGatewayUsetheHostInformationtoEnforcePolicy?
HowDoUsersKnowifTheirSystemsareCompliant?
HowDoIGetVisibilityintotheStateoftheEndClients?
WhatDataDoestheGlobalProtectAgentCollect?
Bydefault,theGlobalProtectagentcollectsvendorspecificdataabouttheendusersecuritypackagesthat
arerunningonthecomputer(ascompiledbytheOPSWATglobalpartnershipprogram)andreportsthisdata
totheGlobalProtectgatewayforuseinpolicyenforcement.
Becausesecuritysoftwaremustcontinuallyevolvetoensureenduserprotection,yourGlobalProtect
gatewaylicensesalsoenableyoutogetdynamicupdatesfortheGlobalProtectdatafilewiththelatestpatch
andsoftwareversionsavailableforeachpackage.
Whiletheagentcollectsacomprehensiveamountofdataaboutthehostitisrunningon,youmayhave
additionalsoftwarethatyourequireyourenduserstoruninordertoconnecttoyournetworkortoaccess
[Link],youcandefinecustomchecksthatinstructtheagenttocollectspecific
registryinformation(onWindowsclients),preferencelist(plist)information(onMacOSclients),ortocollect
informationaboutwhetherornotspecificservicesarerunningonthehost.
Theagentcollectsdataaboutthefollowingcategoriesofinformationbydefault,tohelptoidentifythe
securitystateofthehost:
Table:DataCollectionCategories
Category DataCollected
General Informationaboutthehostitself,includingthehostname,logondomain,
operatingsystem,clientversion,and,forWindowssystems,thedomaintowhich
themachinebelongs.
ForWindowsclientsdomain,theGlobalProtectagentcollectsthedomain
definedforComputerNameDnsDomain,whichistheDNSdomainassigned
tothelocalcomputerortheclusterassociatedwiththelocalcomputer.
ThisdataiswhatisdisplayedfortheWindowsclientsDomainintheHIP
Matchlogdetails(Monitor > HIP Match).
PatchManagement Informationaboutanypatchmanagementsoftwarethatisenabledand/or
installedonthehostandwhetherthereareanymissingpatches.
Firewall Informationaboutanyclientfirewallsthatareinstalledand/orenabledonthe
host.
Antivirus Informationaboutanyantivirussoftwarethatisenabledand/orinstalledonthe
host,whetherornotrealtimeprotectionisenabled,thevirusdefinitionversion,
lastscantime,thevendorandproductname.
GlobalProtectusesOPSWATtechnologytodetectandassessthirdpartysecurity
[Link],
[Link]
example,youcandefineHIPobjectsandHIPprofilesthatverifythepresenceof
aspecificversionofAntivirussoftwarefromaspecificvendorontheendpointand
alsoensurethatithasthelatestvirusdefinitionfiles.
AntiSpyware Informationaboutanyantispywaresoftwarethatisenabledand/orinstalledon
thehost,whetherornotrealtimeprotectionisenabled,thevirusdefinition
version,lastscantime,thevendorandproductname.
DiskBackup Informationaboutwhetherdiskbackupsoftwareisinstalled,thelastbackuptime,
andthevendorandproductnameofthesoftware.
DiskEncryption Informationaboutwhetherdiskencryptionsoftwareisinstalled,whichdrives
and/orpathsareconfiguredforencryption,andthevendorandproductnameof
thesoftware.
DataLossPrevention Informationaboutwhetherdatalossprevention(DLP)softwareisinstalledand/or
enabledforthepreventionsensitivecorporateinformationfromleavingthe
[Link]
informationisonlycollectedfromWindowsclients.
MobileDevices Identifyinginformationaboutthemobiledevice,suchasthemodelnumber,
phonenumber,serialnumberandInternationalMobileEquipmentIdentity(IMEI)
[Link],theagentcollectsinformationaboutspecificsettingsonthe
device,suchaswhetherornotapasscodeisset,whetherthedeviceisjailbroken,
alistofappsinstalledonthedevicethataremanagedbyathirdpartymobile
devicemanager,ifthedevicecontainsappsthatareknowntohavemalware
(Androiddevicesonly),and,optionally,theGPSlocationofthedeviceandalistof
[Link]
foriOSdevices,someinformationiscollectedbytheGlobalProtectappandsome
informationisreporteddirectlybytheoperatingsystem.
