Tunnel Settings Tab
Focus
Focus
Next-Generation Firewall

Tunnel Settings Tab

Table of Contents

Tunnel Settings Tab

  • NetworkGlobalProtectGateways<gateway-config>Agent<agent-config>Tunnel Settings
Select the Tunnel Settings tab to enable tunneling and configure the tunnel parameters.
Tunnel parameters are required if you are setting up an external gateway. If you are configuring an internal gateway, tunnel parameters are optional.
GlobalProtect Gateway Client Tunnel Mode Configuration Settings
Description
Tunnel Mode
Select Tunnel Mode to enable tunnel mode and then specify the following settings:
  • Tunnel Interface—Choose a tunnel interface for access to this gateway.
  • Max User—Specify the maximum number of users that can simultaneously access the gateway for authentication, HIP updates, and GlobalProtect app updates. If the maximum number of users is reached, subsequent users are denied access with a message that indicates the maximum number of users has been reached (range varies by platform and is displayed when the field is empty).
  • Enable IPSec—Select this option to enable IPSec mode for endpoint traffic, making IPSec the primary method and SSL-VPN the fallback method. The remaining options are not available until IPSec is enabled.
  • GlobalProtect IPSec Crypto—Select a GlobalProtect IPSec Crypto profile that specifies authentication and encryption algorithms for the VPN tunnels. The default profile uses AES-128-CBC encryption and SHA1 authentication. For details, see Network > Network Profiles > GlobalProtect IPSec Crypto.
  • Enable X-Auth Support—Select this option to enable Extended Authentication (X-Auth) support in the GlobalProtect gateway when IPSec is enabled. With X-Auth support, third party IPSec VPN clients that support X-Auth (such as the IPSec VPN client on Apple iOS and Android devices and the VPNC client on Linux) can establish a VPN tunnel with the GlobalProtect gateway. The X-Auth option provides remote access from the VPN client to a specific GlobalProtect gateway. Because X-Auth access provides limited GlobalProtect functionality, consider using the GlobalProtect App for simplified access to the full security feature set GlobalProtect provides on iOS and Android devices.
    Selecting X-Auth Support activates the Group Name and Group Password options:
    • If the group name and group password are specified, the first authentication phase requires both parties to use this credential to authenticate. The second phase requires a valid username and password, which is verified through the authentication profile configured in the Authentication section.
    • If no group name and group password are defined, the first authentication phase is based on a valid certificate presented by the third-party VPN client. This certificate is then validated through the certificate profile configured in the authentication section.
    • By default, the user is not required to re-authenticate when the key used to establish the IPSec tunnel expires. To require the user to re-authenticate, clear the Skip Auth on IKE Rekey option.
  • Enable IKEv2—Select this option to enable IKEv2 mode for endpoint traffic, making IKEv2 the primary method. The remaining options are not available until IKEv2 is enabled.
    Selecting Enable IKEv2 activates the Select IKEv2 Only and IKEv2 Preferred options:
    • IKEv2 Only—Select this option to allow the GlobalProtect client to connect only through IKEv2. If the user’s network blocks IKEv2 or the client is too old to support it, the connection fails completely
    • IKEv2 Only—Select this option to allow the GlobalProtect client to fall back to an SSL/TLS tunnel if IKEv2 fails. This option allows older clients to connect via SSL-VPN or IPSec (if enabled).
  • IKE Crypto Profile—Select an IKE Crypto profile that specifies the protocol and algorithm for identification, authentication, and encryption for IKEv2. The default profile uses AES-128-CBC encryption and SHA1 authentication. For details, see Network > Network Profiles > IKE Crypto.
  • IPSec Crypto Profile—Select a IPSec Crypto profile that specifies authentication and encryption algorithms for the VPN tunnels. The default profile uses AES-128-CBC encryption and SHA1 authentication. For details, see Network > Network Profiles > IPSec Crypto.
  • Authentication—Select either Pre-Shared Key or Certificate as the authentication method. If you select Certificate, the certificate profile specified in the Authentication tab of the gateway is reused.
  • Master Key—For the Pre-Shared Key authentication method, either enter a master key or click Generate Strong Master Key and copy-paste the value here.
  • Confirm Master Key—For the Pre-Shared Key authentication method, re-enter the master key or if you generated it, paste it here again.
  • Master Key Length [characters]—Enter the master key length in characters to generate a key. The master key length must be between 32 and 128 characters.