Connect to GlobalProtect App with IPSec Only
Focus
Focus
What's New in the NetSec Platform

Connect to GlobalProtect App with IPSec Only

Table of Contents

Connect to GlobalProtect App with IPSec Only

Learn how to choose the connection option for the GlobalProtect app.
For organizations that must comply with government regulations, allowing network clients to fallback to a less secure tunnel type can pose a compliance risk. Previously, if the GlobalProtect® app failed to establish an IPSec tunnel, it automatically attempted to establish an SSL tunnel, potentially circumventing mandatory security policies. This lack of strict tunnel enforcement could lead to non-compliant access in high-security environments.
GlobalProtect 6.3.1 addresses this by unifying the control over tunnel mode enforcement under a single portal setting Advanced Control for Tunnel Mode Behavior. This new configuration combines the existing Connect with SSL Only feature with the new ability to enforce IPSec Only connections. For information on using this parameter, see step 5 in Customize the GlobalProtect App.
You can now meet mandates, such as Federal Government compliance regulations, by requiring the GlobalProtect app to stay disconnected if the IPSec tunnel fails or is unavailable on the gateway. This feature ensures that the GlobalProtect app only connects through the specific, approved tunnel mode your security policy requires, preventing unauthorized or non-compliant connections. This simplifies configuration by consolidating tunnel mode preferences in one centralized location.
To meet Federal Government compliance regulations, you can choose to prevent GlobalProtect fallback to SSL tunnel in case IPSec tunnel fails. If IPSec is not configured on the gateway, the GlobalProtect app stays disconnected.