<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PAN-200 and Active Directory - Part II in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3980#M2937</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;EM&gt;Also have you specified any users in the allow-list, &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device - Authentication Profile&lt;/P&gt;&lt;P&gt;Name: Active Directory&lt;/P&gt;&lt;P&gt;Allow List: All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;EM&gt; login attribute in the authentication profile is set to sAMAccountName ?&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;I don't see a login attribute there.&amp;nbsp; But in Device - User Identification - Group Mapping Settings ..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Name: Windstream AD&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;User Objects - user name 'sAMAccountName'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;EDIT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Correction to the above - I put '&lt;EM style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;sAMAccountName' &lt;/EM&gt;in&amp;nbsp; the auth profile 'login attribute'.&amp;nbsp; Committed. Same issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Oct 2014 21:26:56 GMT</pubDate>
    <dc:creator>bdunbar</dc:creator>
    <dc:date>2014-10-06T21:26:56Z</dc:date>
    <item>
      <title>PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3977#M2934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12px;"&gt;PAN-200 Software version: 6.0.1 &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12px;"&gt;GlobalProtect Agent: 2.0.4 &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12px;"&gt;New domain, built on Windows Server 2012 R2.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm missing _something_.&amp;nbsp;&amp;nbsp; Setup as below and I cannot login with the domain name account to the VPN.&amp;nbsp; It's got to be one .. little .... thing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Device - Setup - Services - Services Features: Service Route Configuration / Destination&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Destination: &amp;lt;ip of domain controller&amp;gt;&lt;/LI&gt;&lt;LI&gt;Source Interface: Any&lt;/LI&gt;&lt;LI&gt;Source Address: 209.59.29.193/26&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Device - Server Profiles - LDAP - created server profile 'Windstream-AD'&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Server&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp; Name: tn-ad-01&lt;/LI&gt;&lt;LI&gt;&amp;nbsp; LDAP Server: &amp;lt;redacted IP&amp;gt;&lt;/LI&gt;&lt;LI&gt;&amp;nbsp; Port: 389&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unchecked SSL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Entered NetBIOS domain name&lt;/P&gt;&lt;P&gt;Type: Active Directory&lt;/P&gt;&lt;P&gt;Clicked the Base Drop down and voila: I got a base LDAP information, all filled in.&lt;/P&gt;&lt;P&gt;Entered&amp;nbsp; BIND DN and valid credentials.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Device - User Identification - Group Mapping Settings&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Found the Server Profile 'Windstream-AD'&lt;/P&gt;&lt;P&gt;Click 'Group Include List'&lt;/P&gt;&lt;P&gt;and it found the list &amp;lt;netbiosname&amp;gt;\ns-vpnusers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And .. now what? Is there something else?&amp;nbsp; The two users in the group ns-vpnusers cannot login with their domain credentials. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Man - what am I missing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 21:13:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3977#M2934</guid>
      <dc:creator>bdunbar</dc:creator>
      <dc:date>2014-10-06T21:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3978#M2935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/28274"&gt;bdunbar&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you verify if the login attribute in the authentication profile is set to sAMAccountName ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also have you specified any users in the allow-list, I will first suggest you to try with "all" in allow-list&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 21:15:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3978#M2935</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-10-06T21:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3979#M2936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-4417"&gt;How to Troubleshoot LDAP Authentication&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2910"&gt;How to Configure Active Directory Server Profile for Group Mapping and Authentication&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2961" title="https://live.paloaltonetworks.com/docs/DOC-2961"&gt;https://live.paloaltonetworks.com/docs/DOC-2961&lt;/A&gt;&lt;/P&gt;&lt;P&gt;will be helpful&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 21:22:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3979#M2936</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-10-06T21:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3980#M2937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;EM&gt;Also have you specified any users in the allow-list, &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device - Authentication Profile&lt;/P&gt;&lt;P&gt;Name: Active Directory&lt;/P&gt;&lt;P&gt;Allow List: All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;EM&gt; login attribute in the authentication profile is set to sAMAccountName ?