This section outlines an example reference architecture
for deploying GlobalProtect™ which secures internet traffic and
provides secure access to corporate resources.
The reference architecture and guidelines described in this section
provide a common deployment scenario. Before adopting this architecture,
identify your corporate security, infrastructure manageability,
and end user experience requirements and deploy GlobalProtect based
on those requirements.
Although the requirements may be different for each enterprise,
you can leverage the common principles and design considerations
outlined in this document along with best practice configuration
guidelines to meet your enterprise security needs.