<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect issues after updating firewall version to 10.2.3 in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523787#M3490</link>
    <description>&lt;P&gt;is it a pa-220 by any chance? we (at least another person I have direct contact with) has issues since updating to 10.2.3 and GP connections failing. I see the same error messages in gp logs, coming from mobile devices.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ios-stuck/td-p/487381" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ios-stuck/td-p/487381&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Dec 2022 10:52:00 GMT</pubDate>
    <dc:creator>pan219</dc:creator>
    <dc:date>2022-12-12T10:52:00Z</dc:date>
    <item>
      <title>GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523656#M3485</link>
      <description>&lt;P&gt;Hi Team&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The customer recently updated one of their firewalls to version 10.2.3 and now when we try to connect to the GlobalProtect client on the end user's machines, we are prompted twice to sign in. The monitoring tab gives a failure with "Authentication failed: empty password". Adding to this, we use Cisco Duo for MFA and we are prompted twice to send a push or enter a passcode every time the client attempts to log in.&lt;/P&gt;
&lt;P&gt;The issue only started after upgrading the firewall and there is no issue being experienced on the old firewall version.&lt;/P&gt;
&lt;P&gt;The customer has tried to move to the newer GP client version:6.0.3 with no change and also tried reverting back to 6.0.1 and we still have the same issue where the client is prompted twice with Duo Push.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have verified and recommended the configuration as per &lt;STRONG&gt;Palo Best Practice to Generate and Accept the authentication cookie&lt;/STRONG&gt; but still no change. &lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004LvbCAE&amp;amp;lang=en_US%E2%80%A9" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004LvbCAE&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Device &lt;STRONG&gt;Checks/Custom Checks on the portal are not enabled&lt;/STRONG&gt; and thus it is not overriding the Authentication settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No other changes have been made to the configuration and the customer stated that the issue was after upgrading to 10.2.3. I do not see any known issues listed and thus would like to confirm if anybody has seen or faced the issue after the upgrade.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried checking the logs and can see from authd.log:&lt;/P&gt;
&lt;P&gt;Some noticeable logs:&lt;BR /&gt;14:50:10.631 -0800 debug: pan_auth_loop(pan_auth_server.c:165): &lt;STRONG&gt;After 300 seconds, authd didn't receive requests, tear down existing socket 14 now&lt;/STRONG&gt;&lt;BR /&gt;14:51:09.307 -0800&lt;STRONG&gt; Error: _get_saml_info(pan_authd_saml.c:595): Failed to find cert for in vsys 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Pan GPS logs&lt;/STRONG&gt; shows:&lt;/P&gt;
&lt;P&gt;P2727-T19975 12/06/2022 15:38:58:124 Debug(9288): ----Portal Login starts----&lt;BR /&gt;P2727-T19975 12/06/2022 15:38:58:124 Debug(2419): Unserialized non-empty cookie for portal lv-gp.korteco.com and user xxxxxx&lt;BR /&gt;P2727-T19975 12/06/2022 15:38:58:124 Debug(9310): Cookie exists for saved user xxxxxx. Update saved user to user. Continue for saml&lt;BR /&gt;P2727-T19975 12/06/2022 15:38:58:124&lt;STRONG&gt; Error(9245): GetPassword(): invalid parameter.&lt;/STRONG&gt;&lt;BR /&gt;P2727-T19975 12/06/2022 15:38:58:124 &lt;STRONG&gt;Debug(14582): Failed to get portal saved password.&lt;/STRONG&gt;&lt;BR /&gt;P2727-T19975 12/06/2022 15:38:58:124 Debug(11139): Password is empty.&lt;BR /&gt;P2727-T19975 12/06/2022 15:38:58:124 Info ( 582): EVP_DecryptFinal_ex failed&lt;BR /&gt;P2727-T19975 12/06/2022 15:38:58:124 Debug(9224): Failed to decrypt data&lt;BR /&gt;P2727-T19975 12/06/2022 15:38:58:124 Debug(9279): Failed to get portal user password.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;P2727-T19975 12/07/2022 06:51:53:507 Debug( 482): error detail is HTTPS User Authentication failure.&lt;BR /&gt;P2727-T19975 12/07/2022 06:51:53:507 Debug( 367): received no data&lt;BR /&gt;P2727-T19975 12/07/2022 06:51:53:507 Debug( 475): m_bUserAuthentication is set to false.