Youcanexcludecertaincategoriesofinformationfrombeingcollectedoncertainhosts(tosaveCPUcycles
andimproveclientresponsetime).Todothis,youcreateaclientconfigurationontheportalexcludingthe
[Link],ifyoudonotplantocreatepolicybasedonwhetheror
notclientsystemsrundiskbackupsoftware,youcanexcludethatcategoryandtheagentwillnotcollectany
informationaboutdiskbackup.
Youcanalsochoosetoexcludecollectinginformationfrompersonaldevicesinordertoallowforuser
[Link]
managedbyathirdpartymobiledevicemanager.
HowDoestheGatewayUsetheHostInformationtoEnforcePolicy?
Whiletheagentgetstheinformationaboutwhatinformationtocollectfromtheclientconfiguration
downloadedfromtheportal,youdefinewhichhostattributesyouareinterestedinmonitoringand/orusing
forpolicyenforcementbycreatingHIPobjectsandHIPprofilesonthegateway(s):
HIPObjectsProvidethematchingcriteriatofilteroutthehostinformationyouareinterestedinusing
[Link],whiletherawhostdatamay
includeinformationaboutseveralantiviruspackagesthatareinstalledontheclientyoumayonlybe
[Link],youwould
createaHIPobjecttomatchthespecificapplicationyouareinterestedinenforcing.
ThebestwaytodeterminewhatHIPobjectsyouneedistodeterminehowyouwillusethehost
[Link]
[Link],
youmaywanttokeepyourobjectssimple,matchingononething,suchasthepresenceofaparticular
typeofrequiredsoftware,membershipinaspecificdomain,[Link]
doingthis,youwillhavetheflexibilitytocreateaverygranular(andverypowerful)HIPaugmented
policy.
HIPProfilesAcollectionofHIPobjectsthataretobeevaluatedtogether,eitherformonitoringorfor
[Link],youcancombinetheHIPobjectsyou
previouslycreated(aswellasotherHIPprofiles)usingBooleanlogicsuchthatwhenatrafficflowis
[Link],the
correspondingpolicyrulewillbeenforced;ifthereisnotamatch,theflowwillbeevaluatedagainstthe
nextrule,aswithanyotherpolicymatchingcriteria.
UnlikeatrafficlogwhichonlycreatesalogentryifthereisapolicymatchtheHIPMatchloggenerates
anentrywhenevertherawdatasubmittedbyanagentmatchesaHIPobjectand/oraHIPprofileyouhave
[Link]
overtimebeforeattachingyourHIPprofilestosecuritypoliciesinordertohelpyoudetermineexactly
[Link]
howtocreateHIPobjectsandHIPprofilesandusethemaspolicymatchcriteria.
HowDoUsersKnowifTheirSystemsareCompliant?
Bydefault,endusersarenotgivenanyinformationaboutpolicydecisionsthatweremadeasaresultof
[Link],youcanenablethisfunctionalitybydefiningHIP
notificationmessagestodisplaywhenaparticularHIPprofileismatchedand/ornotmatched.
Thedecisionastowhentodisplayamessage(thatis,whethertodisplayitwhentheusersconfiguration
matchesaHIPprofileinthepolicyorwhenitdoesntmatchit),dependslargelyonyourpolicyandwhata
HIPmatch(ornonmatch)[Link],doesamatchmeantheyaregrantedfullaccesstoyour
networkresources?Ordoesitmeantheyhavelimitedaccessduetoanoncomplianceissue?
Forexample,considerthefollowingscenarios:
YoucreateaHIPprofilethatmatchesiftherequiredcorporateantivirusandantispywaresoftware
[Link],youmightwanttocreateaHIPnotificationmessageforuserswho
matchtheHIPprofiletellingthemthattheyneedtoinstallthesoftware(and,optionally,providingalink
tothefilesharewheretheycanaccesstheinstallerforthecorrespondingsoftware).
YoucreateaHIPprofilethatmatchesifthosesameapplicationsareinstalled,youmightwanttocreate
themessageforuserswhodonotmatchtheprofile,anddirectthemtothelocationoftheinstallpackage.
SeeConfigureHIPBasedPolicyEnforcementfordetailsonhowtocreateHIPobjectsandHIPprofilesand
useindefiningHIPnotificationmessages.
HowDoIGetVisibilityintotheStateoftheEndClients?
WheneveranendhostconnectstoGlobalProtect,[Link]
gatewaythenusesthisdatatodeterminewhichHIPobjectsand/[Link]
match,[Link]
policymatchtheHIPMatchloggeneratesanentrywhenevertherawdatasubmittedbyanagentmatches
aHIPobjectand/[Link]
monitoringthestateofthehostsonyournetworkovertimebeforeattachingyourHIPprofilestosecurity
policiesinordertohelpyoudetermineexactlywhatpoliciesyoubelieveneedenforcement.
