<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Panorama 4.1.8 LDAP Failure in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41551#M30551</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys, I was able to reproduce the same behavior my lab testing. The LDAP server profile is now (in 4.1.8)&amp;nbsp; not able to see the server correctly. The LDAP server is auto populating the base server info in the earlier version but not in 4.1.8. This looks buggy. Please open a ticket with support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sandeep T&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 26 Sep 2012 06:50:08 GMT</pubDate>
    <dc:creator>sdurga</dc:creator>
    <dc:date>2012-09-26T06:50:08Z</dc:date>
    <item>
      <title>Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41545#M30545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Having upgraded our Panorama from 4.1.7 to 4.1.8 - we can no longer use the LDAP user authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The user constantly gets "invalid username or password" (same message on the Panorama) - yet this worked without any problems with 4.1.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Panorama - one can see that in the LDAP profile - the Base option is never getting populated (dropdown option is only "none" rather than domain name).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this a new "feature" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br&lt;/P&gt;&lt;P&gt;JørgeDA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 11:24:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41545#M30545</guid>
      <dc:creator>sitecore</dc:creator>
      <dc:date>2012-09-25T11:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41546#M30546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am having the exact same issue on a PA-2050 and on panorama - I am downgrading for the time being...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 12:10:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41546#M30546</guid>
      <dc:creator>tstokkeland</dc:creator>
      <dc:date>2012-09-25T12:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41547#M30547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are having the same/similar issue on a PA-2050 and on Panorama.&lt;/P&gt;&lt;P&gt;The reason why I write similar is because I noticed the problem after not being able to log into the PA at all after upgrading after some time.&lt;/P&gt;&lt;P&gt;When I looked at the cpu usage on the PA (show system resources follow) it showed that the authd is using 100% cpu and this "blocks" all other attempts to authenticate on the PA (localusers, radius, ldap etc..).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still had problems after downgrading to version 4.1.7, but then I noticed a error message in the systemlog regarding ldap not being able to connect to the ldap server on SSL..&lt;/P&gt;&lt;P&gt;I disabled SSL and changed the ldap port to 389 and everything seems to be working OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have opened up a case on support (#00096705) and the issue has been escalated to TAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jo Christian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 12:32:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41547#M30547</guid>
      <dc:creator>jochristian</dc:creator>
      <dc:date>2012-09-25T12:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41548#M30548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;just more fyi - I downgraded my pa-2050 and ldap auth (for admin login) started working again - leaving my panorama at 4.1.8 for now in hopes of a fix coming soon &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 12:34:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41548#M30548</guid>
      <dc:creator>tstokkeland</dc:creator>
      <dc:date>2012-09-25T12:34:15Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41549#M30549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is specifically LDAP authentication into the administrative website of the Palo Alto *only*, correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having other issues in 4.1.7 that I really need resolved and are known fixes in 4.1.8.&amp;nbsp;&amp;nbsp;&amp;nbsp; I use LDAP for user based rules, however my admin users are all locally defined to the PAs.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 19:31:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41549#M30549</guid>
      <dc:creator>EdwinD</dc:creator>
      <dc:date>2012-09-25T19:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41550#M30550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@ Edwin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would expect this to be a general LDAP issue, because I'm not able to have the LDAP server profile to see the AD correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br&lt;/P&gt;&lt;P&gt;Joergen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 06:16:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41550#M30550</guid>
      <dc:creator>sitecore</dc:creator>
      <dc:date>2012-09-26T06:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41551#M30551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys, I was able to reproduce the same behavior my lab testing. The LDAP server profile is now (in 4.1.8)&amp;nbsp; not able to see the server correctly. The LDAP server is auto populating the base server info in the earlier version but not in 4.1.8. This looks buggy. Please open a ticket with support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sandeep T&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 06:50:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41551#M30551</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-09-26T06:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41552#M30552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;same problem with Kerberos :smileyminus:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 09:25:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41552#M30552</guid>