&lt;BR /&gt;P2727-T19975 12/07/2022 06:51:53:507 Debug(14333): Auth failed. Private header is auth-failed-password-empty&lt;BR /&gt;P2727-T19975 12/07/2022 06:51:53:507 Debug(14362): Auth failed empty password for portal&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Detailed Authd.log&lt;/STRONG&gt; from the time:&lt;BR /&gt;14:45:10.301 -0800 Use "@/tmp/authd.sock", unix domain socket to get authd clients' requests&lt;BR /&gt;14:50:10.631 -0800 debug: pan_auth_loop(pan_auth_server.c:165): After 300 seconds, authd didn't receive requests, tear down existing socket 14 now&lt;BR /&gt;14:50:10.631 -0800 Use "@/tmp/authd.sock", unix domain socket to get authd clients' requests&lt;BR /&gt;14:51:09.304 -0800 debug: pan_auth_request_process(pan_auth_state_engine.c:3612): Receive request: msg type PAN_AUTH_REQ_SAML_CREATE_SSO_REQUEST, conv id 286, body length 2448&lt;BR /&gt;14:51:09.304 -0800 debug: _log_saml_input(pan_auth_state_engine.c:2917): Trying to handle SAML/CAS message: &amp;lt;profile: "Duo SSO GlobalProtect", vsys: "vsys1", authd_id: 7172359225543230206 RelayState: "dffe2e79-365f-4d14-b8c3-6820522595ac" 14:51:09.306 -0800 debug: pan_auth_sql_clear_lock_expired_users(pan_authd_sqlite.c:3139): Locklist entries 0, not clearing&lt;BR /&gt;14:51:09.307 -0800 Authd in enum phase 4&lt;BR /&gt;14:51:09.307 -0800 Error: _get_saml_info(pan_authd_saml.c:595): Failed to find cert for in vsys 0&lt;BR /&gt;14:51:09.898 -0800 debug: _retrieve_svr_ids(pan_auth_service.c:645): &lt;STRONG&gt;could not find auth server id vector for Duo SSO GlobalProtect-vsys1-mfa&lt;/STRONG&gt;&lt;BR /&gt;14:51:09.898 -0800 debug: add_info_from_auth_profile_to_request(pan_auth_util.c:1068): &lt;STRONG&gt;MFA is not configured for the auth profile. No mfa server ids for the user "" (prof/vsys: Duo SSO GlobalProtect/vsys1)&lt;/STRONG&gt;&lt;BR /&gt;14:51:09.898 -0800 debug: add_info_from_auth_profile_to_request(pan_auth_util.c:1079): MFA configured, but bypassed for GP user ''. (prof/vsys: Duo SSO GlobalProtect/vsys1)&lt;BR /&gt;14:51:09.898 -0800 debug: pan_auth_cache_user_is_allowed(pan_auth_cache_allowlist_n_grp.c:571): This is a single vsys platform, group check for allow list is performed on "vsys1"&lt;BR /&gt;&lt;BR /&gt;Any help in this regard would be appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Dec 2022 00:44:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523656#M3485</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2022-12-10T00:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523738#M3488</link>
      <description>&lt;P&gt;Hi Team&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just wanted to check if anyone has faced this issue. Is there anything we need to check further?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Appreciate any response on this.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 19:54:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523738#M3488</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2022-12-09T19:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523787#M3490</link>
      <description>&lt;P&gt;is it a pa-220 by any chance? we (at least another person I have direct contact with) has issues since updating to 10.2.3 and GP connections failing. I see the same error messages in gp logs, coming from mobile devices.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ios-stuck/td-p/487381" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ios-stuck/td-p/487381&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 10:52:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523787#M3490</guid>
      <dc:creator>pan219</dc:creator>
      <dc:date>2022-12-12T10:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523859#M3492</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customer is on PA-820 and this started after upgrading 10.2.3&lt;BR /&gt;&lt;BR /&gt;Authd.logs have reference to:&lt;BR /&gt;16:32:38 2022-12-06 16:32:38.616 -0800 debug: _log_saml_input(pan_auth_state_engine.c:2917): Trying to handle SAML/CAS message: &amp;lt;profile: "&lt;STRONG&gt;Duo SSO GlobalProtect", vsys: "vsys1"&lt;/STRONG&gt;, authd_id: 7172359225543230233 RelayState: "743c3d0d-3f57-48a1-8441-4479fc1567f0" 16:32:38 2022-12-06 16:32:38.616 -0800 Authd in enum phase 4&lt;BR /&gt;16:32:38 2022-12-06 16:32:38.616 -0800 Error: _get_saml_info(pan_authd_saml.c:595): &lt;STRONG&gt;Failed to find cert for in vsys 0&lt;/STRONG&gt;&lt;BR /&gt;16:32:38 2022-12-06 16:32:38.616 -0800 debug: _get_payload(pan_authd_saml_internal.c:1064): b64 decoded payload length=6470.&lt;BR /&gt;16:32:38 2022-12-06 16:32:38.617 -0800 Received SAML Assertion from '&lt;A href="https://sso-x.x.x.x.x..sso.duosecurity.com/saml2/sp/DI5UUKRR6P16NSI7NWIP/metadata" target="_blank"&gt;https://sso-x.x.x.x.x..sso.duosecurity.com/saml2/sp/DI5UUKRR6P16NSI7NWIP/metadata&lt;/A&gt;' from client 'x.x.x.x'&lt;BR /&gt;16:32:38 2022-12-06 16:32:38.617 -0800 debug: _extract_sso_attribute(pan_authd_saml_internal.c:526): Got attr name (username) "User.Username" ; value "testuser"; &lt;BR /&gt;16:32:38 1670373158 ERROR XMLTooling.CredentialResolver.File : &lt;STRONG&gt;unable to stat local resource (/opt/pancfg/mgmt/global/authd/idp.cert)&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;In globalprotect logs we see: "Authentication failed: empty password"&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Can this be the issue do we have re-import the&amp;nbsp;cert?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 22:03:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523859#M3492</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2022-12-12T22:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523888#M3493</link>
