<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tacacs+ Cisco ISE config in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517809#M107440</link>
    <description>&lt;P&gt;No, you don't have to create the accounts locally on the firewall. You don't even need to use local accounts on the ISE as you can join AD to the ISE and then use the AD credentials to log in to the firewall. Are you having any issues?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Oct 2022 15:37:44 GMT</pubDate>
    <dc:creator>sureshvina</dc:creator>
    <dc:date>2022-10-13T15:37:44Z</dc:date>
    <item>
      <title>Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/230962#M66332</link>
      <description>Does anyone know how to configure the cisco ISE side? We can use tacacs now to access the gui but only local usernames and passwords work when trying to access the CLI using SSH. Does anyone have a complete cisco ISE setup? I found a guide to set up palo alto on the cisco ACS platform but ACS is end of life.</description>
      <pubDate>Sat, 15 Sep 2018 20:21:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/230962#M66332</guid>
      <dc:creator>MarioMarquez</dc:creator>
      <dc:date>2018-09-15T20:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/232874#M66804</link>
      <description>&lt;P&gt;What are the settings in your admin role? Do they include CLI?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 23:53:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/232874#M66804</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2018-09-27T23:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/256191#M72680</link>
      <description>&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;I just got TACACS+ working with my ISE deployment.&amp;nbsp; Here are the steps:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p3"&gt;&lt;SPAN class="s2"&gt;1) Configure your PA Firewall following these steps:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/authentication/configure-tacacs-authentication" target="_blank"&gt;&lt;SPAN class="s3"&gt;https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/authentication/configure-tacacs-authentication&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;***Important Note #1: In step 4 of this document it specifies a role.&amp;nbsp; You can use a prebuilt or a custom role, but it is critical you note the name in order to for ISE to reference the VSA configuration in your shell profile.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;2) I had already configured TACACS+ device administration on my ISE deployment, so check the admin guide for those directions.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;3) Add the PA firewall as a network resource on ISE.&amp;nbsp; Configure, IP, name pre-shared key, and check the TACACS+ as the protocol.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Create any Network Device Groups for reference in the policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p3"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p3"&gt;&lt;SPAN class="s2"&gt;4) Create a Palo Alto custom TACACS profile.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Reference this document: &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/authentication/authentication-types/tacacs.html#" target="_blank"&gt;&lt;SPAN class="s3"&gt;https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/authentication/authentication-types/tacacs.html#&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;For Custom Attributes you’ll need to make the type ‘MANDATORY’, use the requisite name in the document above and the Value is whatever role you specified in the note in step one on the PANOS &amp;gt; Device &amp;gt; Admin Roles.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;So an example of this would be:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;TACACS Profile Custom Attribute&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;‘MANDATORY’ - ‘PaloAlto-Admin-Role’ - &amp;lt;insert firewall defined custom or default Admin Role&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;5) Create a policy set that references your group of PA firewalls under conditions of the policy.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Choose your identity source for authentication.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;For authorization, set your conditions and reference the shell profile in step 4.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;This allowed me to authenticate using AD via ISE TACACS+ based on existing identities in ISE and roles set on the Palo Alto Firewall.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 20:58:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/256191#M72680</guid>
      <dc:creator>alok47</dc:creator>
      <dc:date>2019-04-04T20:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/334350#M84352</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I also need to integrate&amp;nbsp;PA with TACACS ISE. in our network ISE is integrated with AD. And Admin groups are defined there in AD. In PA i created admin role i.e Custom admin Role. i called the AD Groups in palo alto.&amp;nbsp; But user are failed to authenticate.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="lia-message-author-with-avatar"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 19 Jun 2020 16:27:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/334350#M84352</guid>