      <dc:creator>JoergK</dc:creator>
      <dc:date>2012-09-26T09:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41553#M30553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pretty sure kerberos had an issue all along though - i was advised by TAC to use ldap/ad instead of kerb some time ago, and that fixed the issues i had then - these ldap issues now I only noticed in admin-auth, I didnt test on ssl-vpn auth before downgrading, but I dont use ldap in rules, I use user/groups but that is provided by the DC agents i believe, I dont think that was affected but I didnt test it all through&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Sep 2012 12:01:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41553#M30553</guid>
      <dc:creator>tstokkeland</dc:creator>
      <dc:date>2012-09-26T12:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41554#M30554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try removing the "domain" entry in the ldap/kerberos profile, this can cause issues with the actual autentication &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 07:36:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41554#M30554</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2012-09-27T07:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41555#M30555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tom,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Confirming that after removing the domain entry I was able to log on with my domain account.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bind section however - will still not populate. It has to be there thou for the authentication to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So step forward - but not something I will try on my firewalls &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br&lt;/P&gt;&lt;P&gt;Jørgen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 08:45:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41555#M30555</guid>
      <dc:creator>sitecore</dc:creator>
      <dc:date>2012-09-27T08:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41556#M30556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it works without "domain" entry &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;On prior Version it works also without this entry. So where is it used for?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;BR /&gt;Jörg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 08:53:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41556#M30556</guid>
      <dc:creator>JoergK</dc:creator>
      <dc:date>2012-09-27T08:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41557#M30557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Confirmed on PA5020 that removing the "doman" entry in Kerberos resolved login issue on 4.1.8.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 16:20:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41557#M30557</guid>
      <dc:creator>MGoodnow</dc:creator>
      <dc:date>2012-10-01T16:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41558#M30558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Confirmed here as well on PA2050.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 18:30:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41558#M30558</guid>
      <dc:creator>oneidanation</dc:creator>
      <dc:date>2012-10-02T18:30:27Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41559#M30559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ive had to flip the "domain" entry setting back and forth to get LDAP to work correctly.&lt;/P&gt;&lt;P&gt;I would remove it, and it would work for a while....then I would have to add it back and then remove it to get it to work again.&lt;/P&gt;&lt;P&gt;Tech support has now suggested to me that I go back to version&amp;nbsp; 4.1.7-h2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2012 15:32:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41559#M30559</guid>
      <dc:creator>cparrish</dc:creator>
      <dc:date>2012-10-29T15:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41560#M30560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Downgraded to 4.1.7h2, but the same issue popped up again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2012 01:59:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41560#M30560</guid>
      <dc:creator>cparrish</dc:creator>
      <dc:date>2012-10-31T01:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41561#M30561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wohaa. Thanks for that Chris. I was looking at upgrading not).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Small warning for people: The 4.1.8 also seems to fail VPN client connection using internal certificates. This might be related to the LDAP issue - not sure thou.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br&lt;/P&gt;&lt;P&gt;Joergen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2012 06:09:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41561#M30561</guid>
      <dc:creator>sitecore</dc:creator>