BecauseaHIPMatchlogisonlygeneratedwhenthehoststatematchesaHIPobjectyouhavecreated,for
fullvisibilityintohoststateyoumayneedtocreatemultipleHIPobjectstologHIPmatchesforhoststhat
areincompliancewithaparticularstate(forsecuritypolicyenforcementpurposes)aswellashoststhatare
noncompliant(forvisibility).Forexample,supposeyouwanttopreventahostthatdoesnothaveAntivirus
[Link]
[Link]
ittothesecuritypolicyrulethatallowsaccessfromyourVPNzone,youcanensurethatonlyhoststhatare
protectedwithantivirussoftwarecanconnect.
However,inthiscaseyouwouldnotbeabletoseeintheHIPMatchlogwhichparticularhostsarenotin
[Link]
softwareinstalledsothatyoucanfollowupwiththeusers,youcanalsocreateaHIPobjectthatmatches
[Link]
purposes,youdonotneedtoaddittoaHIPprofileorattachittoasecuritypolicyrule.
ConfigureHIPBasedPolicyEnforcement
[Link]
moreinformationontheHIPfeature,seeAboutHostInformation.
EnableHIPChecking
EnableHIPChecking(Continued)
EnableHIPChecking(Continued)
Repeatthisstepforeachcategoryyouwanttomatchagainst
[Link],seeTable:DataCollection
Categories.
4. ClickOKtosavetheHIPobject.
5. RepeatthesestepstocreateeachadditionalHIPobjectyou
require.
6. Committhechanges.
EnableHIPChecking(Continued)
5. Continueaddingmatchcriteriaasappropriatefortheprofile
youarebuilding,makingsuretoselecttheappropriate
Booleanoperatorradiobutton(ANDorOR)betweeneach
addition(and,again,usingtheNOTcheckboxwhen
appropriate).
6. IfyouarecreatingacomplexBooleanexpression,youmust
manuallyaddtheparenthesisintheproperplacesintheMatch
textboxtoensurethattheHIPprofileisevaluatedusingthe
[Link],thefollowingHIPprofilewill
matchtrafficfromahostthathaseitherFileVaultdisk
encryption(forMacOSsystems)orTrueCryptdiskencryption
(forWindowssystems)andalsobelongstotherequired
Domain,andhasaSymantecantivirusclientinstalled:
7. Whenyouaredoneaddingmatchcriteria,clickOKtosavethe
profile.
8. RepeatthesestepstocreateeachadditionalHIPprofileyou
require.
9. Committhechanges.
EnableHIPChecking(Continued)
EnableHIPChecking(Continued)
8. Repeatthisprocedureforeachmessageyouwanttodefine.
9. Committhechanges.
EnableHIPChecking(Continued)
CollectApplicationandProcessDataFromClients
TheWindowsRegistryandMacPlistcanbeusedtoconfigureandstoresettingsandoptionsforWindows
andMacoperatingsystems,[Link]
whetheranapplicationisinstalled(hasacorrespondingregistryorplistkey)orisrunning(hasa
correspondingrunningprocess)[Link]
GlobalProtectagenttocollectspecificregistryinformation(RegistryKeysandRegistryKeyValuesfrom
Windowsclients),preferencelist(plist)information(plistandplistkeysfromMacOSclients).Thedatathat
youdefinetobecollectedinacustomcheckisincludedintherawhostinformationdatacollectedbythe
GlobalProtectagentandthensubmittedtotheGlobalProtectgatewaywhentheagentconnects.
[Link]
[Link]
gatewaycanusetheHIPobject(whichmatchestothedatadefinedinthecustomcheck)tofiltertheraw
[Link],aHIP
[Link]
[Link],thegatewaywillenforcethat
securityruleonthematchingtraffic.
[Link]
includestheoptionalstepstocreateaHIPobjectandHIPprofileforacustomcheck,ifyouwouldliketouse
clientdataasmatchingcriteriaforasecuritypolicytomonitor,identify,andactontraffic.
FormoreinformationondefiningagentsettingsdirectlyfromtheWindowsregistryortheglobal
Macplist,seeDeployAgentSettingsTransparently.
EnableandVerifyCustomChecksforWindowsorMacClients
EnableandVerifyCustomChecksforWindowsorMacClients
CollectdatafromaMacclient:
1. SelectNetwork > GlobalProtect > Portals andthenselectthe
portalconfigurationyouwanttomodifyorAddanewone.