      <dc:creator>SajidMasood</dc:creator>
      <dc:date>2020-06-19T16:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/334576#M84402</link>
      <description>&lt;P&gt;I kind of have this working, CLI works but GUI doesn't fully.&lt;BR /&gt;The PA configuration part is pretty straightforward. I've never gotten anything to work without having 'all' in the allow list in the auth profile.&lt;BR /&gt;For ISE, you need to create a custom Shell profile and create the necessary custom attribute that defines the role you want to assign on the PA.&lt;BR /&gt;The list of attributes is here: &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/authentication/authentication-types/tacacs.html#" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/authentication/authentication-types/tacacs.html#&lt;/A&gt;&lt;BR /&gt;So you could create a Shell profile with customer attrib of Type=MANDATORY, Name=PaloAlto-Admin-Role, Value=Superuser&lt;BR /&gt;Then create your authorization policy with your PA definitions and your AD group as conditions and apply the custom shell profile.&lt;/P&gt;&lt;P&gt;When I do this, an account not defined in the Administrators tab is able to log in to the CLI and do all Superuser tasks. For the GUI, the same logon shows successful in the PA logs but I just get sent back to the login page, no GUI access.&lt;BR /&gt;If I create the account in the Administrators tab and apply the specific tacacs policy to them, then everything works.&lt;BR /&gt;&lt;BR /&gt;I've been meaning to open a ticket with TAC to address the GUI issue but haven't gotten to it yet. If I learn something from them, I'll update here.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 17:02:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/334576#M84402</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2020-06-22T17:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/337778#M85013</link>
      <description>&lt;P&gt;I believe I have this working as expected now. The accounts we're using are not defined locally on the firewall, they just exist in AD.&lt;/P&gt;&lt;P&gt;When creating the Shell profile in ISE, I had to use 3 mandatory custom attributes:&lt;/P&gt;&lt;P&gt;service = PaloAlto&lt;/P&gt;&lt;P&gt;protocol = firewall&lt;/P&gt;&lt;P&gt;PaloAlto-Admin-Role = superuser (or whatever custom admin role you want to define on the firewall)&lt;/P&gt;&lt;P&gt;I have the tacacs authentication profile set in the authentication settings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2020 17:40:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/337778#M85013</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2020-07-10T17:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/446909#M100641</link>
      <description>&lt;P&gt;I managed to get this work and documented the whole process if anybody was interested.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.packetswitch.co.uk/configure-palo-alto-tacacs-authentication-against-cisco-ise/" target="_blank"&gt;https://www.packetswitch.co.uk/configure-palo-alto-tacacs-authentication-against-cisco-ise/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Nov 2021 08:25:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/446909#M100641</guid>
      <dc:creator>sureshvina</dc:creator>
      <dc:date>2021-11-11T08:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/479423#M103891</link>
      <description>&lt;P&gt;I followed your article and can't passed authentication in policy set using activate directory.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;22064 authentication method is not supported by any applicable identity store(s)&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 22:54:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/479423#M103891</guid>
      <dc:creator>tony.pshenichnykh</dc:creator>
      <dc:date>2022-04-08T22:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517753#M107431</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, do you have to&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;create the accounts and defined them locally on the firewall to get it work ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 08:55:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517753#M107431</guid>
      <dc:creator>AK74</dc:creator>
      <dc:date>2022-10-13T08:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517799#M107437</link>
      <description>&lt;P&gt;Look at chart below, this is for Cisco ISE. Palo Alto only supports CHAP or PAP for authentication via RADIUS or TACACS+. In the chart, where it shows CHAP. ISE doesn't support LDAP. To answer your question, if you want to use TACACS then yes you would have to create accounts locally on ISE, but if you are already doing that then might as well create accounts locally on the Palo's with Authentication Profile to LDAP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360" border="1" width="100%"&gt;&lt;CAPTION&gt;&amp;nbsp;&lt;/CAPTION&gt;&lt;COLGROUP&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR class=""&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__1" class=""&gt;
