Vigyata.AI
Is this your channel?

#paloaltofirewalltraining | Day 45 | How to Configure Global Protect VPN with Client Certificate

964 views· 19 likes· 18:36· Jan 24, 2026

🛍️ Products Mentioned (2)

Join this channel to get access to perks: https://www.youtube.com/channel/UCBujQdd5rBRg7n70vy7YmAQ/join Please checkout my new video on Configure Ikev2 with Wireshek Detailed analysis. If you like this video give it a thumps up and subscribe my channel for more video. Have any question put it on comment section Recommend Video #paloaltofirewalltraining | Day 44 | How to Configure Global Protect VPN in Palo Alto https://youtu.be/8imTv9xYlJY #paloaltofirewalltraining | Day 43 | Global Protect SSL VPN in Palo Alto | Concept https://youtu.be/0ca7xsa1K_w Recommend Link (Playlist for EVE-NG LAB Setup) https://www.youtube.com/playlist?list=PLaUiizP3D7fPMmUQqS5QKX_FVSoMP68Z5 Palo Alto Certification information URL: https://www.paloaltonetworks.com/services/education For Palo Alto Documentation https://docs.paloaltonetworks.com/ Please follow me Instagram : https://www.instagram.com/bikashtech Twitter : https://twitter.com/Bikashshaw82 E-mail ID : bikashshaw261@gmail.com #Paloaltotraining ##bikashtech #paloaltofirewalltraining #paloaltonetworks #paloaltotraining #paloaltovpn #vpn #ike #ipsec

About This Video

In Day 45 of my PCNSA Palo Alto Firewall Training series, I show you how to configure GlobalProtect VPN authentication using a client certificate instead of the normal username/password method. In my previous video I used local authentication (I created the user inside the Palo Alto firewall), but in this lab I switch the portal and gateway to certificate-based authentication—because most industries are moving towards certificate-only access. I start by creating a Certificate Profile (I name it GP profile) and I use the certificate subject as the username field, then I select the CA certificate that I already generated for GlobalProtect. After that, I go into the GlobalProtect Portal and Gateway settings and remove the old authentication profile (credential-based) and replace it with my certificate profile, then I commit the changes. On the client side, you’ll see the exact error you get when a valid certificate is missing, and then I generate a client certificate, export it in the correct format with a password, and import it into the client machine. Finally, I connect GlobalProtect again and you can see it connects without asking any username/password—authentication happens using the certificate. I also show you where to verify this in the firewall (Monitor > GlobalProtect and Gateway remote users) so you can validate it in your own lab and later apply the same concept in production.

Frequently Asked Questions

🎬 More from Bikash's Tech