&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;I don't see a login attribute there.&amp;nbsp; But in Device - User Identification - Group Mapping Settings ..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Name: Windstream AD&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;User Objects - user name 'sAMAccountName'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;EDIT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Correction to the above - I put '&lt;EM style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;sAMAccountName' &lt;/EM&gt;in&amp;nbsp; the auth profile 'login attribute'.&amp;nbsp; Committed. Same issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 21:26:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3980#M2937</guid>
      <dc:creator>bdunbar</dc:creator>
      <dc:date>2014-10-06T21:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3981#M2938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/28274"&gt;bdunbar&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am referring to this attribute:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="16092" alt="sAMAccountName.JPG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16092_sAMAccountName.JPG" style="height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 21:32:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3981#M2938</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-10-06T21:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3982#M2939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I realized my mistake (see edit).&amp;nbsp; I inserted that value there: no dice.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 21:35:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3982#M2939</guid>
      <dc:creator>bdunbar</dc:creator>
      <dc:date>2014-10-06T21:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3983#M2940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also make sure that you have set the user's AD account settings to allow the user to log onto "all computers" instead of the the "following computers".&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Tilak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 21:39:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3983#M2940</guid>
      <dc:creator>tshiv</dc:creator>
      <dc:date>2014-10-06T21:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3984#M2941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you type following command on CLI:&lt;/P&gt;&lt;P&gt;tail follow yes mp-log authd.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now try to login through global protect and paste the output of above command here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 21:40:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3984#M2941</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-10-06T21:40:25Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3985#M2942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting: LOCAL_CP is one of three auth profiles on the device.&amp;nbsp; The others are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keberos Auth - using this to login admin accounts authorized to Active Directory&lt;/P&gt;&lt;P&gt;Windstream Active Directory - this is my problem child, right now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AD account is first.last&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login as first.last&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:48:50.484 -0500 debug: pan_authd_service_req(pan_authd.c:3316): Authd:Trying to remote authenticate user: brian.dunbar&lt;/P&gt;&lt;P&gt;2014-10-06 16:48:50.484 -0500 debug: pan_authd_service_auth_req(pan_authd.c:1158): AUTH Request &amp;lt;'vsys1','LOCAL_GP','brian.dunbar'&amp;gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:48:50.493 -0500 debug: pan_localdb_authenticate(pan_authd_localdb_utils.c:133): No such user &amp;lt;vsys1,LOCAL_GP,brian.dunbar&amp;gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:48:50.494 -0500 authentication failed for local user &amp;lt;brian.dunbar(orig:brian.dunbar),LOCAL_GP,vsys1&amp;gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:48:50.494 -0500 debug: pan_authd_process_authresult(pan_authd.c:1353): pan_authd_process_authresult: brian.dunbar authresult not auth'ed&lt;/P&gt;&lt;P&gt;2014-10-06 16:48:50.510 -0500 debug: pan_authd_process_authresult(pan_authd.c:1399): Alarm generation set to: False.&lt;/P&gt;&lt;P&gt;2014-10-06 16:48:50.510 -0500 User 'brian.dunbar' failed authentication.&amp;nbsp; Reason: Invalid username/password From: 216.55.49.134.