      <dc:date>2012-10-31T06:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41562#M30562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pretty sure The VPN certificate issue is not a bug - there was a warning/release-note issued, i got an email, that mentioned the certificate must match the name of the URL, and some extra validations that the new versions of client or gateway will do, so if your cert is not created correctly it will probably cause an issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Arial','sans-serif'; color: black;"&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2020"&gt;&lt;SPAN style="font-size: 11.5pt; color: purple;"&gt;https://live.paloaltonetworks.com/docs/DOC-2020&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am very curios, I still havent upgraded, but with the man-in-the-middle vulnerability noted a few days ago, i will want to upgrade sooner than later...&amp;nbsp; how many out there are using 4.1.8 with ldap auth successfully? in other words, are the issues common for everyone or is it just a few that have issues, meaning the solutions in this thread took care of it for most?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;btw, here is the content of that email:&lt;/P&gt;&lt;H3 style="margin-top: 7.5pt; margin-bottom: 3.75pt;"&gt;&lt;SPAN style="font-size: 13.0pt; font-family: 'Arial','sans-serif'; color: #333333;"&gt;Announcement&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.0pt; font-family: 'Arial','sans-serif'; color: #333333; font-weight: normal;"&gt;: GlobalProtect 1.1.7 Release Notes Announcement &lt;/SPAN&gt;&lt;/H3&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial','sans-serif'; color: #333333;"&gt;created by &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/people/panagent"&gt;panagent&lt;/A&gt; in &lt;EM&gt;Palo Alto Networks Live&lt;/EM&gt; - &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/index.jspa"&gt;View the announcement&lt;/A&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Arial','sans-serif'; color: black;"&gt;GlobalProtect 1.1.7 implements enhanced checks for CA Server Certificates chain-of-trust. This change will cause some existing configurations to become invalid and may result in remote users receiving an error when connecting to the portal, or will not be able to connect if the certificate issue is present on the gateway. Before deploying the GlobalProtect Agent 1.1.7 to users, ensure that the Portal and all Gateway server certificates are valid and that the certificate Common Name (CN) fields match the FQDN or IP address of the portal and/or gateway that uses the certificate. &lt;BR /&gt; &lt;BR /&gt; The SSL certificate that you use for the GlobalProtect portal/gateway should have a Common Name (CN) that matches what you configured in the portal settings. For example, if your certificate has the CN of gp.example.com, ensure that your portal configuration lists the gateway as gp.example.com and does not use an IP address and vice versa, otherwise when the GlobalProtect Agent tries to connect it will generate an error specifying that the certificate CN does not match.&lt;BR /&gt; &lt;BR /&gt; Additionally, when the certificate is created, the Subject Alternative Name (SAN) must be exactly the same as the certificate's CN.&amp;nbsp; If the certificate uses the CN of the DNS name, ensure that the SAN also uses the DNS name and not the IP address. A mismatch will cause the GlobalProtect Agent to recognize that the SAN is not the same as the CN and will also produce the certificate error. &lt;BR /&gt; &lt;BR /&gt; If your certificates are generated by a public certificate authority, then this will be done correctly and you should not have any issues. &lt;BR /&gt; &lt;BR /&gt; Refer to the following tech note for details on configuring server certificates &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Arial','sans-serif'; color: black;"&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2020"&gt;&lt;SPAN style="font-size: 11.5pt; color: purple;"&gt;https://live.paloaltonetworks.com/docs/DOC-2020&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Arial','sans-serif'; color: black;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="font-size: 9.0pt; font-family: 'Arial','sans-serif'; color: #999999;"&gt;Announcement expires on November 25, 2012 &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2012 12:02:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41562#M30562</guid>
      <dc:creator>tstokkeland</dc:creator>
      <dc:date>2012-10-31T12:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41563#M30563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry to disappoint you - but the above issue is related to the GlobalProtect agent - not the firmware version on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can experience the problem they mention on any firmware level if you use GP 1.1.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We saw the authentication problem on a PA with 4.1.8 (and GP 1.1.7). After downgrading to 4.1.7 (still GP 1.1.7) our VPN client certificate authentication worked again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br&lt;/P&gt;&lt;P&gt;Jørgen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2012 12:11:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41563#M30563</guid>
      <dc:creator>sitecore</dc:creator>
      <dc:date>2012-10-31T12:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama 4.1.8 LDAP Failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41564#M30564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have been on 4.1.8 for a few weeks now and had to remove the domain entry from the Kerberos profile to correct the authentication issue when logging into the console. We use Kerberos for our PA administrator accounts.&lt;/P&gt;&lt;P&gt;Did not have to remove this from the LDAP profile, the LDAP profile still has the domain name but not the FQDN. We do not use Panaorama however.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are having other issues with Group Mappings but this has not been verified as of yet as a firmware 4.1.8 issue, currently working with Tech Support to resolve. The issue is that the PA will randomly drop the group mappings for the user so then none of the rules will match to a user group and they will get our default block policy. As a temporary fix we have to clear user-cache and user-group-cache then restart user-id.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2012 15:12:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-4-1-8-ldap-failure/m-p/41564#M30564</guid>
      <dc:creator>oneidanation</dc:creator>
      <dc:date>2012-10-31T15:12:11Z</dc:date>
    </item>
  </channel>
</rss>

