<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PAN 4.1.1 Global Protect client and LDAP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51135#M37624</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am running 4.1.1 and I am having issues authenticating Global Protect 1.1.1 clients via AD. I know my LDAP server settings are correct as I can browse the workgroups in User-ID Group Mappings. Howver I can't browse these in the 'allow-list' in the authentication profile (the only option is the ALL default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With AD I get 'invalid username &amp;amp; password' logs. I have tested connectivity succesfully using the local user database. Is anyone else experiencing this and have they found a fix?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Jan 2012 03:40:29 GMT</pubDate>
    <dc:creator>nicksampson</dc:creator>
    <dc:date>2012-01-19T03:40:29Z</dc:date>
    <item>
      <title>PAN 4.1.1 Global Protect client and LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51135#M37624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am running 4.1.1 and I am having issues authenticating Global Protect 1.1.1 clients via AD. I know my LDAP server settings are correct as I can browse the workgroups in User-ID Group Mappings. Howver I can't browse these in the 'allow-list' in the authentication profile (the only option is the ALL default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With AD I get 'invalid username &amp;amp; password' logs. I have tested connectivity succesfully using the local user database. Is anyone else experiencing this and have they found a fix?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 03:40:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51135#M37624</guid>
      <dc:creator>nicksampson</dc:creator>
      <dc:date>2012-01-19T03:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: PAN 4.1.1 Global Protect client and LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51136#M37625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;During initial debugging, you may want to set "Update Interval" for "Group Mapping Settings" seen under "Device" tab - "User Identification". Click on the group mapping name and set "Update Interval" to something like 60 seconds (valid range is 60 to 86400 seconds).&lt;/P&gt;&lt;P&gt;Then connect to the firewall using CLI via SSH client. Few useful CLI commands can be tried as follows:&lt;/P&gt;&lt;P&gt;show user group-mapping state all&lt;/P&gt;&lt;P&gt;show user group-mapping statistics&lt;/P&gt;&lt;P&gt;In the output of above commands, check that "Number of Groups" is not zero. If it is zero, verify that you are not using * as wildcard under "Search Filter" field in Group Mapping configuration. For example, if you are searching for a group starting with words vpn do not enter search filter like "vpn*" but just enter "vpn".&lt;/P&gt;&lt;P&gt;Once the group mapping starts showing results, you can revert "Update Interval" to somewhat longer instaed of 60 seconds.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 13:18:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51136#M37625</guid>
      <dc:creator>pandragon</dc:creator>
      <dc:date>2012-01-19T13:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: PAN 4.1.1 Global Protect client and LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51137#M37626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is all fine. User-ID querying to AD is fine but remote VPN access using AD returns 'invalid username/password'. I have setup an LDAP profile that calls on the same server as User-ID utilises so am at a loss as to why this is not working.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 03:43:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51137#M37626</guid>
      <dc:creator>nicksampson</dc:creator>
      <dc:date>2012-01-20T03:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: PAN 4.1.1 Global Protect client and LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51138#M37627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think if user is not found by PA device in the group-name seen under "Allow List" then the system log will show "Authentication Failed: Invalid Username or Password". That may be misleading.If you set filter when viewing logs, as eventtype=GlobalProtect, then you might miss other log where eventtype=general.&lt;/P&gt;&lt;P&gt;If you do not set any filter, does the log also show event=auth-fail and description like "user xyz failed authentication. Reason: User is not in allowlist"? It may be something like attached screen sample.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 06:15:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51138#M37627</guid>
      <dc:creator>pandragon</dc:creator>
      <dc:date>2012-01-20T06:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: PAN 4.1.1 Global Protect client and LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51139#M37628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have has GlobalProtect installed and working for nearly a year.&amp;nbsp; As soon as we upgraded to 4.1.2 software and 1.1.1 GP client, it stopped working externally.&amp;nbsp; When trying to connect it just gets hung up on "Connecting" and never get through to the Portal to authenticate.&amp;nbsp; Reverted software to 4.0.5 and GP client to 1.0.5 and everything works as it should.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jan 2012 15:11:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51139#M37628</guid>
      <dc:creator>kamish</dc:creator>
      <dc:date>2012-01-21T15:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: PAN 4.1.1 Global Protect client and LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51140#M37629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One other thing to check...Have you checked that your panuid client is working properly?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jan 2012 15:13:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51140#M37629</guid>
      <dc:creator>kamish</dc:creator>
      <dc:date>2012-01-21T15:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: PAN 4.1.1 Global Protect client and LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51141#M37630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After speaking to PAN they advised not to use the Domain Users group in AD as this uses PrimaryGroupID and not sAMAccountName attribute. They suggested I create a new security policy i.e RemoteVPN and add AD users to this as required. This is now working.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 20:02:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-4-1-1-global-protect-client-and-ldap/m-p/51141#M37630</guid>
      <dc:creator>nicksampson</dc:creator>
      <dc:date>2012-02-02T20:02:28Z</dc:date>
    </item>
  </channel>
</rss>