&lt;P class=""&gt;Protocol (Authentication Type)&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__2" class=""&gt;
&lt;P class=""&gt;Internal Database&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__3" class=""&gt;
&lt;P class=""&gt;Active Directory&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__4" class=""&gt;
&lt;P class=""&gt;LDAP&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__5" class=""&gt;
&lt;P class=""&gt;RADIUS Token Server or RSA&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__6" class=""&gt;
&lt;P class=""&gt;REST&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__7" class=""&gt;
&lt;P class=""&gt;ODBC&lt;/P&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;EAP-GTC, PAP (plain text password)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;MS-CHAP password hash:&lt;/P&gt;
&lt;P class=""&gt;MSCHAPv1/v2&lt;/P&gt;
&lt;P class=""&gt;&lt;SPAN class=""&gt;EAP-MSCHAPv2 (as inner method of PEAP, EAP-FAST, EAP-TTLS or TEAP)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class=""&gt;LEAP&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;EAP-MD5&lt;/P&gt;
&lt;P class=""&gt;CHAP&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;EAP-TLS&lt;/P&gt;
&lt;P class=""&gt;PEAP-TLS&lt;/P&gt;
&lt;P class=""&gt;(certificate retrieval)&lt;/P&gt;
&lt;SECTION class=""&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;/SECTION&gt;
&lt;TABLE role="note" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="1%" class=""&gt;&lt;STRONG&gt;&lt;STRONG&gt;Note&amp;nbsp;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;SECTION class=""&gt;
&lt;SECTION class=""&gt;
&lt;P class=""&gt;For TLS authentications (EAP-TLS and PEAP-TLS), identity sources are not required but can optionally be added for authorization policy conditions.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Thu, 13 Oct 2022 14:58:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517799#M107437</guid>
      <dc:creator>tony.pshenichnykh</dc:creator>
      <dc:date>2022-10-13T14:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517809#M107440</link>
      <description>&lt;P&gt;No, you don't have to create the accounts locally on the firewall. You don't even need to use local accounts on the ISE as you can join AD to the ISE and then use the AD credentials to log in to the firewall. Are you having any issues?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 15:37:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517809#M107440</guid>
      <dc:creator>sureshvina</dc:creator>
      <dc:date>2022-10-13T15:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517814#M107442</link>
      <description>&lt;P&gt;You can do that only if you are using PAP, but that will not work with CHAP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 15:59:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517814#M107442</guid>
      <dc:creator>tony.pshenichnykh</dc:creator>
      <dc:date>2022-10-13T15:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517925#M107455</link>
      <description>&lt;P&gt;I've used CHAP in this example -&amp;nbsp;&lt;A href="https://www.packetswitch.co.uk/configure-palo-alto-tacacs-authentication-against-cisco-ise/" target="_blank"&gt;https://www.packetswitch.co.uk/configure-palo-alto-tacacs-authentication-against-cisco-ise/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;(Step - 1 of the blog post)&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2022 08:29:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/517925#M107455</guid>
      <dc:creator>sureshvina</dc:creator>
      <dc:date>2022-10-14T08:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518330#M107539</link>
      <description>&lt;P&gt;Why can't we use CHAP instead of PAP as it more secure ?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 08:49:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518330#M107539</guid>
      <dc:creator>AK74</dc:creator>
      <dc:date>2022-10-19T08:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518344#M107544</link>
      <description>&lt;P&gt;This article is truly astounding. Appreciative for sharing.A commitment of appreciation is all together for the association, keep on sharing such an information.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 10:30:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518344#M107544</guid>
      <dc:creator>Englersa</dc:creator>
      <dc:date>2022-10-19T10:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518365#M107549</link>
      <description>&lt;P&gt;Again, it really depends on what you are trying to do. If it's using ISE for TACAS and authenticate via AD then CHAP will not work. I have provided chart above in this article why it will not work.&lt;/P&gt;
&lt;P&gt;If you are going to create local accounts on ISE then CHAP will work fine.&lt;BR /&gt;A lot of folks if you haven't noticed yet in their TACACS articles are using CHAP, yes, but they create accounts locally. No one mentions that AD for authentication using CHAP is not supported in ISE.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 14:20:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518365#M107549</guid>
      <dc:creator>tony.pshenichnykh</dc:creator>