2. SelecttheAgenttabandthenselecttheAgentconfiguration
youwanttomodifyorAddanewone.
3. Select Data Collection,andthenverifythatCollect HIP Datais
enabled.
4. Select Custom Checks > Mac.
5. AddthePlistthatyouwanttocollectinformationaboutand
thecorrespondingPlistKeytodetermineiftheapplicationis
installed:
.
Forexample,Add [Link]
KeyaskForPasswordtocollectinformationonwhethera
passwordisrequiredtowaketheMacclientafterthescreen
saverbegins:
ConfirmthatthePlistandKey areaddedtotheMaccustom
checks:
EnableandVerifyCustomChecksforWindowsorMacClients
ForMacclients:
OntheMacclient,clicktheGlobalProtecticonontheMenubar,
clickAdvanced View,andclickHost Statetoviewtheinformation
[Link]
thecustomchecksdropdown,verifythatthedatayoudefinedfor
collectioninStep 7isdisplayed:
EnableandVerifyCustomChecksforWindowsorMacClients
3. [Link]
dataintheHIP Matchlogsatthenextdevicecheckinor
continuetoStep 6.
ForMacclientsonly:
1. Selectthe Plisttaband AddandenterthenameofthePlistfor
whichyouwanttocheckMacclients.(Ifinstead,youwantto
matchMacclientsthatdonothavethespecifiedPlist,continue
byselectingPlist does not exist).
2. (Optional)Youcanmatchtraffictoaspecifickeyvaluepair
withinthePlistbyenteringtheKeyandthecorresponding
Valuetomatch.(Alternatively,ifyouwanttoidentifyclients
thatdonothaveaspecificKeyandValue,youcancontinueby
selectingNegateafteraddingpopulatingtheKeyandValue
fields).
3. [Link]
dataintheHIP Matchlogsatthenextdevicecheckinor
continuetoStep 6.
EnableandVerifyCustomChecksforWindowsorMacClients
BlockDeviceAccess
IntheeventthatauserlosesadevicethatprovidesGlobalProtectaccesstoyournetwork,thatdeviceis
stolen,orauserleavesyourorganization,youcanblockthedevicefromgainingaccesstothenetworkby
placingthedeviceinablocklist.
Ablocklistislocaltoalogicalnetworklocation(vsys,1forexample)andcancontainamaximumof1,000
[Link],youcancreateseparatedeviceblocklistsforeachlocationhostinga
GlobalProtectdeployments.
BlockDeviceAccess
RemoteAccessVPN(AuthenticationProfile)
IntheFigure:GlobalProtectVPNforRemoteAccess,theGlobalProtectportalandgatewayareconfigured
onethernet1/2,[Link]
andtheportalandgatewayauthenticatesit,theclientestablishesaVPNtunnelfromitsvirtualadapter,
whichhasbeenassignedanaddressintheIPaddresspoolassociatedwiththegatewaytunnel.2
configuration10.[Link].[Link]
separatecorpvpnzone,youhavevisibilityintotheVPNtrafficaswellastheabilitytocustomizesecurity
policyforremoteusers.
Watchthevideo.
Figure:GlobalProtectVPNforRemoteAccess
[Link].
QuickConfig:VPNRemoteAccess
QuickConfig:VPNRemoteAccess(Continued)
QuickConfig:VPNRemoteAccess(Continued)
RemoteAccessVPN(CertificateProfile)
Withcertificateauthentication,theclientmustpresentavalidclientcertificatethatidentifiestheusertothe
[Link],theportalorgatewaycanuseacertificate
profiletodeterminewhethertheclientthatsentthecertificateistheclienttowhichthecertificatewas
issued.
Whenaclientcertificateistheonlymeansofauthentication,thecertificatethattheclientpresentsmust
containtheusernameinoneofthecertificatefields;typicallytheusernamecorrespondstothecommon
name(CN)intheSubjectfieldofthecertificate.
Uponsuccessfulauthentication,theGlobalProtectagentestablishesaVPNtunnelwiththegatewayandis
[Link]
enforcementonsessionsfromthecorpvpnzone,theusernamefromthecertificateismappedtotheIP
[Link],ifasecuritypolicyrequiresadomainnameinadditiontousername,
thespecifieddomainvalueinthecertificateprofileisappendedtotheusername.
Figure:GlobalProtectClientCertificateAuthenticationConfiguration
ThisquickconfigurationusesthesametopologyasFigure:[Link]
configurationdifferenceisthatinsteadofauthenticatingusersagainstanexternalauthenticationserver,this
configurationusesclientcertificateauthenticationonly.
