<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Nominated Discussion: Configure a second DUO for PA firewall MFA in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-configure-a-second-duo-for-pa-firewall-mfa/ta-p/540908</link>
    <description>&lt;P&gt;This Nominated Discussion Article is based on the post "&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/configure-second-duo-for-pa-firewall-mfa/m-p/539953" target="_blank" rel="noopener"&gt;Configure second DUO for PA firewall MFA&lt;/A&gt;&amp;nbsp;" by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/166658"&gt;@boblin&lt;/a&gt; and responded to by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt; , &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt; , &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;. Read on to see the discussion and solution! Make sure to check out the document &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/166658"&gt;@boblin&lt;/a&gt; created and linked at the bottom to assist other users !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;We have configured a DUO Proxy server for PA firewall MFA and it works. We also configured the second DUO proxy server for redundancy. However, we don't know how to configure PA firewall to fail-over to the second DUO in a case the primary DUO proxy server is down. Any help?&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to add auth sequence under &lt;STRONG&gt;"Device &amp;gt; Authentication Sequence"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Add both RADIUS profiles there. Configure GlobalProtect auth to use previously configured sequence.&lt;/P&gt;
&lt;P&gt;Check how many retries and timeout your RADIUS profiles have configured under &lt;STRONG&gt;"Device &amp;gt; Server Profiles &amp;gt; RADIUS"&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let's assume that you have 2 attempts with 20 seconds timeout.&lt;/P&gt;
&lt;P&gt;This leaves 20 seconds for secondary RADIUS server as GlobalProtect will time out in 60 seconds by default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might want to extend GP timeout.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMD5CAO" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMD5CAO&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Is it possible to configure active/active or balance? If so how to do it?&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The easiest way to configure redundancy for the same protocol is to add multiple servers in the RADIUS Server Profile. However, this will not load balance. The NGFW will try each one from the top down.&amp;nbsp; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClqECAS" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClqECAS&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;I have configured the second DUO proxy server, but it doesn't work. To troubleshooting, what would you do? Perhaps, where I can check the logs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I find authproxy.log and it shows:&lt;/P&gt;
&lt;P&gt;2023-04-26T15:56:36.843265-0500 [duoauthproxy.lib.log#info] Duo Security Authentication Proxy 5.7.4 - Init Complete&lt;BR /&gt;2023-04-26T16:08:57.409802-0500 [-] (UDP Port 1812 Closed)&lt;BR /&gt;2023-04-26T16:08:57.409802-0500 [-] Stopping protocol &amp;lt;duoauthproxy.lib.forward_serv.DuoForwardServer object at 0x0000028A1FE91E80&amp;gt;&lt;BR /&gt;2023-04-26T16:08:57.409802-0500 [-] Main loop terminated.&lt;BR /&gt;2023-04-26T16:09:05.780813-0500 [-] DuoForwardServer starting on 1812&lt;BR /&gt;2023-04-26T16:09:05.780813-0500 [-] Starting protocol &amp;lt;duoauthproxy.lib.forward_serv.DuoForwardServer object at 0x0000021AA5B81CA0&amp;gt;&lt;BR /&gt;2023-04-26T16:09:05.876008-0500 [duoauthproxy.lib.log#info] FIPS mode is not enabled&lt;BR /&gt;2023-04-26T16:09:05.876008-0500 [duoauthproxy.lib.log#info] Reactor in use: &amp;lt;twisted.internet.selectreactor.SelectReactor object at 0x0000021AA32785E0&amp;gt;&lt;BR /&gt;2023-04-26T16:09:05.876008-0500 [duoauthproxy.lib.log#info] AD Client Module Configuration:&lt;BR /&gt;2023-04-26T16:09:05.876008-0500 [duoauthproxy.lib.log#info] {'host': '10.0.0.58',&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;To troubleshoot:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Can you authenticate to the secondary RADIUS server that you created separate from the authentication sequence that you configured (create a temporary Authentication Profile with just the new config if needed)? &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Via the CLI you can do this with the &lt;STRONG&gt;'test authentication authentication-profile &amp;lt;profilename&amp;gt; username &amp;lt;username&amp;gt; password'&lt;/STRONG&gt; command to verify that it just isn't an issue on that secondary node.