Reset Search
 

 

Article

KB40562 - VPN Only Access with Pulse Secure Desktop (Windows)

« Go Back

Information

 
Last Modified Date6/30/2017 12:33 AM
Synopsis
This article provides information about the VPN Only Access feature with Pulse Secure Desktop (Windows) client.
Problem or Goal
Cause
Solution
In the Pulse Secure Desktop client 5.2R5 release, Always-On VPN was introduced.  This option is designed to ensure all network traffic is sent through the VPN tunnel during the authentication phase.  For more information about the Always-On VPN feature, please refer to KB40375 - Always-On VPN Feature.

In the Pulse Secure Desktop client 5.3R1 and Pulse Connect Secure 8.3R1 release, VPN Only Access feature was introduced as a separate feature to improve and provide additional flexibility compared to Always-On VPN feature. Here are the key differences that VPN Only Access provides:
  1. Removes the requirement for the connection to be automatic 
  2. End users can manually connect or disconnect to multiple connections provided by the Pulse Connect Secure (PCS) device. When the end user is disconnected from the PCS device, all network traffic is blocked.
The following improvements allow a PCS administrator to provide alternative connections when the default PCS device is down or unavailable.

Caveats:


VPN only access does not prevent end users with admin privileges from stopping the Pulse Secure Service or the Base Filtering Engine (BFE) which are required to establish a VPN connection.  If there is a need to prevent administrators or end users from stopping these services, endpoint should be joined to the domain to enforce the following recommendations / restrictions:
  • Disable Add/Remove Programs for all VPN users (Under User Configuration\Administrative Templates\Control Panel\Add/Remove Programs)
  • Restrict write permissions for end users to C:/ProgramData/Pulse Secure directory
  • The startup type for "Pulse Secure Service" should be set to "Automatic", and permission to start and stop the service should be removed from "Administrators".
  • Ensure "SYSTEM" retains permission to start and stop the service.
  • A "Pulse Secure Admins" should be created on the domain. Permission to start and stop the service should be assigned to "Pulse Secure Admins". The "Domain Admins" and any other group who need permission to start and stop Pulse Secure can be made members of the "Pulse Secure Admins" group.
  • Disabling the ability to stop the Base Filtering Engine (BFE) should be done in a manner similar to what is described above for the Pulse Secure Service
To restrict permission to start and stop service using a group policy, perform the following steps:
  1. On a Windows Server 2008, 2012 or 2016, install the Wireless LAN Service. If not installed, JNPRTtlsProvider.dll will fail to register during the Pulse client installation.
    1. Open Server Manager
    2. Select Features > Add Feature
    3. Select Wireless LAN Service
    4. Click Install > Close > Done
  2. Use the Pulse Secure desktop client MSI file for installation  
(Note: On Windows 2016 servers, JNPRTtlsProvider.dll will fail to register, even if Wireless LAN Service is installed. An error message will appear during the Pulse client installation. The error can be accepted and the Pulse installation will complete.)
  1. Once installation is complete, start the Group Policy Management MMC.
  2. Navigate to the Computer Configuration\Window Settings\Security Settings\System Services
  3. From the right pane, double-click on Pulse Secure Service
  4. Click the checkbox for Define this policy setting
  5. Set the Service startup mode as Automatic
  6. Click Edit Security
  7. Click Allow for Start, stop and pause for "Pulse Secure Admins" and remove permissions for "Administrators"
  8. Perform steps 6-9 for Base Filtering Engine (BFE)
Related Links
Attachment 1 
Created ByK. Kitajima

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255