<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Authentication Radius doesn't work after upgrade firmware to 10.2.2 in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/508058#M2963</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on PA-220 I've update firmware version from 10.1.5h1 to 10.2.2.&lt;/P&gt;&lt;P&gt;We have globalprotect work with Radius Authentication with protocol&amp;nbsp;PEAP-MSCHAPv2.&lt;/P&gt;&lt;P&gt;After the upgrade it doesn't work anymore. (it works with other protocol, like PAP).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Certificates are ok, nothing changed.&lt;BR /&gt;We've already tried to change radius server without success.&lt;BR /&gt;This is the error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;test authentication authentication-profile vpn-radius username ots50025 password&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Enter password :&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Target vsys is not specified, user "ots50025" is assumed to be configured with a shared auth profile.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Do allow list check before sending out authentication request...&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;user "xxxxxxx\ots50025" is a member of allowed group "cn=vpn-cisco-ch,ou=permission groups,dc=xxxxxx,dc=local" on vsys "vsys1"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Egress: No service source route is set, might use destination source route if configured&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Test authentication to RADIUS server 10.2.20.55:1812 for user: "ots50025" using protocol: PEAP with MSCHAPv2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Failed EAPOL auth (-1).&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Response for user: "ots50025" from RADIUS server: "protocol version"&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;STRONG&gt;Authentication failed against RADIUS server at 10.2.20.55:1812 for user "ots50025"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any ideas?&lt;BR /&gt;It's not among know issues of the new version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks to everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Jul 2022 09:40:37 GMT</pubDate>
    <dc:creator>Ots-network</dc:creator>
    <dc:date>2022-07-06T09:40:37Z</dc:date>
    <item>
      <title>Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/508058#M2963</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on PA-220 I've update firmware version from 10.1.5h1 to 10.2.2.&lt;/P&gt;&lt;P&gt;We have globalprotect work with Radius Authentication with protocol&amp;nbsp;PEAP-MSCHAPv2.&lt;/P&gt;&lt;P&gt;After the upgrade it doesn't work anymore. (it works with other protocol, like PAP).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Certificates are ok, nothing changed.&lt;BR /&gt;We've already tried to change radius server without success.&lt;BR /&gt;This is the error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;test authentication authentication-profile vpn-radius username ots50025 password&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Enter password :&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Target vsys is not specified, user "ots50025" is assumed to be configured with a shared auth profile.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Do allow list check before sending out authentication request...&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;user "xxxxxxx\ots50025" is a member of allowed group "cn=vpn-cisco-ch,ou=permission groups,dc=xxxxxx,dc=local" on vsys "vsys1"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Egress: No service source route is set, might use destination source route if configured&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Test authentication to RADIUS server 10.2.20.55:1812 for user: "ots50025" using protocol: PEAP with MSCHAPv2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Failed EAPOL auth (-1).&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Response for user: "ots50025" from RADIUS server: "protocol version"&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;STRONG&gt;Authentication failed against RADIUS server at 10.2.20.55:1812 for user "ots50025"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any ideas?&lt;BR /&gt;It's not among know issues of the new version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks to everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2022 09:40:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/508058#M2963</guid>
      <dc:creator>Ots-network</dc:creator>
      <dc:date>2022-07-06T09:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/508062#M2964</link>
      <description>&lt;P&gt;UPDATE:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we've opened a tk to palo alto support, they suggest us to try with a radius server Win2022. and it works.&lt;BR /&gt;Waiting for some more explanation and to know if they will fix the issue with some new release.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2022 12:18:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/508062#M2964</guid>
      <dc:creator>Ots-network</dc:creator>
      <dc:date>2022-07-06T12:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/508265#M2968</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/172299"&gt;@Ots-network&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;What version of Windows Server are you currently running? I haven't run into this issue in my lab where I have 10.2 still going through validation, but those are connecting to Server 2022 and Server 2019 installs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2022 21:19:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/508265#M2968</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-07-07T21:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/509797#M3021</link>
      <description>&lt;P&gt;Hello BPry,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sorry for the delate but i was on holiday.&lt;BR /&gt;At this moment we are still waiting for an answer from Palo Alto.&lt;/P&gt;
&lt;P&gt;Now we are working with a 2022 Radius.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The answer from PA was simply: chiper suite is different in 10.2&lt;/P&gt;
