<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL-VPN with Active Directory auth in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44312#M32525</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you check the attached LDAP config technote to see if you have configure the setting correctly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually I will recommend you to use Kerboros instead of LDAP. If you are using LDAP for SSLVPN and AD for internal network auth, you will have two kinds of user groups- AD group and LDAP group, and so for the same user group you may need to have two groups in the setting. But if you are using Kerboros, you only need to manage one AD user group. You can try it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Sep 2011 14:55:44 GMT</pubDate>
    <dc:creator>jleung</dc:creator>
    <dc:date>2011-09-02T14:55:44Z</dc:date>
    <item>
      <title>SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44309#M32522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm trying to configure SSL-VPN with Active Directory authentication.I'm running PANOS 4.0.4, and SSL-Client 1.3.0 and 1.3.1.&lt;/P&gt;&lt;P&gt;I've configured the following:&lt;/P&gt;&lt;P&gt;1. An Server Profile with type Active Directoy&lt;/P&gt;&lt;P&gt;2. An Authentication Profile with LDAP authentication, and using the profile I've created at step 1. Also add a group and some users to the Allow List.&lt;/P&gt;&lt;P&gt;3. At User Identification I have enabled the LDAP server, sing the profile I've created at step 1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PaloAlto can connect the LDAP server. I can see the groups and users. The CLI command &lt;SPAN lang="EN-US" style="font-size: 9pt; font-family: &amp;amp;quot;Courier New&amp;amp;quot;;"&gt;show user ldap-server server all&amp;nbsp; &lt;/SPAN&gt;shows that this connection is as supposed to be ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also created the tunnel SSL-VPN, and it is working OK if I use local users. When I change this configuration to use the profile with Active Directory users, I can not connect any of the users that are on the Allow List. Allways have the same error: &lt;STRONG&gt;Authentication failed: Invalid username or password&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use DOMAIN\USER as user at the name field of NetConnect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help me with this problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Nuno Carrilho&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 14:25:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44309#M32522</guid>
      <dc:creator>convex</dc:creator>
      <dc:date>2011-09-01T14:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44310#M32523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should not need to put the domain in the login name. You can also try to use Kerberos for SSLVPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 15:30:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44310#M32523</guid>
      <dc:creator>jleung</dc:creator>
      <dc:date>2011-09-01T15:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44311#M32524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, jleung,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also tried without the DOMAIN at the beggining. I always have the same error. It just does not work ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Nuno Carrilho&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 08:35:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44311#M32524</guid>
      <dc:creator>convex</dc:creator>
      <dc:date>2011-09-02T08:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44312#M32525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you check the attached LDAP config technote to see if you have configure the setting correctly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually I will recommend you to use Kerboros instead of LDAP. If you are using LDAP for SSLVPN and AD for internal network auth, you will have two kinds of user groups- AD group and LDAP group, and so for the same user group you may need to have two groups in the setting. But if you are using Kerboros, you only need to manage one AD user group. You can try it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 14:55:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44312#M32525</guid>
      <dc:creator>jleung</dc:creator>
      <dc:date>2011-09-02T14:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44313#M32526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jleung,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eDirectory and LDAP authentication in PANOS 3 1.pdf - This was the document I have followed to configure LDAP Authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have opened a case through our Palo Alto dealer, so I'm waiting for an answer from Palo Alto. I have configured alot of other AD/LDAP integrations with other Firewalls (non PaloAlto) and I never had so much trouble integrating it ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help,&lt;/P&gt;&lt;P&gt;Nuno Carrilho&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Sep 2011 09:36:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44313#M32526</guid>
      <dc:creator>convex</dc:creator>
      <dc:date>2011-09-05T09:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44314#M32527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jleung,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After long hours trying to understand this issue, finaly I found the solution. It is already working with AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help,&lt;/P&gt;&lt;P&gt;NC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2011 16:19:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44314#M32527</guid>
      <dc:creator>convex</dc:creator>
      <dc:date>2011-09-07T16:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44315#M32528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear that!!! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 13:48:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44315#M32528</guid>
      <dc:creator>jleung</dc:creator>
      <dc:date>2011-09-09T13:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44316#M32529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi convex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are have the same problem, could you help us with the solution? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Sep 2011 17:49:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44316#M32529</guid>
      <dc:creator>ocampos</dc:creator>
      <dc:date>2011-09-23T17:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44317#M32530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How are users logging in? Are they entering 'Domain\User' when they log in? Can you provide a snippet of the authd logs for the failed login attempts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Renato&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Sep 2011 10:53:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44317#M32530</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2011-09-25T10:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSL-VPN with Active Directory auth</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44318#M32531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Helll OCAMPOS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first thing I have done, was to check if the AD tree plus user and password to access the AD Server where correct. You can see that at the Dashboard on the GUI with the message:&lt;/P&gt;&lt;P&gt;"ldap cfg [name of the ad server] connected xxx.xxx.xxx.xxx:389, initiated by: zzz.zzz.zzz.zzz"&lt;/P&gt;&lt;P&gt;The above message means that Palo Alto FW can connect to the AD server with the right credencials.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Than it camed the real problem, which I find out running the folowing command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@PA-500&amp;gt; telnet port 389 host xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where xxx.xxx.xxx.xxx is the IP address of the AD server.&lt;/P&gt;&lt;P&gt;Can you post the result?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Nuno Carrilho&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Sep 2011 08:24:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-with-active-directory-auth/m-p/44318#M32531</guid>
      <dc:creator>convex</dc:creator>
      <dc:date>2011-09-26T08:24:51Z</dc:date>
    </item>
  </channel>
</rss>