QuickConfig:VPNRemoteAccesswithClientCertificateAuthentication
QuickConfig:VPNRemoteAccesswithClientCertificateAuthentication(Continued)
QuickConfig:VPNRemoteAccesswithClientCertificateAuthentication(Continued)
RemoteAccessVPNwithTwoFactorAuthentication
IfyouconfigureaGlobalProtectportalorgatewaywithanauthenticationprofileandacertificateprofile
(whichtogethercanprovidetwofactorauthentication),theendusermustsucceedatauthentication
[Link],thismeansthatcertificatesmustbe
[Link],theclientcertificate
presentedbyaclientmustmatchwhatisdefinedinthecertificateprofile.
Ifthecertificateprofiledoesnotspecifyausernamefield(thatis,theUsername FielditissettoNone),the
[Link],theclientmustprovidetheusername
whenauthenticatingagainsttheauthenticationprofile.
Ifthecertificateprofilespecifiesausernamefield,thecertificatethattheclientpresentsmustcontaina
[Link],ifthecertificateprofilespecifiesthattheusername
fieldisSubject,thecertificatepresentedbytheclientmustcontainavalueinthecommonnamefield,or
[Link],whentheusernamefieldisrequired,thevaluefromthe
usernamefieldofthecertificateisautomaticallypopulatedastheusernamewhentheuserattemptsto
[Link]
authenticatewithausernamefromthecertificate,donotspecifyausernamefieldinthecertificate
profile.
ThisquickconfigurationusesthesametopologyasFigure:[Link],
inthisconfigurationtheclientsmustauthenticateagainstacertificateprofileandanauthenticationprofile.
Formoredetailsonaspecifictypeoftwofactorauthentication,seethefollowingtopics:
EnableTwoFactorAuthenticationUsingCertificateandAuthenticationProfiles
EnableTwoFactorAuthenticationUsingOneTimePasswords(OTPs)
EnableTwoFactorAuthenticationUsingSmartCards
UsethefollowingproceduretoconfigureVPNRemoteAccesswithTwoFactorAuthentication.
VPNRemoteAccesswithTwoFactorAuthentication
VPNRemoteAccesswithTwoFactorAuthentication(Continued)
VPNRemoteAccesswithTwoFactorAuthentication(Continued)
AlwaysOnVPNConfiguration
InanalwaysonGlobalProtectconfiguration,theagentconnectstotheGlobalProtectportaluponuser
[Link]
establishestheVPNtunneltothegatewayspecifiedintheclientconfigurationdeliveredbytheportal
withoutenduserinterventionasshowninthefollowingillustration.
ToswitchanyofthepreviousremoteaccessVPNconfigurationstoanalwaysonconfiguration,yousimply
changetheconnectmethod:
RemoteAccessVPN(AuthenticationProfile)
RemoteAccessVPN(CertificateProfile)
RemoteAccessVPNwithTwoFactorAuthentication
UsethefollowingproceduretoswitchtoanAlwaysOnconfiguration.
SwitchtoanAlwaysOnConfiguration
Step3 SelecttheApptab.
Step5 ClickOKtwicetosavetheagentconfigurationandtheportalconfigurationandthenCommityourchanges.
RemoteAccessVPNwithPreLogon
[Link]
istoauthenticatetheendpoint(nottheuser)andthenenabledomainscriptsandothertasksofyourchoice
[Link]
[Link]
endpointfortheuser.
[Link],tolet
theendpointhaveaccesstoresourcesinthetrustzone,youmustcreatesecuritypoliciesthatmatchthe
[Link],such
asDHCP,DNS,ActiveDirectory(forexample,tochangeanexpiredpassword),antivirus,oroperating
systemupdateservices.
AfterthegatewayauthenticatesaWindowsuser,theVPNtunnelisreassignedtothatuser(theIPaddress
mappingonthefirewallchangesfromtheprelogonendpointtotheauthenticateduser).
[Link],thetunnel
createdforprelogonistorndownandanewtunnelcreatedwhentheuserlogsin.
Whenaclientrequestsanewconnection,theportalauthenticatestheclientbyusinganauthentication
[Link](ifthe
configurationincludesaclientcertificate).Inthiscase,theclientcertificatemustidentifytheuser.
Afterauthentication,[Link]
fortheagenthaschanged,itpushesanupdatedconfigurationtotheendpoint.
Iftheconfigurationontheportaloragatewayincludescookiebasedauthenticationfortheclient,theportal
[Link],theportalorgatewayusesthecookie
[Link],ifanagentconfigurationprofile
includestheprelogonconnectmethodinadditiontocookieauthentication,theGlobalProtectcomponents
canusethecookieforprelogon.
