Access Methods

The Pulse Secure Desktop Client supports the following kinds of connections to Pulse Secure gateways:

Layer 3 VPN connections to Pulse Connect Secure

Layer 2 (802.1x) and Layer 3 connections to Pulse Policy Secure

Per-application VPN tunneling to Pulse Connect Secure (Windows Secure Access Manager)

There are a vast number of possible combinations of connections and configurations. For example, both Layer 2 (wired and wireless) and Layer 3 connections can be configured either with or without enforcement (Host Checker enforcement of system health and policy compliance). Although an endpoint can have only one active VPN connection to Pulse Connect Secure, an endpoint can have multiple simultaneous Pulse Policy Secure connections with or without a VPN connection. Also, Pulse Policy Secure IPsec enforcement in Pulse Connect Secure (TLS) tunnels is supported.

The following table lists the configurations that are qualified and compatible. Any combination not mentioned in the table is not supported.

Access Method Configuration

Description

Level of Support

Layer 3 IPsec tunnel inside VPN outer tunnel

Outer tunnel: TLS or ESP VPN tunnel to Pulse Connect Secure gateway

Inner tunnel: Layer 3 IPsec tunnel authenticated through Pulse Policy Secure to ScreenOS or SRX firewall

Qualified

Layer 2 Pulse Policy Secure +
Multiple Layer 3 Pulse Policy Secure

One Pulse Policy Secure Layer 2 connection running in parallel to multiple Pulse Policy Secure Layer 3 connections

Qualified

The following table lists the supported nested tunnel (tunnel-in-tunnel) configurations. The configurations are for a Pulse Connect Secure v9.1 outer tunnel, a Pulse Policy Secure v9.1 inner tunnel, and the Pulse Secure Desktop Client v9.1.

Pulse Connect Secure (Outer Tunnel Config)

Pulse Policy Secure (Inner Tunnel Support)

Split-Tunneling Mode

Route Precedence

Route Monitor

Traffic Enforcement

IPsec
(with VA)

IPsec (without VA)

Dynamic IPsec

Source IP

Dynamic Source IP

Disabled

Tunnel Routes1

Disabled

Disabled

Supported

Supported

Supported

Supported

Supported

Disabled

Tunnel Routes1

Disabled

IPv4 Disabled and IPv6 Enabled

Supported

Supported

Supported

Supported

Supported

Disabled

Tunnel Routes1

Disabled

IPv4 Enabled and IPv6 Disabled

Not Supported

Supported

Supported

Supported

Supported

Disabled

Tunnel Routes

Enabled

Enabled or Disabled

Not Supported

Supported

Supported

Supported

Supported

Enabled

Tunnel Routes1

Disabled

Enabled or Disabled

Supported2

Supported3

Supported

Supported

Supported

Enabled

Tunnel Routes1

Enabled

Enabled or Disabled

Supported2

Supported3

Supported

Supported

Supported

Enabled or Disabled

Endpoint routes

Enabled or Disabled

Enabled or Disabled

Supported2

Supported3

Supported

Supported

Supported

1.Tunnel Routes and Tunnel Routes with Local Subnet Access behave the same way.

2.Pulse Policy Secure IP address, IE IP address, and Pulse Policy Secure VA pool IP addresses should be added to the Pulse split-tunnelling network policy.

3.Pulse Policy Secure IP address, IE IP address, and protected resources should be added to a Pulse split-tunnelling network policy, and Pulse Connect Secure should have a route to the Pulse Policy Secure protected resource.

Pulse WSAM does not inter-operate with Pulse Policy Secure.