<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect with Duo MFA in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547571#M4166</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223445"&gt;@Satyak&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I would say the following seems the cause:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;2023-06-12 13:32:30.407 -0700 debug: pan_auth_response_process(pan_auth_state_engine.c:4810): Auth FAILED for user "rajeev" thru &amp;lt;"DUO-Authentication-Profile", "vsys1"&amp;gt;: remote server 192.168.10.198 of server profile "DUO-Service-Profile" is down, or in retry interval, or request timed out (elapsed time 26 secs, max allowed 25 secs)&lt;/LI-CODE&gt;
&lt;P&gt;It looks like your firewall doesn't have access to the RADIUS proxy, or the proxy is not configured properly and it doesn't reply.&lt;/P&gt;
&lt;P&gt;By default PAN FW will use mgmt interface to reach radius server (if you haven't configure service route for it)&lt;/P&gt;
&lt;P&gt;- Confirm network connectivity between FW and radius proxy&lt;/P&gt;
&lt;P&gt;- Use packet capture to confirm server receive traffic from FW. Is it replying?&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jun 2023 13:44:32 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2023-06-28T13:44:32Z</dc:date>
    <item>
      <title>Global Protect with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547461#M4163</link>
      <description>&lt;P&gt;Hi Friends,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have configured the duo mfa for global protect users.&lt;/P&gt;
&lt;P&gt;We have configured all the requirements for the duo using the below mentioned link.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://duo.com/docs/paloalto" target="_blank"&gt;https://duo.com/docs/paloalto&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But still the MFA is not working.&lt;/P&gt;
&lt;P&gt;I have some logs related to this but&lt;/P&gt;
&lt;P&gt;Can you please help me where we are missing or making a mistake.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Logs :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2023-06-12 13:32:04.800 -0700 debug: _authenticate_initial(pan_auth_state_engine.c:2459): Trying to authenticate (init auth): &amp;lt;profile: "DUO-Authentication-Profile", vsys: "vsys1", policy: "", username "rajeev"&amp;gt; ; timeout setting: 25 secs ; authd id: 7243124266353295669&lt;BR /&gt;2023-06-12 13:32:04.800 -0700 debug: _get_auth_prof_detail(pan_auth_util.c:1112): non-admin user thru Global Protect "rajeev" ; auth profile "DUO-Authentication-Profile" ; vsys "vsys1"&lt;BR /&gt;2023-06-12 13:32:04.800 -0700 debug: _get_authseq_profile(pan_auth_util.c:893): Auth profile/vsys (DUO-Authentication-Profile/vsys1) is NOT auth sequence&lt;BR /&gt;2023-06-12 13:32:04.800 -0700 debug: _retrieve_svr_ids(pan_auth_service.c:645): could not find auth server id vector for DUO-Authentication-Profile-vsys1-mfa&lt;BR /&gt;2023-06-12 13:32:04.800 -0700 debug: add_info_from_auth_profile_to_request(pan_auth_util.c:1068): MFA is not configured for the auth profile. No mfa server ids for the user "" (prof/vsys: DUO-Authentication-Profile/vsys1)&lt;BR /&gt;2023-06-12 13:32:04.800 -0700 debug: add_info_from_auth_profile_to_request(pan_auth_util.c:1079): MFA configured, but bypassed for GP user ''. (prof/vsys: DUO-Authentication-Profile/vsys1)&lt;BR /&gt;2023-06-12 13:32:04.800 -0700 debug: _authenticate_initial(pan_auth_state_engine.c:2648): Keep original username, i.e., whatever end-user typed, "rajeev" in request-&amp;gt;username&lt;BR /&gt;2023-06-12 13:32:04.801 -0700 debug: pan_auth_locklist_response_process(pan_auth_state_engine.c:4358): b_postauth_grpcheck=true, delay allow list check&lt;BR /&gt;2023-06-12 13:32:04.801 -0700 debug: _authenticate_by_localdb_or_remote_server(pan_auth_state_engine.c:1892): Authenticating user "rajeev" with &amp;lt;profile: "DUO-Authentication-Profile", vsys: "vsys1"&amp;gt;&lt;BR /&gt;2023-06-12 13:32:04.801 -0700 debug: _retrieve_svr_ids(pan_auth_service.c:648): find auth server id vector for DUO-Authentication-Profile-vsys1&lt;BR /&gt;2023-06-12 13:32:04.801 -0700 debug: pan_authd_radius_create_req_payload(pan_authd_radius.c:236): username: rajeev&lt;BR /&gt;2023-06-12 13:32:04.801 -0700 debug: pan_make_radius_request_buf(pan_authd_radius_prot.c:396): RADIUS request type: PAP&lt;BR /&gt;2023-06-12 13:32:30.407 -0700 debug: auth_svr_timeout_sent_request(pan_auth_svr.c:263): timeout