Ifusersneverlogintoadevice(forexample,aheadlessdevice)oraprelogonconnectionisrequiredona
systemthatauserhasnotpreviouslyloggedinto,youcanlettheendpointinitiateaprelogontunnelwithout
[Link],youmustoverridethe
defaultbehaviorbycreatingentriesintheWindowsregistryorMacplist.
TheGlobalProtectendpointwillthenconnecttotheportalspecifiedintheconfigurationandauthenticate
theendpointbyusingitsmachinecertificate(asspecifiedinacertificateprofileconfiguredonthegateway)
andestablishtheVPNtunnel.
Whentheendusersubsequentlylogsintothemachineandifsinglesignon(SSO)isenabledintheclient
configuration,theusernameandpasswordarecapturedwhiletheuserlogsinandusedtoauthenticateto
thegatewayandsothatthetunnelcanberenamed(Windows).IfSSOisnotenabledintheclient
configurationorofSSOisnotsupportedontheclientsystem(forexample,itisaMacOSsystem)theusers
credentialsmustbestoredintheagent(thatis,theSave User CredentialsoptionmustbesettoYes).After
successfulauthenticationtothegatewaythetunnelwillberenamed(Windows)orrebuilt(Mac)anduser
andgroupbasedpolicycanbeenforced.
ThisexampleusestheGlobalProtecttopologyshowninFigure:GlobalProtectVPNforRemoteAccess.
RemoteAccessVPNwithPreLogon
RemoteAccessVPNwithPreLogon(Continued)
RemoteAccessVPNwithPreLogon(Continued)
RemoteAccessVPNwithPreLogon(Continued)
RemoteAccessVPNwithPreLogon(Continued)
GlobalProtectMultipleGatewayConfiguration
InFigure:GlobalProtectMultipleGatewayTopology,asecondexternalgatewayhasbeenaddedtothe
[Link]
[Link],whenconfiguringthe
clientconfigurationstobedeployedbytheportalyoucandecidewhethertoallowaccesstoallgateways,
orspecifydifferentgatewaysfordifferentconfigurations.
Figure:GlobalProtectMultipleGatewayTopology
Ifaclientconfigurationcontainsmorethanonegateway,theagentwillattempttoconnecttoallgateways
[Link]
[Link]
[Link]
information,seeGatewayPriorityinaMultipleGatewayConfiguration.
QuickConfig:GlobalProtectMultipleGatewayConfiguration
QuickConfig:GlobalProtectMultipleGatewayConfiguration(Continued)
QuickConfig:GlobalProtectMultipleGatewayConfiguration(Continued)
GlobalProtectforInternalHIPCheckingandUserBased
Access
WhenusedinconjunctionwithUserIDand/orHIPchecks,aninternalgatewaycanbeusedtoprovidea
secure,accuratemethodofidentifyingandcontrollingtrafficbyuserand/ordevicestate,replacingother
networkaccesscontrol(NAC)[Link]
authenticatedaccesstocriticalresourcesisrequired.
Inaconfigurationwithonlyinternalgateways,allclientsmustbeconfiguredwithuserlogon;ondemand
[Link],itisrecommendedthatyouconfigureallclientconfigurationstouse
singlesignon(SSO).Additionally,becauseinternalhostsdonotneedtoestablishatunnelconnectionwith
thegateway,theIPaddressofthephysicalnetworkadapterontheclientsystemisused.
Inthisquickconfig,internalgatewaysareusedtoenforcegroupbasedpoliciesthatallowusersinthe
EngineeringgroupaccesstotheinternalsourcecontrolandbugdatabasesandusersintheFinancegroup
[Link],HIP
profilesconfiguredonthegatewaycheckeachhosttoensurecompliancewithinternalmaintenance
requirements,suchaswhetherthelatestsecuritypatchesandantivirusdefinitionsareinstalled,whether
diskencryptionisenabled,orwhethertherequiredsoftwareisinstalled.
Figure:GlobalProtectInternalGatewayConfiguration
UsethefollowingproceduretoquicklyconfigureaGlobalProtectinternalgateway.