&lt;/P&gt;&lt;P&gt;2014-10-06 16:48:50.510 -0500 debug: pan_authd_generate_system_log(pan_authd.c:866): CC Enabled=False&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login as netbios\first.last&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:03.996 -0500 debug: pan_authd_service_req(pan_authd.c:3316): Authd:Trying to remote authenticate user: corp-cicayda\brian.dunbar&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:03.996 -0500 debug: pan_authd_service_auth_req(pan_authd.c:1158): AUTH Request &amp;lt;'vsys1','LOCAL_GP','corp-cicayda\brian.dunbar'&amp;gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:04.011 -0500 debug: pan_localdb_authenticate(pan_authd_localdb_utils.c:133): No such user &amp;lt;vsys1,LOCAL_GP,corp-cicayda\brian.dunbar&amp;gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:04.011 -0500 authentication failed for local user &amp;lt;corp-cicayda\brian.dunbar(orig:corp-cicayda\brian.dunbar),LOCAL_GP,vsys1&amp;gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:04.011 -0500 debug: pan_authd_process_authresult(pan_authd.c:1353): pan_authd_process_authresult: corp-cicayda\brian.dunbar authresult not auth'ed&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:04.021 -0500 debug: pan_authd_process_authresult(pan_authd.c:1399): Alarm generation set to: False.&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:04.021 -0500 User 'corp-cicayda\brian.dunbar' failed authentication.&amp;nbsp; Reason: Invalid username/password From: 216.55.49.134.&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:04.021 -0500 debug: pan_authd_generate_system_log(pan_authd.c:866): CC Enabled=False&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login as first.last@post-windows-2000.domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2014-10-06 16:49:21.859 -0500 debug: pan_authd_service_req(pan_authd.c:3316): Authd:Trying to remote authenticate user: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:brian.dunbar@corp.cicayda.com"&gt;brian.dunbar@corp.cicayda.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2014-10-06 16:49:21.860 -0500 debug: pan_authd_service_auth_req(pan_authd.c:1158): AUTH Request &amp;lt;'vsys1','LOCAL_GP',&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:'brian.dunbar@corp.cicayda.com"&gt;'brian.dunbar@corp.cicayda.com&lt;/A&gt;&lt;SPAN&gt;'&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:21.869 -0500 debug: pan_localdb_authenticate(pan_authd_localdb_utils.c:133): No such user &amp;lt;vsys1,LOCAL_GP,corp-cicayda\brian.dunbar&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2014-10-06 16:49:21.869 -0500 authentication failed for local user &amp;lt;corp-cicayda\brian.dunbar(orig:&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:brian.dunbar@corp.cicayda.com"&gt;brian.dunbar@corp.cicayda.com&lt;/A&gt;&lt;SPAN&gt;),LOCAL_GP,vsys1&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:21.869 -0500 debug: pan_authd_process_authresult(pan_authd.c:1353): pan_authd_process_authresult: corp-cicayda\brian.dunbar authresult not auth'ed&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:21.881 -0500 debug: pan_authd_process_authresult(pan_authd.c:1399): Alarm generation set to: False.&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:21.881 -0500 User 'corp-cicayda\brian.dunbar' failed authentication.&amp;nbsp; Reason: Invalid username/password From: 216.55.49.134.&lt;/P&gt;&lt;P&gt;2014-10-06 16:49:21.881 -0500 debug: pan_authd_generate_system_log(pan_authd.c:866): CC Enabled=False&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like the problem is that vsys1 is associated with 'LOCAL_GP'.&amp;nbsp; So .. I need to define a new virtual system (vsys2?) and associate that with LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm skimming virtual systems docs - very slick. I'm liking PAN more, and more.&amp;nbsp; Once I get it working I might well fall in love with it ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nope. I was wrong.&amp;nbsp; But looking to fix the above I made it right ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Network - Global Protect&amp;nbsp; - Portals - edit ..&lt;/P&gt;&lt;P&gt;Authentication from 'GP_Portal' (what we had setup for local access prior to getting AD stood up) to 'Windstream Active Directory' aka the profile I setup for LDAP/AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I'm in.&amp;nbsp; Groovy.&amp;nbsp; Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 21:51:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3985#M2942</guid>
      <dc:creator>bdunbar</dc:creator>
      <dc:date>2014-10-06T21:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-200 and Active Directory - Part II</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3986#M2943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you also check the domain controller logs at the same time ? Also make sure the user has not been locked out due to multiple failure attempts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 22:09:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-200-and-active-directory-part-ii/m-p/3986#M2943</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-10-06T22:09:30Z</dc:date>
    </item>
  </channel>
</rss>