      <description>&lt;P&gt;The customer has PA-820,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what we see from authd.log file is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;debug: _log_saml_input(pan_auth_state_engine.c:2917):&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Trying to handle SAML/CAS message: &amp;lt;profile: "Duo SSO GlobalProtect", vsys: "vsys1"&lt;/STRONG&gt;, authd_id: 7172359225543230232 RelayState: "743c3d0d-3f57-48a1-8441-4479fc1567f0" &amp;nbsp;16:32:12 &amp;nbsp; 2022-12-06 16:32:12.799 -0800 Authd in enum phase 4&lt;BR /&gt;&amp;nbsp;Error: &amp;nbsp;&lt;STRONG&gt;_get_saml_info(pan_authd_saml.c:595): Failed to find cert for &amp;nbsp;in vsys 0&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV&gt;debug: pan_auth_cache_user_is_allowed(pan_auth_cache_allowlist_n_grp.c:571): This is a single vsys platform, group check for allow list is performed on "vsys1"&lt;/DIV&gt;
&lt;DIV&gt;debug: _retrieve_svr_ids(pan_auth_service.c:645):&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;could not find auth server id vector for Duo SSO GlobalProtect-vsys1-mfa&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV&gt;ERROR XMLTooling.CredentialResolver.File :&lt;STRONG&gt;unable to stat local resource (/opt/pancfg/mgmt/global/authd/idp.cert)&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;Could this be the issue caused by an improper upgrade and if we need to re-import the cert?&lt;/DIV&gt;</description>
      <pubDate>Tue, 13 Dec 2022 03:00:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523888#M3493</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2022-12-13T03:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523951#M3497</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/240639"&gt;@UtkarshKumar&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I would start troubleshooting this by just reimporting the certificate since the logs are saying it can't be found. If that clears things up, then it's a simple enough fix to get things working properly again.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 15:31:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/523951#M3497</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-12-13T15:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/524817#M3528</link>
      <description>&lt;P&gt;I am having the same issue...&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 22:30:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/524817#M3528</guid>
      <dc:creator>EduRamirez</dc:creator>
      <dc:date>2022-12-21T22:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/524818#M3529</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;We tried to reimport the cert but still facing the same issue. The logs shows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;05:31:12.640 -0800 debug: _extract_sso_attribute(pan_authd_saml_internal.c:526): Got attr name (username) "User.Username" ; value "xxxxx";&lt;/P&gt;
&lt;P&gt;mp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authd.log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2022-12-21 05:31:12&amp;nbsp;&amp;nbsp; 1671629472 ERROR &lt;STRONG&gt;XMLTooling.CredentialResolver.File : unable to stat local resource (/opt/pancfg/mgmt/global/authd/idp.cert)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;mp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authd.log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2022-12-21 05:31:12&amp;nbsp;&amp;nbsp; 1671629472 INFO OpenSAML.Utility.SAMLSign : successful signature verification&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Client logs:&lt;/P&gt;
&lt;P&gt;P1435-T12807 12/21/2022 07:30:14:188 Debug(13923): Portal auth method: saml, auth src: IDP&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:188 Debug( 339): Original host lv-gp.korteco.com(lv-gp.korteco.com)&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:188 Debug( 127): set session proxy to 1-0x105b1c2b8.&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:188 Debug( 561): Portal or gateway login, set connect timeout to 30.0&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:188 Info ( 419): Timeouts monitor started, LocalDataTask &amp;lt;F5EEE864-38B6-4F93-98F6-EA6A653BBCC0&amp;gt;.&amp;lt;2&amp;gt;, connect timeout 30.0, receive timeout 30.0&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:398 Info ( 530): Finished with &lt;A href="https://urldefense.com/v3/__http:/lv-gp.korteco.com:443__;!!HUqgN_M!vtqQEPtdCpVK5N_1B3ONiqpOOkLP_zANsPn-fOXq9EqfY6zp9ZGk-JA179trC_Ydj-sAd2JPbIDhN-g9MrU$" target="_blank"&gt;http://x.x.x.x.x.:443&lt;/A&gt;&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:398 Debug( 482):&lt;STRONG&gt;&amp;nbsp;error detail is HTTPS User Authentication failure.&lt;/STRONG&gt;&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:398 Debug( 367):&amp;nbsp;&lt;STRONG&gt;received no data&lt;/STRONG&gt;&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:398 Debug( 475): m_bUserAuthentication is set to false.