How to Protect GlobalProtect Portal on NGFW from Brute Force Attack

How to Protect GlobalProtect Portal on NGFW from Brute Force Attack

93426
Created On 07/11/24 19:41 PM - Last Modified 06/03/25 03:48 AM


Objective


The article provides highlights on how to configure the Next Gen Firewalls to protect GlobalProtect Portal against Brute Force Attacks.



Environment


  • Palo Alto NGFW firewalls
  • Supported PAN-OS
  • GlobalProtect (GP)


Procedure


Configure the Firewall with the following. Please remind that those configurations may need time and planning, and it is recommended to open a maintenance window to make any changes or to test it. 
It is not necessary to implement all configurations, but the ones that suit better for the organization.

 

  • Setup a brute force IP blacklisting policy.
  • Use Geolocation, Allow only region specific IP sources by a Security Policy.
  • Configure Palo Alto Networks' EDLs in a block policy.
  • In the GP Policy, add the following App-IDs: "panos-global-protect" ; "ssl" ; "web-browing" and "paloalto-gp-mfa-notification" (if the customer uses 2 Factor Authentication).
  • routed.log can be useful to follow the GlobalProtect authentication process or the path on how a user is authenticated.
  • Use the allow list under the Advance Tab in the Authentication Profile used in GlobalProtect. Add groups to the allow list. The groups are fed using the User-ID feature. This can help filter valid users to be allowed on the customer's remote server.

See Also: GlobalProtect Login Fails When Using a Group in the Allow List

 

  • Implement URL Filters:
    1. Apply a URL Filtering profile to a security policy for the SSL access that blocks attempts not using the FQDN for the Portal.
    2. Create a custom URL category list with "vpnportal.yourdomain.com/", "vpngw.yourdomain.com", "x.x.x.x/ssl-vpn/hipreportcheck.esp", "x.x.x.x/ssl-vpn/hipreport.esp", "x.x.x.x/ssl-vpn/agentmessage.esp"
      NOTE: Replace x.x.x.x with the GP Gateway's IP Address
    3. Split your GlobalProtect security policy rule into two rules. One to handle app-ids "panos-global-protect", "ssl", and "web-browsing". The other policy is for IPsec and ICMP (if these are needed)
    4. For the SSL security policy, add the URL Filtering Profile that was created. After applying this,  Users will only be able to connect to the VPN with the FQDN.
  • Use SAML:
    1. Geo block at the security policy layer in addition to the config selection criteria if not already.
    2. Set your 1st rule to drop geo IP and known malicious IPs, then put them in the GP config rule to only allow specific regions.


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000010zEJCAY&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language