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can auto review the authd log file by using &lt;STRONG&gt;'less mp-log authd.log'&lt;/STRONG&gt; on the CLI as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;The second DUO Proxy server configuration is correct and works if I don't use &lt;SPAN&gt;authentication sequence&lt;/SPAN&gt;. For example, the first duo proxy IP is 10.0.0.119&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="boblin_0-1682557839831.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49813i673ABECE7CC656FF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="boblin_0-1682557839831.png" alt="boblin_0-1682557839831.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in RADIUS Server profile, if you change the IP to second DUO proxy 10.0.0.183, it works.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If in Authentication Profile, I have two profiles.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="boblin_1-1682558198277.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49814i328CB9C297F35B43/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="boblin_1-1682558198277.png" alt="boblin_1-1682558198277.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and&amp;nbsp;&lt;SPAN&gt;authentication sequence has two profiles.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="boblin_2-1682558226184.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49815iAC93F822CCC6DCE5/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="boblin_2-1682558226184.png" alt="boblin_2-1682558226184.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only DUO Profile works. If I stop the first duo proxy server, it doesn't work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How do you run&amp;nbsp;&lt;SPAN&gt;'test authentication authentication-profile'? I keep getting Invalid syntax.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="boblin_3-1682559055371.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49816iFCA25A6B66286D7F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="boblin_3-1682559055371.png" alt="boblin_3-1682559055371.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on your screenshot, you have a 120 seconds timeout.&amp;nbsp; That is an eternity!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For failover to ever happen it would take 3x120 seconds.&lt;/P&gt;
&lt;P&gt;GlobalProtect will wait only 60 seconds by default until it times out.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;I have two DUO profile in the authentication sequency and it works. However, it seems to me this is active/passive. How can we setup active/active or balance?&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Active/Active can be only set if RADIUS profile points to NAT policy in Palo and this NAT policy has dynamic destination IP with session distribution. But it will not check if destination is live or not. DNAT is just round robin or least session etc basis.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There's no other way to set active/active.&lt;/P&gt;
&lt;P&gt;Utilizing NAT with session distribution is kind of a hack that you can use if you really need active/active.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-networking-admin/nat/configure-nat/configure-destination-nat-using-dynamic-ip-addresses" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-networking-admin/nat/configure-nat/configure-destination-nat-using-dynamic-ip-addresses&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's a step by step guide&amp;nbsp;&lt;STRONG&gt;(full credits to the author &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/166658"&gt;@boblin&lt;/a&gt; for making this)&lt;/STRONG&gt;:&lt;/P&gt;
&lt;H3 class="entry-title"&gt;&lt;FONT size="4"&gt;&lt;A href="http://www.howtonetworking.com/blog/2023/04/17/how-do-we-configure-two-duo-proxy-servers-for-palo-alto-firewall/" target="_blank" rel="noopener"&gt;Configure two duo proxy servers for Palo alto firewall MFA redundancy&lt;/A&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 04 May 2023 18:36:30 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2023-05-04T18:36:30Z</dc:date>
    <item>
      <title>Nominated Discussion: Configure a second DUO for PA firewall MFA</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-configure-a-second-duo-for-pa-firewall-mfa/ta-p/540908</link>
      <description>&lt;P&gt;This Nominated Discussion Article is based on the post "&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/configure-second-duo-for-pa-firewall-mfa/m-p/539953" target="_blank" rel="noopener"&gt;Configure second DUO for PA firewall MFA&lt;/A&gt;&amp;nbsp;".&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 18:36:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-configure-a-second-duo-for-pa-firewall-mfa/ta-p/540908</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2023-05-04T18:36:30Z</dc:date>
    </item>
  </channel>
</rss>

