<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication Policy Cisco ASA to Palo Migration in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/authentication-policy-cisco-asa-to-palo-migration/m-p/350163#M2971</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38629"&gt;@lychiang&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes I have followed these steps in the link you sent.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Server Profile &amp;gt;&lt;/P&gt;
&lt;P&gt;Auth Profile &amp;gt; (referencing Server Profile)&lt;/P&gt;
&lt;P&gt;Authentication Object &amp;gt; (Referencing Auth Profile)&lt;/P&gt;
&lt;P&gt;Authentication Policy &amp;gt; (referencing the Auth Object)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am still unable to get a hit on the authentication, I have used service any as a catch all, tested with SSH and Pings and still unable to get a hit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Thu, 17 Sep 2020 15:01:08 GMT</pubDate>
    <dc:creator>yaz3636</dc:creator>
    <dc:date>2020-09-17T15:01:08Z</dc:date>
    <item>
      <title>Authentication Policy Cisco ASA to Palo Migration</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/authentication-policy-cisco-asa-to-palo-migration/m-p/350013#M2969</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm just looking for some help in migrating an authentication policy for my customer. I have tried to do this in expedition but I'm not sure it works. The Cisco ASA config I am trying to migrate is decribed below:&lt;/P&gt;
&lt;P&gt;/&lt;/P&gt;
&lt;P&gt;aaa-server RadiusProfile protocol radius&lt;BR /&gt;aaa-server RadiusProfile (Inside) host 192.168.1.1&lt;BR /&gt;key MySecret&lt;/P&gt;
&lt;P&gt;aaa authentication match AuthPolicy Inside RadiusProfile&lt;/P&gt;
&lt;P&gt;/&lt;/P&gt;
&lt;P&gt;access-list AuthPolicy line 1 extended permit ip 172.16.0.0 255.255.0.0 any4&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tried creating an Authentication Profile on the Palo with a subsequent Authentication Enforcement Object. That is directly referenced in the Authentication policy which follows the asa access-list (permit zone Inside source address 172.16.0.0/16 to any destination) but I do not believe it is working.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I attempt to test it, the authentication policy has no hits on it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looking for some help please if any of you have knowlege of this area.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best Regards&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 10:22:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/authentication-policy-cisco-asa-to-palo-migration/m-p/350013#M2969</guid>
      <dc:creator>yaz3636</dc:creator>
      <dc:date>2020-09-17T10:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Policy Cisco ASA to Palo Migration</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/authentication-policy-cisco-asa-to-palo-migration/m-p/350162#M2970</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/100709"&gt;@yaz3636&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please &amp;nbsp;refer below article on how to configure authentication policy in Palo Alto Networks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/policies/policies-authentication/create-and-manage-authentication-policy.html#idc43c52bf-b641-415d-b573-5914b67c4b4d" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/policies/policies-authentication/create-and-manage-authentication-policy.html#idc43c52bf-b641-415d-b573-5914b67c4b4d&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 14:56:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/authentication-policy-cisco-asa-to-palo-migration/m-p/350162#M2970</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2020-09-17T14:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Policy Cisco ASA to Palo Migration</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/authentication-policy-cisco-asa-to-palo-migration/m-p/350163#M2971</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38629"&gt;@lychiang&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes I have followed these steps in the link you sent.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Server Profile &amp;gt;&lt;/P&gt;
&lt;P&gt;Auth Profile &amp;gt; (referencing Server Profile)&lt;/P&gt;
&lt;P&gt;Authentication Object &amp;gt; (Referencing Auth Profile)&lt;/P&gt;
&lt;P&gt;Authentication Policy &amp;gt; (referencing the Auth Object)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am still unable to get a hit on the authentication, I have used service any as a catch all, tested with SSH and Pings and still unable to get a hit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 15:01:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/authentication-policy-cisco-asa-to-palo-migration/m-p/350163#M2971</guid>
      <dc:creator>yaz3636</dc:creator>
      <dc:date>2020-09-17T15:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Policy Cisco ASA to Palo Migration</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/authentication-policy-cisco-asa-to-palo-migration/m-p/350164#M2972</link>
      <description>&lt;P&gt;As I know this works on web traffic only . You might want to test with web traffic , if there is any questions , please open a TAC case.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 15:03:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/authentication-policy-cisco-asa-to-palo-migration/m-p/350164#M2972</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2020-09-17T15:03:28Z</dc:date>
    </item>
  </channel>
</rss>

