You must configure the following interfaces
and zones for your GlobalProtect infrastructure:
GlobalProtect
portal—Requires a Layer 3 or loopback interface for the GlobalProtect
apps’ connection. If the portal and gateway are on the same firewall,
they can use the same interface. The portal must be in a zone that
is accessible from outside your network, such as a DMZ.
GlobalProtect gateways—The interface and zone requirements
for the gateway depend on whether the gateway you are configuring
is external or internal, as follows:
External gateways—Requires
a Layer 3 or loopback interface and a logical tunnel interface for
the app to establish a connection. The Layer 3/loopback interface
must be in an external zone, such as a DMZ. A tunnel interface can
be in the same zone as the interface connecting to your internal
resources (for example, trust). For added
security and better visibility, you can create a separate zone,
such as corp-vpn. If you create a separate
zone for your tunnel interface, you must create security policies
that enable traffic to flow between the VPN zone and the trust zone.
Internal gateways—Requires a Layer 3 or loopback interface
in your trust zone. You can also create a tunnel interface for access
to your internal gateways, but this is not required.