This section outlines an example reference architecture
for deploying GlobalProtect™, which secures internet traffic and
provides secure access to corporate resources.
The reference architecture and guidelines described in this section
provide a common deployment scenario. Before adopting this architecture,
identify your corporate security, infrastructure manageability,
and end user experience requirements, and then deploy GlobalProtect
based on those requirements.
Although the requirements may be different for each enterprise,
you can leverage the common principles and design considerations
outlined in this document, along with the best practice configuration
guidelines, to meet your enterprise security needs.