auth request (authd id=7243124266353295669, username=rajeev) since total elapsed sec 26 &amp;gt;= max allowed secs: 25&lt;BR /&gt;2023-06-12 13:32:30.407 -0700 debug: pan_auth_response_process(pan_auth_state_engine.c:4554): auth status: auth timed out&lt;BR /&gt;2023-06-12 13:32:30.407 -0700 debug: pan_auth_response_process(pan_auth_state_engine.c:4810): Auth FAILED for user "rajeev" thru &amp;lt;"DUO-Authentication-Profile", "vsys1"&amp;gt;: remote server 192.168.10.198 of server profile "DUO-Service-Profile" is down, or in retry interval, or request timed out (elapsed time 26 secs, max allowed 25 secs)&lt;BR /&gt;2023-06-12 13:32:30.407 -0700 failed authentication for user 'rajeev'. Reason: Authentication request is timed out. auth profile 'DUO-Authentication-Profile', vsys 'vsys1', server profile 'DUO-Service-Profile', server address '192.168.10.198', auth protocol 'PAP', From: 49.14.159.62.&lt;BR /&gt;2023-06-12 13:32:30.407 -0700 debug: _log_auth_respone(pan_auth_server.c:311): Sent PAN_AUTH_FAILURE auth response for user 'rajeev' (exp_in_days=0 (-1 never; 0 within a day))(authd_id: 7243124266353295669)&lt;BR /&gt;2023-06-12 13:32:47.374 -0700 debug: cfgagent_opcmd_callback(pan_cfgagent.c:520): authd: cfg agent received op command from server&lt;BR /&gt;2023-06-12 13:32:47.374 -0700 debug: cfgagent_doop_callback(pan_cfgagent.c:555): received signal to execute for agent: authd&lt;BR /&gt;2023-06-12 13:32:47.374 -0700 debug: pan_authd_opcmd_handler(pan_auth_ops.c:1057): Start executing cmd: "show_user_auth_stat_internal"&lt;BR /&gt;2023-06-12 13:32:47.375 -0700 debug: pan_authd_show_user_auth_stat_internal(pan_auth_ops.c:997): Got admin user "admin" last successful login time: 06/12/2023 11:18:58 ; number of failed attempts since last successful login: 0&lt;BR /&gt;2023-06-12 13:32:47.375 -0700 debug: pan_authd_opcmd_handler(pan_auth_ops.c:1062): Return: "&amp;lt;last-successful-login-time&amp;gt;06/12/2023 11:18:58&amp;lt;/last-successful-login-time&amp;gt;&amp;lt;failed-attempts-since-last-successful-login&amp;gt;0&amp;lt;/failed-attempts-since-last-successful-login&amp;gt;"&lt;BR /&gt;2023-06-12 13:32:47.375 -0700 debug: pan_authd_opcmd_handler(pan_auth_ops.c:1063): Finish executing cmd: "show_user_auth_stat_internal"&lt;BR /&gt;2023-06-12 13:32:49.841 -0700 debug: cfgagent_opcmd_callback(pan_cfgagent.c:520): authd: cfg agent received op command from server&lt;BR /&gt;2023-06-12 13:32:49.841 -0700 debug: cfgagent_doop_callback(pan_cfgagent.c:555): received signal to execute for agent: authd&lt;BR /&gt;2023-06-12 13:32:49.841 -0700 debug: pan_authd_opcmd_handler(pan_auth_ops.c:1057): Start executing cmd: "show_user_auth_stat_internal"&lt;BR /&gt;2023-06-12 13:32:49.841 -0700 debug: pan_authd_show_user_auth_stat_internal(pan_auth_ops.c:997): Got admin user "admin" last successful login time: 06/12/2023 11:18:58 ; number of failed attempts since last successful login: 0&lt;BR /&gt;2023-06-12 13:32:49.841 -0700 debug: pan_authd_opcmd_handler(pan_auth_ops.c:1062): Return: "&amp;lt;last-successful-login-time&amp;gt;06/12/2023 11:18:58&amp;lt;/last-successful-login-time&amp;gt;&amp;lt;failed-attempts-since-last-successful-login&amp;gt;0&amp;lt;/failed-attempts-since-last-successful-login&amp;gt;"&lt;BR /&gt;2023-06-12 13:32:49.841 -0700 debug: pan_authd_opcmd_handler(pan_auth_ops.c:1063): Finish executing cmd: "show_user_auth_stat_internal"&lt;BR /&gt;100%&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and Regards&lt;/P&gt;
&lt;P&gt;Satya Kalyan.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 18:46:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547461#M4163</guid>
      <dc:creator>Satyak</dc:creator>
      <dc:date>2023-06-27T18:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547571#M4166</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223445"&gt;@Satyak&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I would say the following seems the cause:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;2023-06-12 13:32:30.407 -0700 debug: pan_auth_response_process(pan_auth_state_engine.c:4810): Auth FAILED for user "rajeev" thru &amp;lt;"DUO-Authentication-Profile", "vsys1"&amp;gt;: remote server 192.168.10.198 of server profile "DUO-Service-Profile" is down, or in retry interval, or request timed out (elapsed time 26 secs, max allowed 25 secs)&lt;/LI-CODE&gt;
&lt;P&gt;It looks like your firewall doesn't have access to the RADIUS proxy, or the proxy is not configured properly and it doesn't reply.&lt;/P&gt;
