<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy Based Forwarding - Enforce Symmetric Return in Integration Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/268816#M45</link>
    <description>&lt;P&gt;You’re welcome. I’m glad that my TAC experience is useful for others.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jun 2019 15:59:13 GMT</pubDate>
    <dc:creator>singhup</dc:creator>
    <dc:date>2019-06-11T15:59:13Z</dc:date>
    <item>
      <title>Policy Based Forwarding - Enforce Symmetric Return</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/239667#M7</link>
      <description>&lt;P&gt;Dear All,&lt;BR /&gt;&lt;BR /&gt;I integrade PALOALTO to Tacacs+ for authenticator, but I got message error as below&lt;BR /&gt;&lt;BR /&gt;Authentication to TACACS+ server at '192.168.101.46' for user 'user1'&lt;BR /&gt;Server port: 49, timeout: 10, flag: 0&lt;BR /&gt;Egress: 192.168.101.42&lt;BR /&gt;Attempting CHAP authentication ...&lt;BR /&gt;CHAP authentication request is created&lt;BR /&gt;Sending credential: xxxxxx&lt;BR /&gt;CHAP authentication request is sent&lt;BR /&gt;Authorization request is created&lt;BR /&gt;Authorization request sent with priv_lvl=1 user=user1 service=PaloAlto protocol=&lt;BR /&gt;firewall&lt;BR /&gt;Authorization failed: Return code: 17 Illegal packet (version=0xc1 type=0x02)&lt;BR /&gt;Authentication/authorization failed against TACACS+ server at 192.168.101.46:49&lt;BR /&gt;for user user1&lt;BR /&gt;&lt;BR /&gt;Anyone encounter this issue ?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 08:38:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/239667#M7</guid>
      <dc:creator>HengTIDC</dc:creator>
      <dc:date>2018-11-13T08:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Forwarding - Enforce Symmetric Return</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/253397#M14</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The message body of this post (TACACS issue) doesn't seem to correlate to the subject line (Policy Based Forwarding).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you opened a support case regarding the TACACS message you posted?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which version of PAN-OS are you running on your firewall?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know there was at least one case where a bug was identified based on how the firewall was sending an invalid message to the TACACS+ server - the resulting behavior was logged the same as you depict in your post. That particular issue was fixed in PAN-OS 8.0.15.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please keep in mind that there will always be cases where further investigation is required in order to obtain the root cause before a final resolution is determined. If you are still experiencing this issue, I would recommend that you open a support case to get assistance with this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your post!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jeff Hochberg | Sr. Systems Engineer - Technical Business Development&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Palo Alto Networks&amp;nbsp;|&amp;nbsp;Atlanta, GA&amp;nbsp;|&amp;nbsp;&amp;nbsp;USA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;The content of this message is the proprietary and confidential property of Palo Alto Networks and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by reply e-mail. Any unauthorized use or distribution of the content of this message is prohibited.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 22:32:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/253397#M14</guid>
      <dc:creator>jhochberg</dc:creator>
      <dc:date>2019-03-12T22:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Forwarding - Enforce Symmetric Return</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/262031#M39</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have successful authentication from TACACS but there is a missing VSA due to which authorization is failing. To resolve this, configure VSA&amp;nbsp; with string value as Superuser on the TACACS server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;US&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2019 08:52:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/262031#M39</guid>
      <dc:creator>singhup</dc:creator>
      <dc:date>2019-05-23T08:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Forwarding - Enforce Symmetric Return</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/268784#M43</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/114364"&gt;@singhup&lt;/a&gt;&amp;nbsp;thanks for your response!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/97236"&gt;@HengTIDC&lt;/a&gt;&amp;nbsp;please try the recommended solution and let us know if that works for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Jeff Hochberg | Sr. Systems Engineer - Technical Business Development&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Palo Alto Networks&amp;nbsp;|&amp;nbsp;Atlanta, GA&amp;nbsp;|&amp;nbsp;&amp;nbsp;USA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The content of this message is the proprietary and confidential property of Palo Alto Networks and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by reply e-mail. Any unauthorized use or distribution of the content of this message is prohibited.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 15:21:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/268784#M43</guid>
      <dc:creator>jhochberg</dc:creator>
      <dc:date>2019-06-11T15:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Forwarding - Enforce Symmetric Return</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/268816#M45</link>
      <description>&lt;P&gt;You’re welcome. I’m glad that my TAC experience is useful for others.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 15:59:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/policy-based-forwarding-enforce-symmetric-return/m-p/268816#M45</guid>
      <dc:creator>singhup</dc:creator>
      <dc:date>2019-06-11T15:59:13Z</dc:date>
    </item>
  </channel>
</rss>

