<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco DUO MFA with Radius under Global Protect in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cisco-duo-mfa-with-radius-under-global-protect/m-p/441178#M2031</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167254"&gt;@Vijaygvasan&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You mentioned RADIUS.&amp;nbsp; Have you configured the Duo Authentication Proxy?&amp;nbsp; Here is a doc for GP, but the RADIUS config is the same regardless of the use case.&amp;nbsp; &lt;A href="https://duo.com/docs/paloalto" target="_blank"&gt;https://duo.com/docs/paloalto&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is an overview of supported use cases and protocols for PANW MFA.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/mfa-vendor-support/mfa-vendor-support-table.html" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/mfa-vendor-support/mfa-vendor-support-table.html&lt;/A&gt;&amp;nbsp; Note that the MFA server profiles can only be used with the Authentication Policy for now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Fri, 15 Oct 2021 21:04:52 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2021-10-15T21:04:52Z</dc:date>
    <item>
      <title>Cisco DUO MFA with Radius under Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cisco-duo-mfa-with-radius-under-global-protect/m-p/441108#M2030</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are trying to configure MFA under Radius using Cisco DUO.&lt;/P&gt;&lt;P&gt;We have done the configuration for MFA in firewall for the same.&lt;/P&gt;&lt;P&gt;Now we are facing some problem such as&amp;nbsp;&lt;STRONG&gt;'Reason: Invalid username/password. auth profile \'Duo_Auth\', vsys \'vsys1\', server profile \'Duo_Radius\', server address Failed to communicate with any Active Directory server\' From: &lt;/STRONG&gt;x.x.x.x'&lt;/P&gt;&lt;P&gt;This is the error coming in system log.&lt;/P&gt;&lt;P&gt;Also when we tried to login with CLI using &lt;STRONG&gt;test authentication authentication-profile auth-profile username &amp;amp; passwork.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We received this below error message.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Target vsys is not specified, user "username" is assumed to be configured with a shared auth profile.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Do allow list check before sending out authentication request...&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;name "username" is in group "all"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Egress: No service source route is set, might use destination source route if configured&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Authentication to RADIUS server at x.x.x.x:1812 for user "Username"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Authentication type: PAP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Now send request to remote server ...&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Authentication failed against RADIUS server at x.x.x.x:1812 for user "Username"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Authentication failed for user "Username"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What could be the cause here let me know what could be done next.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Oct 2021 16:38:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cisco-duo-mfa-with-radius-under-global-protect/m-p/441108#M2030</guid>
      <dc:creator>Vijaygvasan</dc:creator>
      <dc:date>2021-10-15T16:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco DUO MFA with Radius under Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cisco-duo-mfa-with-radius-under-global-protect/m-p/441178#M2031</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167254"&gt;@Vijaygvasan&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You mentioned RADIUS.&amp;nbsp; Have you configured the Duo Authentication Proxy?&amp;nbsp; Here is a doc for GP, but the RADIUS config is the same regardless of the use case.&amp;nbsp; &lt;A href="https://duo.com/docs/paloalto" target="_blank"&gt;https://duo.com/docs/paloalto&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is an overview of supported use cases and protocols for PANW MFA.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/mfa-vendor-support/mfa-vendor-support-table.html" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/mfa-vendor-support/mfa-vendor-support-table.html&lt;/A&gt;&amp;nbsp; Note that the MFA server profiles can only be used with the Authentication Policy for now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 15 Oct 2021 21:04:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cisco-duo-mfa-with-radius-under-global-protect/m-p/441178#M2031</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-10-15T21:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco DUO MFA with Radius under Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cisco-duo-mfa-with-radius-under-global-protect/m-p/441261#M2032</link>
      <description>&lt;P&gt;Could you please share any methods or documents to use Authentication policy using MFA.&lt;/P&gt;&lt;P&gt;Or some steps would be fine for that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Sat, 16 Oct 2021 07:10:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cisco-duo-mfa-with-radius-under-global-protect/m-p/441261#M2032</guid>
      <dc:creator>Vijaygvasan</dc:creator>
      <dc:date>2021-10-16T07:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco DUO MFA with Radius under Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cisco-duo-mfa-with-radius-under-global-protect/m-p/441294#M2033</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167254"&gt;@Vijaygvasan&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sure!&amp;nbsp; Here is a doc -&amp;gt; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HANzCAO&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HANzCAO&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;.&amp;nbsp; That doc uses an MFA server profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With PANW and Duo, there are 4 ways to configure MFA:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;RADIUS with Duo Authentication Proxy (free install from Duo on Windows server).&lt;OL class="lia-list-style-type-lower-alpha"&gt;&lt;LI&gt;The RADIUS server profile configured in the GP doc in the previous reply can also be applied to Auth Policy.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;SAML with Duo Access Gateway (another free install on Windows).&lt;OL class="lia-list-style-type-lower-alpha"&gt;&lt;LI&gt;Here is a doc -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/authentication/configure-multi-factor-authentication/configure-mfa-between-duo-and-the-firewall.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/authentication/configure-multi-factor-authentication/configure-mfa-between-duo-and-the-firewall.html&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;The SAML server profile configured in this doc can also be applied to Auth Policy&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;SAML with Duo SSO.&lt;OL class="lia-list-style-type-lower-alpha"&gt;&lt;LI&gt;Can authenticate against another cloud IdP.&lt;/LI&gt;&lt;LI&gt;Can authenticate against local AD with Duo Authentication Proxy.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;MFA Server Profile&lt;OL class="lia-list-style-type-lower-alpha"&gt;&lt;LI&gt;This procedure is outlined in the top URL of this reply.&lt;/LI&gt;&lt;LI&gt;It needs to be combined with a primary authentication profile.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Oct 2021 14:28:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cisco-duo-mfa-with-radius-under-global-protect/m-p/441294#M2033</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-10-16T14:28:14Z</dc:date>
    </item>
  </channel>
</rss>

