Hardware reference guide

156 GlobalProtect Administrator’s Guide
Remote Access VPN with Pre-Logon GlobalProtect Quick Configs
This example uses the GlobalProtect topology shown in Figure: GlobalProtect VPN for Remote Access.
Quick Config: Remote Access VPN with Pre-Logon
Step 1 Create Interfaces and Zones for
GlobalProtect.
Use the
default virtual router for all
interface configurations to avoid
having to create inter-zone routing.
Select
Network > Interfaces > Ethernet and configure
ethernet1/2 as a Layer 3 Ethernet interface with IP address
199.21.7.42 and assign it to the l3-untrust security zone and the
default virtual router.
Create a DNS “A” record that maps IP address 199.21.7.42 to
gp.acme.com.
Select
Network > Interfaces > Tunnel and add the tunnel.2
interface and add it to a new zone called corp-vpn. Assign it to the
default virtual router.
Enable User Identification on the corp-vpn zone.
Step 2 Create the security policy rules. This configuration requires the following policies (
Policies >
Security
):
First create a rule that enables the pre-logon user access to basic
services that are required for the computer to come up, such as
authentication services, DNS, DHCP, and Microsoft Updates.
Second create a rule to enable access between the corp-vpn zone
and the l3-trust zone for any known user after the user
successfully logs in.
Step 3 Obtain a server certificate for the
interface hosting the GlobalProtect portal
and gateway using one of the following
methods:
(Recommended) Import a server
certificate from a well-known,
third-party CA.
Generate a self-signed server
certificate.
Select
Device > Certificate Management > Certificates to manage
certificates as follows:
Obtain a server certificate. Because the portal and gateway are on
the same interface, the same server certificate can be used for both
components.
The CN of the certificate must match the FQDN, gp.acme.com.
To enable clients to connect to the portal without receiving
certificate errors, use a server certificate from a public CA.
Step 4 Generate a machine certificate for each
client system that will connect to
GlobalProtect and import them into the
personal certificate store on each
machine.
Although you could generate self-signed
certificates for each client system, as a
best practice use your own public-key
infrastructure (PKI) to issue and
distribute certificates to your clients.
1. Issue client certificates to GlobalProtect users/machines.
2. Install certificates in the personal certificate store on the client
systems. (Local Computer store on Windows or System
Keychain on Mac OS)