GlobalProtect
Host a Split Tunnel Configuration File on a Web Server
Table of Contents
Expand All
|
Collapse All
GlobalProtect Docs
-
10.1 & Later
- 10.1 & Later
- 9.1 (EoL)
-
- How Does the App Know Which Certificate to Supply?
- Set Up Cloud Identity Engine Authentication
- Configure GlobalProtect to Facilitate Multi-Factor Authentication Notifications
- Enable Delivery of VSAs to a RADIUS Server
- Enable Group Mapping
-
-
- GlobalProtect App Minimum Hardware Requirements
- Download the GlobalProtect App Software Package for Hosting on the Portal
- Host App Updates on the Portal
- Host App Updates on a Web Server
- Test the App Installation
- Download and Install the GlobalProtect Mobile App
- View and Collect GlobalProtect App Logs
-
-
- Deploy App Settings in the Windows Registry
- Deploy App Settings from Msiexec
- Deploy Scripts Using the Windows Registry
- Deploy Scripts Using Msiexec
- Deploy Connect Before Logon Settings in the Windows Registry
- Deploy GlobalProtect Credential Provider Settings in the Windows Registry
- SSO Wrapping for Third-Party Credential Providers on Windows Endpoints
- Enable SSO Wrapping for Third-Party Credentials with the Windows Registry
- Enable SSO Wrapping for Third-Party Credentials with the Windows Installer
- Deploy App Settings to Linux Endpoints
- GlobalProtect Processes to be Whitelisted on EDR Deployments
-
-
- Mobile Device Management Overview
- Set Up the MDM Integration With GlobalProtect
- Qualified MDM Vendors
-
-
- Set Up the Microsoft Intune Environment for Android Endpoints
- Deploy the GlobalProtect App on Android Endpoints Using Microsoft Intune
- Create an App Configuration on Android Endpoints Using Microsoft Intune
- Configure Lockdown Mode for Always On Connect Method on Android Endpoints Using Microsoft Intune
-
- Deploy the GlobalProtect Mobile App Using Microsoft Intune
- Configure an Always On VPN Configuration for iOS Endpoints Using Microsoft Intune
- Configure a User-Initiated Remote Access VPN Configuration for iOS Endpoints Using Microsoft Intune
- Configure a Per-App VPN Configuration for iOS Endpoints Using Microsoft Intune
-
-
-
- Create a Smart Computer Group for GlobalProtect App Deployment
- Create a Single Configuration Profile for the GlobalProtect App for macOS
- Deploy the GlobalProtect Mobile App for macOS Using Jamf Pro
-
- Enable GlobalProtect System Extensions on macOS Endpoints Using Jamf Pro
- Enable GlobalProtect Network Extensions on macOS Big Sur Endpoints Using Jamf Pro
- Add a Configuration Profile for the GlobalProtect Enforcer by Using Jamf Pro 10.26.0
- Verify Configuration Profiles Deployed by Jamf Pro
- Remove System Extensions on macOS Monterey Endpoints Using Jamf Pro
- Non-Removable System Extensions on macOS Sequoia Endpoints Using Jamf Pro
- Uninstall the GlobalProtect Mobile App Using Jamf Pro
-
- Configure HIP-Based Policy Enforcement
- Configure HIP Exceptions for Patch Management
- Collect Application and Process Data From Endpoints
- Redistribute HIP Reports
-
- Identification and Quarantine of Compromised Devices Overview and License Requirements
- View Quarantined Device Information
- Manually Add and Delete Devices From the Quarantine List
- Automatically Quarantine a Device
- Use GlobalProtect and Security Policies to Block Access to Quarantined Devices
- Redistribute Device Quarantine Information from Panorama
- Troubleshoot HIP Issues
-
-
- Enable and Verify FIPS-CC Mode on Windows Endpoints
- Enable and Verify FIPS-CC Mode on macOS Endpoints
- Enable and Verify FIPS-CC Mode Using Workspace ONE on iOS Endpoints
- Enable FIPS Mode on Linux EndPoints with Ubuntu or RHEL
- Enable and Verify FIPS-CC Mode Using Microsoft Intune on Android Endpoints
- FIPS-CC Security Functions
- Resolve FIPS-CC Mode Issues
-
-
- Remote Access VPN (Authentication Profile)
- Remote Access VPN (Certificate Profile)
- Remote Access VPN with Two-Factor Authentication
- GlobalProtect Always On VPN Configuration
- Remote Access VPN with Pre-Logon
- User-Initiated Pre-Logon Connection
- GlobalProtect Multiple Gateway Configuration
- GlobalProtect for Internal HIP Checking and User-Based Access
- Mixed Internal and External Gateway Configuration
- Captive Portal and Enforce GlobalProtect for Network Access
- GlobalProtect on Windows 365 Cloud PC
-
- About GlobalProtect Cipher Selection
- Cipher Exchange Between the GlobalProtect App and Gateway
-
- Reference: GlobalProtect App Cryptographic Functions
-
- Reference: TLS Ciphers Supported by GlobalProtect Apps on macOS Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Windows Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Android 6.0.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on iOS 10.2.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Chromebooks
- Ciphers Used to Set Up IPsec Tunnels
- SSL APIs
-
- View a Graphical Display of GlobalProtect User Activity in PAN-OS
- View All GlobalProtect Logs on a Dedicated Page in PAN-OS
- Event Descriptions for the GlobalProtect Logs in PAN-OS
- Filter GlobalProtect Logs for Gateway Latency in PAN-OS
- Restrict Access to GlobalProtect Logs in PAN-OS
- Forward GlobalProtect Logs to an External Service in PAN-OS
