Prisma Access
Panorama
Table of Contents
Expand All
|
Collapse All
Prisma Access Docs
-
- Prisma Access China
- 4.0 & Later
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
-
-
-
- 5.0 Preferred and Innovation
- 4.2 Preferred
- 4.1 Preferred
- 4.0 Preferred
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
Panorama
Panorama
Learn how to configure multiple portals with multiple authentication methods in
Prisma Access (Managed by Panorama)
.- Contact your Palo Alto Networks account representative to activate this functionality.When configuring multiple GlobalProtect portals with Traffic Steering, do not configureAccept Default Routes over Service Connections(); if you do, mobile users cannot connect to the secondary portal.PanoramaCloud ServicesConfigurationTraffic SteeringSettingsAccept Default Route over Service Connection
- Configure a mobile user and the authentication method for it.
- Select.Cloud ServicesConfigurationMobile Users—GlobalProtectSettingsAdvanced
- Enable Multiple Portal for Multiple Authentication Methods.The new portal appears for the 8443 port for the same tenant. This portal inherits the configuration settings from the original port, which is port 443.
- Edit the portal configurations to update the authentication settings.
- Click the portal hyperlink or selectand click the portal hyperlink.PanoramaTemplatesNetworkGlobalProtectPortals
- In theAuthenticationsection,AddaClient Authenticationwith a differentAuthentication Profile.
You can edit only theClient AuthenticationandCertificate Profileauthentication settings.If you use certificate-based authentication in both portals, ensure that the gateway doesn't have certificate-based authentication.This feature enables the authentication override settings to generate cookie for both portals in the GlobalProtect app settings.This feature enables the authentication override settings to generate and accept cookie for both portals in the tunnel settings. - Commit all your changes to Panorama and push the configuration changes toPrisma Access.
- Click.CommitCommit and Push
- Edit Selectionsand, in thePrisma Accesstab, make sure thatMobile Usersis selected in thePush Scope, then clickOK.
- ClickCommit and Push.
- Add the portals manually or using endpoint management software in the GlobalProtect app.
- Verify if you can connect to both portals with different authentication profiles for the gateway.
- Log in to your Windows machine.
- Connect to the portals in your GlobalProtect app.When you change the connection between portals of different authentication methods, authenticate the user login.If the authentication cookie expires when you connect to the 8443 portal and switch to the manual gateway, GlobalProtect connects to theBest Available Gateway.If your GlobalProtect app uses cached portal configurations, fallback to portal does not work.
- View logs for both portals into see the portal and authentication information.MonitorLogsGlobalProtect
If you're using SAML-based authentication for the
secondary portal, enter the values as follows while integrating:
- Single sign on URL: Enterhttps://Portal-FQDN:443/SAML20/SP/ACSPortal-FQDNis the FQDN for thePrisma AccessportalUse portal443even if you have configured the secondary portal (8443).
- Audience URI (SP Entity ID): Enterhttps://Portal-FQDN:443/SAML20/SP