QuickConfig:GlobalProtectInternalGatewayConfiguration
QuickConfig:GlobalProtectInternalGatewayConfiguration(Continued)
2. CreatetheHIPprofilesthatyouplantouseinyourpolicies.
Forexample,ifyouwanttoensurethatonlyWindowsusers
withuptodatepatchescanaccessyourinternalapplications,
youmightattachthefollowingHIPprofilethatwillmatchhosts
thatdoNOThaveamissingpatch:
QuickConfig:GlobalProtectInternalGatewayConfiguration(Continued)
MixedInternalandExternalGatewayConfiguration
InaGlobalProtectmixedinternalandexternalgatewayconfiguration,youconfigureseparategatewaysfor
[Link],agentsperform
[Link]
itisontheexternalnetwork,itwillattempttoconnecttotheexternalgatewayslistedinitsclient
configurationanditwillestablishaVPN(tunnel)connectionwiththegatewaywiththehighestpriorityand
theshortestresponsetime.
Becausesecuritypoliciesaredefinedseparatelyoneachgateway,youhavegranularcontroloverwhich
[Link],youalsohavegranularcontrolover
whichgatewaysusershaveaccesstobyconfiguringtheportaltodeploydifferentclientconfigurations
basedonuser/groupmembershiporbasedonHIPprofilematching.
Inthisexample,theportalsandallthreegateways(oneexternalandtwointernal)aredeployedonseparate
[Link]
whiletheinternalgatewaysprovidegranularaccesstosensitivedatacenterresourcesbasedongroup
[Link],HIPchecksareusedtoensurethathostsaccessingthedatacenterareuptodate
onsecuritypatches.
Figure:GlobalProtectDeploymentwithInternalandExternalGateways
UsethefollowingproceduretoquicklyconfigureamixofinternalandexternalGlobalProtectgateways.
QuickConfig:GlobalProtectMixedInternal&ExternalGatewayConfiguration
QuickConfig:GlobalProtectMixedInternal&ExternalGatewayConfiguration(Continued)
QuickConfig:GlobalProtectMixedInternal&ExternalGatewayConfiguration(Continued)
2. CreatetheHIPprofilesthatyouplantouseinyourpolicies.
Forexample,ifyouwanttoensurethatonlyWindowsusers
withuptodatepatchescanaccessyourinternalapplications,
youmightattachthefollowingHIPprofilethatwillmatchhosts
thatdoNOThaveamissingpatch:
QuickConfig:GlobalProtectMixedInternal&ExternalGatewayConfiguration(Continued)
GlobalProtectReferenceArchitectureTopology
GlobalProtectPortal
GlobalProtectGateways
GlobalProtectPortal
Inthistopology,aPA3020inthecolocationspacefunctionsasaGlobalProtectportal.
Employeesandcontractorscanauthenticatetotheportalusingtwofactorauthentication(2FA)consisting
ofActiveDirectory(AD)credentialsandaonetimepassword(OTP).TheportaldeploysGlobalProtectclient
configurationsbasedonuserandgroupmembershipandoperatingsystem.
Byconfiguringaseparateportalclientconfigurationthatappliestoasmallgrouporsetofpilotusers,you
[Link]
featuressuchastheEnforceGlobalProtectorSimpleCertificateEnrollmentProtocol(SCEP)featureswhich
weremadeavailablewithPANOS7.1andcontentupdatesthatfollowedisenabledinthepilot
configurationfirstandvalidatedbythosepilotusers,beforeitismadeavailabletootherusers.
[Link]
theGlobalProtectgatewaystowhichsatellitescanconnectandestablishasitetositetunnel.
GlobalProtectGateways
ThePA3020inthecolocationspace(mentionedpreviously)alsodoublesasaGlobalProtectgateway(the
SantaClaraGateway).10additionalgatewaysaredeployedinAmazonWebServices(AWS)andthe
[Link]
deployedarebasedonthedistributionofemployeesacrosstheglobe.
SantaClaraGatewayEmployeesandcontractorscanauthenticatetotheSantaClaraGateway
(PA3020inthecolocationspace)[Link]
[Link],itisconfigured
[Link],usersdonotconnecttothisgatewayautomaticallyandmust
[Link],whenusersconnecttoAWSNorcal,whichis
notamanualonlygateway,[Link]
manuallyswitchtoandauthenticatewiththeSantaClaraGatewaytoaccesstheseresources.
Inaddition,theSantaClaraGatewayisconfiguredasaLargeScaleVPN(LSVPN)tunnelterminationpoint
[Link]
tosetupanInternetProtocolSecurity(IPSec)[Link]
thetunnelthatprovidesaccesstoresourcesinthecorporateheadquarters.
GatewaysinAmazonWebServicesandMicrosoftAzureThisgatewayrequires2FA:aclientcertificate
[Link]
requiredtoauthenticatewiththesegatewaysusingtheGlobalProtectSCEPfeature.