- Configure Custom Reports for GlobalProtect in PAN-OS
-
6.3
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
-
- Download and Install the GlobalProtect App for Windows
- Use Connect Before Logon
- Use Single Sign-On for Smart Card Authentication
- Use the GlobalProtect App for Windows
- Report an Issue From the GlobalProtect App for Windows
- Disconnect the GlobalProtect App for Windows
- Uninstall the GlobalProtect App for Windows
- Fix a Microsoft Installer Conflict
-
- Download and Install the GlobalProtect App for macOS
- Use the GlobalProtect App for macOS
- Report an Issue From the GlobalProtect App for macOS
- Disconnect the GlobalProtect App for macOS
- Uninstall the GlobalProtect App for macOS
- Remove the GlobalProtect Enforcer Kernel Extension
- Enable the GlobalProtect App for macOS to Use Client Certificates for Authentication
-
6.1
- 6.1
- 6.0
- 5.1
-
6.3
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
Host a Split Tunnel Configuration File on a Web Server
Host a split tunnel configuration file on a local web server for expanded support for
domains, access routes and applications that you can update dynamically.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
You can either define your split tunnel
configuration on the GlobalProtect gateway, or you can host it in a Split
Tunnel configuration file that you host on a web server in your environment. In
order to push the split tunnel configuration to the endpoint:
- Your split tunnel configuration file must parse as valid XML
- The web server must be reachable by all endpoints configured to fetch the split tunnel configuration file
- The server and the client must be able to mutually authenticate
If the GlobalProtect app cannot fetch the split tunnel configuration file, it falls
back to the split tunnel configuration that you have configured on the gateway.
The following table shows the split tunnel configuration limits when the
configuration is hosted on GlobalProtect vs. when it is hosted in a Split Tunnel
Configuration file in your environment:
Split Tunnel By... | Configured on GlobalProtect Gateway | Hosted on a Web Server | |
---|---|---|---|
Access Route
|
Include
| 1000 | 1000 |
Exclude
| 200 | 1000 | |
Domain
|
Include
| 200 | 1000 |
Exclude
| 200 | 1000 | |
Application
|
Include
| 200 | 200 |
Exclude
| 200 | 200 |
- Create and sign the split tunnel configuration file.
- Create your split tunnel configuration file in XML format, as in the following example.
- Sign the configuration file.For example, if the signature file name is config_signature.sha256:openssl dgst -sha256 -sign private_key.pem -out config_signature.sha256 config.txtYou can optionally verify the signature:openssl dgst -sha256 -verify public_key.pem -signature config_signature.sha256 config.txtBase64 encoding signature file (no wrapping):openssl base64 -A -in config_signature.sha256 -out encoded_signature.txt
- Add the encoded digest to the configuration file.
- Add the encoded digest as the first line in the configuration file. It must be on a single line.
- Add the split tunnel configuration as the second line.
- If you want the traffic to be routed through GlobalProtect by default, add an <access-routes> section with the default route 0.0.0.0/0.
The content in the file must not be terminated with a NULL character (ASCII '\0', or ^@)" ). - Host the split tunnel configuration file you just created on a web server that your GlobalProtect endpoints can access.
- Enable mutual authentication.You will need the public key certificate that you use for mutual authentication for the GlobalProtect configuration.For example, to host the split tunnel configuration file in AWS behind the network load balancers protected by the AWS network firewall, you would do the following:
- Provision EC2 instances to host servers.
- Create network load balancers (NLB) and configure listeners on TCP port 443.
- Create Target Groups with port 443 and associate EC2 instances to the Target Groups.
- Configure the network firewall and two stateless rule groups and associate them with the configured firewalls that you have provisioned. Configure rule 1 to drop packets to all ports and protocols from a specific IP address or subnet. Configure rule 2 to allow packets to TCP port 443.
- Configure the VPC routing tables to forward traffic from the internet to the NLB via the network firewall.
- Add the public key certificate you used on your web server to the portal configuration.In the App Configurations area, paste the public key certificate in the Enhanced Split Tunnel Client Certificate Public Key field.
- Enable split tunneling and add the URL for your split tunnel configuration file.
- In the GlobalProtect Gateway Configuration dialog, select AgentTunnel Settings and enable Tunnel Mode
- Configure the tunnel parameters for the GlobalProtect app.
- In the GlobalProtect Gateway Configuration dialog, select AgentClient Settings and select an existing client settings configuration or add a new one.
- Select Split Tunnel and in the Include Domain section, add the URL of your split tunnel configuration file as the first entry in the Include Domain section.Only HTTPS URLs are supported.
- Click OK and Commit the changes.