      <dc:date>2022-10-19T14:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518367#M107551</link>
      <description>&lt;P&gt;Article shows using CHAP but accounts are locally created in ISE? It doesn't show using AD for authentication.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 14:25:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518367#M107551</guid>
      <dc:creator>tony.pshenichnykh</dc:creator>
      <dc:date>2022-10-19T14:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518368#M107552</link>
      <description>&lt;P&gt;Oh yes, you are right. I remember configuring CHAP with AD and it didn't work so, had to revert back to PAP. CHAP will only work if you have local-ISE accounts.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 14:25:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518368#M107552</guid>
      <dc:creator>sureshvina</dc:creator>
      <dc:date>2022-10-19T14:25:47Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518371#M107554</link>
      <description>&lt;P&gt;This is why CHAP will not work. I will repost the chart from previous page. This is supported by ISE. Palo Alto needs to more options in TACACS than just PAP/CHAP, and honestly I don't think PAP should even be an option.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;TABLE id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360" border="1" width="100%"&gt;&lt;CAPTION&gt;&amp;nbsp;&lt;/CAPTION&gt;&lt;COLGROUP&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;COL /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR class=""&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__1" class=""&gt;
&lt;P class=""&gt;Protocol (Authentication Type)&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__2" class=""&gt;
&lt;P class=""&gt;Internal Database&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__3" class=""&gt;
&lt;P class=""&gt;Active Directory&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__4" class=""&gt;
&lt;P class=""&gt;LDAP&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__5" class=""&gt;
&lt;P class=""&gt;RADIUS Token Server or RSA&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__6" class=""&gt;
&lt;P class=""&gt;REST&lt;/P&gt;
&lt;/TH&gt;
&lt;TH id="concept_BD3A270FEC0C411DA10FB808C14B48D5__ID360__entry__7" class=""&gt;
&lt;P class=""&gt;ODBC&lt;/P&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR class=""&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;EAP-GTC, PAP (plain text password)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;MS-CHAP password hash:&lt;/P&gt;
&lt;P class=""&gt;MSCHAPv1/v2&lt;/P&gt;
&lt;P class=""&gt;&lt;SPAN class=""&gt;EAP-MSCHAPv2 (as inner method of PEAP, EAP-FAST, EAP-TTLS or TEAP)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class=""&gt;LEAP&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;EAP-MD5&lt;/P&gt;
&lt;P class=""&gt;CHAP&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;EAP-TLS&lt;/P&gt;
&lt;P class=""&gt;PEAP-TLS&lt;/P&gt;
&lt;P class=""&gt;(certificate retrieval)&lt;/P&gt;
&lt;SECTION class=""&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;/SECTION&gt;
&lt;TABLE role="note" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="1%" class=""&gt;&lt;STRONG&gt;Note&amp;nbsp;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;SECTION class=""&gt;
&lt;SECTION class=""&gt;
&lt;P class=""&gt;For TLS authentications (EAP-TLS and PEAP-TLS), identity sources are not required but can optionally be added for authorization policy conditions.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;Yes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class=""&gt;
&lt;P class=""&gt;No&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 19 Oct 2022 14:29:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/518371#M107554</guid>
      <dc:creator>tony.pshenichnykh</dc:creator>
      <dc:date>2022-10-19T14:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+ Cisco ISE config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/534483#M109986</link>
      <description>&lt;P&gt;I currently have this issue, Authenticatoin and Authorization passes in ISE and I can see the VSA String in the Response from ISE but I get not Authorized at the PAN GUI, anyone have luck in getting this resolved&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Murph_0-1678896713261.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48724i571F55E68988A26C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Murph_0-1678896713261.png" alt="Murph_0-1678896713261.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Murph_1-1678896740807.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48725i480ABCE55A92345E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Murph_1-1678896740807.png" alt="Murph_1-1678896740807.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Murph_2-1678896776465.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48726iB52694843797B677/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Murph_2-1678896776465.png" alt="Murph_2-1678896776465.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 16:13:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/m-p/534483#M109986</guid>
      <dc:creator>Murph</dc:creator>
      <dc:date>2023-03-15T16:13:08Z</dc:date>
    </item>
  </channel>
</rss>