&lt;P&gt;By default PAN FW will use mgmt interface to reach radius server (if you haven't configure service route for it)&lt;/P&gt;
&lt;P&gt;- Confirm network connectivity between FW and radius proxy&lt;/P&gt;
&lt;P&gt;- Use packet capture to confirm server receive traffic from FW. Is it replying?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 13:44:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547571#M4166</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-06-28T13:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547572#M4167</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223445"&gt;@Satyak&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;From the logs, the firewall does not receive the response from Radius until timeout happens.&lt;BR /&gt;&lt;EM&gt;2023-06-12 13:32:30.407 -0700 failed authentication for user 'rajeev'. Reason: Authentication request is timed out.&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have seen such issues. Please make sure of the following:&lt;BR /&gt;&lt;BR /&gt;1. The Radius server uses PAP, as you have that configured in the Radius Server profile.&lt;BR /&gt;2. Check the connectivity between the Radius and firewall management. From management interface, try pinging the Radius server IP.&lt;/P&gt;
&lt;P&gt;3. If the above seem to be fine, maybe try increasing the timeout under Device &amp;gt; Radius &amp;gt; &amp;lt;Radius Server Profile&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let me know how it goes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Arnesh&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 13:47:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547572#M4167</guid>
      <dc:creator>Arnesh</dc:creator>
      <dc:date>2023-06-28T13:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547598#M4168</link>
      <description>&lt;P&gt;Hi Aleksaandar,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is network connectivity from the firewall to the RADIUS proxy i have checked it by pinging it from the firewall ip to the duo server ip it was pinging&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please help me with what filters i need to do a packet capture I mean what should be the source ip and what should be the destination ip&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 16:28:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547598#M4168</guid>
      <dc:creator>Satyak</dc:creator>
      <dc:date>2023-06-28T16:28:57Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547599#M4169</link>
      <description>&lt;P&gt;Hi Arnesh,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is reachability from the firewall to the radius server.&lt;/P&gt;
&lt;P&gt;I have tried it by pinging it from the firewall management ip to radius server ip.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Satya Kalyan&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 16:30:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547599#M4169</guid>
      <dc:creator>Satyak</dc:creator>
      <dc:date>2023-06-28T16:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547617#M4170</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223445"&gt;@Satyak&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt; and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/253055"&gt;@Arnesh&lt;/a&gt; mentioned, the request is timing out which means the NGFW is not receiving a response from the RADIUS server.&amp;nbsp; The link you posted details how to configure RADIUS MFA with the Duo Authentication Proxy (DAP).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should troubleshoot on the DAP now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Launch the Duo Authentication Proxy Manager and verify the proxy is running.&lt;/LI&gt;
&lt;LI&gt;Click the Validate button and verify you have no errors in the right column.&lt;/LI&gt;
&lt;LI&gt;Make sure the client IP, client secret, and port are configured under the [radius_server_auto] section.&lt;/LI&gt;
&lt;LI&gt;Open the C:\Program Files\Duo Security Authentication Proxy\log\authproxy.log file and scroll to the bottom and verify you have received the RADIUS request from the NGFW.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 18:58:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-with-duo-mfa/m-p/547617#M4170</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-06-28T18:58:46Z</dc:date>
    </item>
  </channel>
</rss>

