GlobalProtect Virtual Private Network (VPN) Install Procedure for Macintosh


Note: this installation can only be done from off campus, and in order to install the VPN software, you must have admin rights to the computer.  Employees can contact your technical coordinator if you have issues installing.  Students can contact the Technology Help Desk.


Download client from Please note, the client cannot be downloaded while connected to University networks. This includes downloads while connected via previous VPN clients. 

Global Protect VPN Service Portal

Log in with campus ID and password.

After successfully logging in, please select the version of client:  Mac 32/64 bit agent.

Palo Alto Networks VPN Service Portal

After downloading the agent please launch the downloaded install file.

Follow the steps which will be presented to you:

Open the Global Protect Download Package

Global Protect Installation Process

Mac Permission Window

Installation Success

After installation, the GlobalProtect agent dialog panel will appear. Enter for portal address and hit Connect.

Global Protect connection box

Enter username: Campus ID, password, and hit Sign In.

Note: only enter Campus ID or account name. @email or campus-domain\ is not valid.

Global Protect login box

Lastly, by default it will connect to GlobalProtect with split tunneling, but if full tunneling is required, click on the drop down menu and select GP-TLS-Full for full tunneling.

Global Protect full tunneling

Special Note

If you encounter a problem connecting after launching the applications, check your security settings to ensure your computer isn't blocking the Global Protect application or Palo Alto Networks.

Macintosh security blocking application






Article ID: 65678
Fri 10/19/18 5:29 PM
Thu 8/20/20 6:48 PM

Related Services / Offerings

Related Services / Offerings (1)

Remote networking services, Virtual Private Network (VPN), is a campus system allowing individuals to securely access internal networks and computers over the Internet, using encrypted tunnels to ensure that data cannot be accessed without authorization.