[Link]
GlobalProtectportal,downloadthesatelliteconfiguration,andestablishasitetositetunnelwiththe
[Link],andsubsequently
authenticateusingcertificates.
GatewaysInsideCorporateHeadquartersWithinthecorporateheadquarters,threefirewallsfunction
[Link].
[Link]
useGlobalProtecttoidentifytheUserIDandtocollectHostInformationProfile(HIP)fromthe
endpoints.
Tomaketheenduserexperienceasseamlessaspossible,youcanconfiguretheseinternal
gatewaystoauthenticateusersusingcertificatesprovisionedbySCEPorusingKerberosservice
tickets.
GlobalProtectReferenceArchitectureFeatures
EndUserExperience
ManagementandLogging
MonitoringandHighAvailability
EndUserExperience
Enduserswhoareremote(notinsidethecorporatenetwork)connecttooneofthegatewaysinAWSor
[Link],assignequalprioritytothe
[Link],thegatewaytowhichusersconnectdependsontheSSLresponsetime
ofeachgatewaymeasuredontheendpointduringthetunnelsetuptime.
Forexample,[Link]
connectedtoAWSSydney,GlobalProtectclienttunnelsalltrafficfromtheendpointtotheAWSSydney
[Link]
GatewayandtunnelstraffictocorporateresourcesthroughasitetositetunnelbetweentheAWSSydney
GatewayandtheSantaClaraGateway,andthenthroughanIPSecsitetositetunneltothecorporate
[Link]
[Link](oranygatewayclosertoSydney)wasunreachable,the
GlobalProtectclientwouldbackhaultheinternettraffictothefirewallinthecorporateheadquartersand
causelatencyissues.
[Link],the
GlobalProtectclientsendsauthenticationrequeststhroughthesitetositetunnelinAWS/Azuretothe
[Link]
ActiveDirectoryServerincorporateheadquarters.
Toreducethetimeittakesforremoteuserauthenticationandtunnelsetup,considerreplicatingtheActive
DirectoryServerandmakingitavailableinAWS.
Endusersinsidethecorporatenetworkauthenticatetothethreeinternalgatewaysimmediatelyafterthey
login;[Link]
officeonthecorporatenetwork,theymustmeettheUserIDandHIPrequirementstoaccessanyresource
atwork.
ManagementandLogging
Inthisdeployment,youcanmanageandconfigureallfirewallsfromPanorama,whichisdeployedinthe
colocationspace.
Toprovideconsistentsecurity,allfirewallsinAWSandAzureusethesamesecuritypoliciesand
[Link],Panoramaalsousesonedevicegroupandone
[Link],[Link]
networktrafficortroubleshootissuesfromacentrallocationinsteadofrequiringyoutologintoeach
firewall.
Whensoftwareupdatesarerequired,youcanusePanoramatodeploythesoftwareupdatestoallfirewalls.
Panoramafirstupgradesoneortwofirewallsandverifieswhethertheupgradewassuccessfulbefore
updatingtheremainingfirewalls.
MonitoringandHighAvailability
Tomonitorthefirewallsinthisdeployment,youcanuseNagios,anopensourceserver,network,andlog
[Link]'
[Link]
GlobalProtectSimpleNetworkManagementProtocol(SNMP)ManagementInformationBase(MIB)objects
tomonitorgatewayusage.
[Link],
newusers(whohaveneverconnectedtotheportalbefore)willnotbeabletoconnecttoGlobalProtect.
However,existinguserscanusethecachedportalclientconfigurationtoconnecttooneofthegateways.
Multiplevirtualmachine(VM)firewallsinAWSconfiguredasGlobalProtectgatewaysprovidegateway
[Link],configuringgatewaysasahighavailability(HA)pairisnotrequired.
GlobalProtectReferenceArchitectureConfigurations
Toalignyourdeploymentwiththereferencearchitecture,reviewthefollowingconfigurationchecklists.
GatewayConfiguration
PortalConfiguration
PolicyConfigurations
GatewayConfiguration
PortalConfiguration
PolicyConfigurations
ConfigureallfirewallstousesecuritypoliciesandprofilesbasedontheBestPracticeInternetGateway
[Link],thisincludestheSantaClaraGatewayinthecolocation
spaceandgatewaysintheAWS/Azurepubliccloud.
EnableSSLDecryptiononallgatewaysinAWSandAzure.
ConfigurePolicyBasedForwardingrulesforallgatewaysinAWStoforwardtraffictocertainwebsites
[Link]
thatblocktrafficfromAWSIPaddressrangesarestillaccessiblewhenusersconnecttogatewaysin
AWS.