&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:398 Debug(14333):&lt;STRONG&gt;&amp;nbsp;Auth failed. Private header is auth-failed-password-empty&lt;/STRONG&gt;&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:398 Debug(14362):&amp;nbsp;&lt;STRONG&gt;Auth failed empty password for portal&lt;/STRONG&gt;&lt;BR /&gt;P1435-T12807 12/21/2022 07:30:14:398 Debug( 676): GetHttpResponse: m_errorDetails is HTTPS User Authentication failure..&lt;BR /&gt;&lt;BR /&gt;Let us know if we can do anything else to stop Dual Duo push notifications.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 22:35:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/524818#M3529</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2022-12-21T22:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/524894#M3536</link>
      <description>&lt;P&gt;You have to downgrade the PAN-OS version that was working before. PAN-OS 10.2.3 is not supporting Duo MFA, which has been confirmed by PANW on a support case, it could be fixed on the 10.2.4 PAN-OS version.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 21:26:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/524894#M3536</guid>
      <dc:creator>EduRamirez</dc:creator>
      <dc:date>2022-12-22T21:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/524922#M3539</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Dec 2022 02:33:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/524922#M3539</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2022-12-23T02:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/526775#M3575</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/240639"&gt;@UtkarshKumar&lt;/a&gt; - did you end up having to re-import the cert to resolve this? Facing a similar issue on PAN-OS 10.1. &lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 12:26:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/526775#M3575</guid>
      <dc:creator>BENGOOCH</dc:creator>
      <dc:date>2023-01-12T12:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/527967#M3607</link>
      <description>&lt;P&gt;This might be related to&amp;nbsp;&lt;SPAN&gt;PAN-186957 upgrading to 10.2.x from 10.1.6 breaks the IDP configuration. The metadata for authe profile defined with saml idp under global protect drop down doesn't show any value.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 15:07:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/527967#M3607</guid>
      <dc:creator>kumaresh_mishra</dc:creator>
      <dc:date>2023-01-20T15:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/555734#M4333</link>
      <description>&lt;P&gt;What debug commands did you run? also, what was your solution? We are having the same issue but with PAN-OS 11.0.2, it's really hindering access to our remote users right now. Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 16:55:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/555734#M4333</guid>
      <dc:creator>pharney26</dc:creator>
      <dc:date>2023-08-29T16:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/557018#M4369</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/196083"&gt;@pharney26&lt;/a&gt;&amp;nbsp; Did you found any workaround for this issue? We are having the same issue with PAN 11.0.2&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 16:08:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/557018#M4369</guid>
      <dc:creator>pkathiriya</dc:creator>
      <dc:date>2023-09-07T16:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/557022#M4370</link>
      <description>&lt;P&gt;As of now, no workaround was found other than remote users re-trying their connection. Support has escalated this issue to tier 2 and i am now waiting on them.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 16:16:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/557022#M4370</guid>
      <dc:creator>pharney26</dc:creator>
      <dc:date>2023-09-07T16:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/557111#M4372</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/196083"&gt;@pharney26&lt;/a&gt;&amp;nbsp;Looks like downgrading to 10.2.4h3&amp;nbsp; fixes the issue but we only downgraded today. I will send an update here next week.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 04:31:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/557111#M4372</guid>
      <dc:creator>pkathiriya</dc:creator>
      <dc:date>2023-09-08T04:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect issues after updating firewall version to 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/558642#M4407</link>
      <description>&lt;P&gt;Any update?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 20:41:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-issues-after-updating-firewall-version-to-10-2-3/m-p/558642#M4407</guid>
      <dc:creator>pharney26</dc:creator>
      <dc:date>2023-09-19T20:41:36Z</dc:date>
    </item>
  </channel>
</rss>