&lt;P&gt;but if we check online 10.2 and 10.1 chiper suite are the same.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-2/cipher-suites-supported-in-pan-os-10-2-decryption#idf5ea9a25-3f5c-47d7-90f7-51c7a93696b4" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-2/cipher-suites-supported-in-pan-os-10-2-decryption#idf5ea9a25-3f5c-47d7-90f7-51c7a93696b4&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-1/cipher-suites-supported-in-pan-os-10-1-decryption" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-1/cipher-suites-supported-in-pan-os-10-1-decryption&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At this point they asked us to send the certificate and now we are waiting since 10 days.&lt;BR /&gt;No news.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;About your question we had 2008 and a 2016 radius.&amp;nbsp; Unfortunately we can't test 2019 at this moment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2022 14:33:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/509797#M3021</guid>
      <dc:creator>Ots-network</dc:creator>
      <dc:date>2022-07-25T14:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/522031#M3446</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Did you received any updates on this case ?&lt;BR /&gt;We are facing the same issue with radius server in 2016. &lt;BR /&gt;&lt;BR /&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 12:56:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/522031#M3446</guid>
      <dc:creator>ExternalSupport</dc:creator>
      <dc:date>2022-11-22T12:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/522303#M3454</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'm having the same issue with NPS installed on windows 2019 Datacenter. After upgrading to 10.2.3 MSCHAPv2 authentication stopped working. PAP is working with no issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;admin@PA-220&amp;gt; test authentication authentication-profile "Authentication Profile" username "Username" password&lt;BR /&gt;Enter password :&lt;/P&gt;
&lt;P&gt;Target vsys is not specified, user "Username" is assumed to be configured with a shared auth profile.&lt;/P&gt;
&lt;P&gt;Do allow list check before sending out authentication request...&lt;BR /&gt;name "Username" is in group "all"&lt;/P&gt;
&lt;P&gt;Egress: No service source route is set, might use destination source route if configured&lt;BR /&gt;Test authentication to RADIUS server X.X.X.X:1812 for user: "Username" using protocol: PEAP with MSCHAPv2&lt;BR /&gt;Failed EAPOL auth (3).&lt;BR /&gt;Authentication failed against RADIUS server at X.X.X.X:1812 for user "Username"&lt;/P&gt;
&lt;P&gt;Authentication failed for user "Username"&lt;/P&gt;
&lt;P&gt;admin@PA-220&amp;gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 21:52:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/522303#M3454</guid>
      <dc:creator>PedroLopez</dc:creator>
      <dc:date>2022-11-23T21:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/522334#M3455</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Thank you for those details, it shows the fact that even a windows 2019 is not sufficient.&lt;/P&gt;
&lt;P&gt;On our side, we tried updating palo from 10.1.8 to 10.2.2-h2 (the actual preferred palo support release).&lt;BR /&gt;We can't see any authentication logs on the server radius side when a user try to connect through GP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 07:37:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/522334#M3455</guid>
      <dc:creator>ExternalSupport</dc:creator>
      <dc:date>2022-11-24T07:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/526031#M3555</link>
      <description>&lt;P&gt;So I have been working through this some.&amp;nbsp; I have a Microsoft NPS radius server that worked fine with 10.1, but upon upgrading to 10.2 RADIUS authentications have failed.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;It appears to be the TLS version which is causing the problem.&amp;nbsp; By default my NPS server only uses TLS 1.0, but 10.2 requires a minimum of TLS 1.1, and I have only got it working with TLS 1.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To enabled TLS 1.2 on NPS I had to add a registry key&lt;BR /&gt;&lt;STRONG&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\PPP\EAP\13&lt;/STRONG&gt;&lt;BR /&gt;Dword called&amp;nbsp; &amp;nbsp;&lt;SPAN&gt;TlsVersion&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Value is a hex OR of&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;TLS 1.0 0xC0 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;TLS 1.1 0x300 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;TLS 1.2 0xC00&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So the downside I am finding, I have to enable TLS 1.2 which gets 10.2 working, but then it breaks my 10.1 firewalls.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Even when I use the value&amp;nbsp; 0xF30&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 17:56:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/526031#M3555</guid>
      <dc:creator>BKRogers</dc:creator>
      <dc:date>2023-01-05T17:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/545585#M4115</link>
      <description>&lt;P&gt;Greetings everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had this same issue and found a different, but related solution.&amp;nbsp; It appears that in 10.2 the minimum key length for the certificate has been increased to 2048.&amp;nbsp; In 10.1 it was 1024 or lower (I didn't test but I know 1024 worked).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you use an internal PKI that was seutp a while ago and just used the default certificate template for IAS and RAS, it is setup a minimum key length of 1024.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had to modify the template and reissue all the certificates.&amp;nbsp; With no other changes this solved my issue.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 04:12:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/545585#M4115</guid>
      <dc:creator>kfrankovich</dc:creator>
      <dc:date>2023-06-12T04:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication Radius doesn't work after upgrade firmware to 10.2.2</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/545586#M4116</link>
      <description>&lt;P&gt;I should have specified I am talking about the certificate configured in NPS for PEAP (The Constraints tab, Authentication Methods, Microsoft:&amp;nbsp; Protected EAP (PEAP)&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 04:14:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/authentication-radius-doesn-t-work-after-upgrade-firmware-to-10/m-p/545586#M4116</guid>
      <dc:creator>kfrankovich</dc:creator>
      <dc:date>2023-06-12T04:14:48Z</dc:date>
    </item>
  </channel>
</rss>

