Globalprotect Design Question

Hello,

I’m trying to implement the below design so that there is separation between Internal and External VPN users. The reason for the Staging Virtual Router is because all RFC1918 networks could be used in staging and External VPN users will need access to these. At the same time there is the trusted zone that needs to be seperate from the Staging zone and access allowed via GP for Internal VPN users only.

I only have 1 public IP to play with.

I have followed the guides linked below and configured GP Portal (10.10.10.1) and Gateway (10.10.10.2) on loopback addresses and have the IPSec VPN working successfully utilising Destination NAT for Internal GP users in the diagram.

Where I’m stuck is figuring out how to configure the second Gateway that is tied to a tunnel interface in the Staging VR in order to maintain routing separation from the trust zone.

I created a second tunnel interface and assigned it to the Staging VR and created a new security zone. I then created a another loopback (10.10.10.3).

Next I created another Gateway with this new loopback. In the Agent config I selected the new tunnel interface and enabled IPSec.

My progress then ground to halt when It came to the NAT rule as I already have a rule for the single public IP that translates incoming IPSec traffic to the first Gateway (10.10.10.2).

Any ideas on how I can get this working or better implement these design requirements?

Thanks,

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGKCA0

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKPCA0

You can put the gateway on a different port, then. Nat that port to the gateway on 443 , you will only be able to use sslvpn on the other gw with a single public ip

Use AD group memberships to give the two different classes of users + two different IP pools on two gateway profiles. Then wright the Sec Policies to the inside networks based in the IP pools.

Yeah i know it can be done with just groups without the differentiating ip pools but i dont want to be querying AD all the time so it gets queried once upon connect, put user in pool, pool determines access rights.

Got it working using sslvpn, thanks.