<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto RADIUS authentication against Microsoft NPS is broken in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65443#M39080</link>
    <description>&lt;P&gt;I have configure radius authentication with NPS and it works perfect. I am using 7.0.2&lt;/P&gt;</description>
    <pubDate>Mon, 05 Oct 2015 08:35:47 GMT</pubDate>
    <dc:creator>pankaku</dc:creator>
    <dc:date>2015-10-05T08:35:47Z</dc:date>
    <item>
      <title>Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65434#M39075</link>
      <description>&lt;P&gt;Has anyone managed to get authentication on PAN-OS 7.0 working with microsoft NPS servers?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since version 7.0 authentication against our microsoft NPS radius servers is broken.&amp;nbsp;Because the firewall now always first tries CHAP instead op PAP (see&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/CHAP-preferred-over-PAP-while-sending-RADIUS-access-request/ta-p/58014" target="_blank"&gt;this article&lt;/A&gt;) and microsoft NPS always replies with a ACCESS-REJECT massage (see &lt;A href="https://technet.microsoft.com/en-us/library/dd197428(v=ws.10).aspx" target="_self"&gt;this article&lt;/A&gt;&amp;nbsp;-&amp;gt; item&amp;nbsp;9).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As it's insane to start storing our AD credentials with reversible encryption I guess microsoft NPS isn't compatible anymore with Palo Alto? Or am I missing something here?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 07:19:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65434#M39075</guid>
      <dc:creator>nwsol</dc:creator>
      <dc:date>2015-10-05T07:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65443#M39080</link>
      <description>&lt;P&gt;I have configure radius authentication with NPS and it works perfect. I am using 7.0.2&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 08:35:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65443#M39080</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-10-05T08:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65445#M39081</link>
      <description>&lt;P&gt;What are the settings of your policy? I've enable only PAP as an allowed authentication method.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't figure out how to trigger the PAP failover on palo alto.&amp;nbsp;It keeps on using CHAP which isn't supported&amp;nbsp;on our domain.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 08:44:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65445#M39081</guid>
      <dc:creator>nwsol</dc:creator>
      <dc:date>2015-10-05T08:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65446#M39082</link>
      <description>&lt;P&gt;I have followed this video&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=1yYywwPWXys" target="_blank"&gt;https://www.youtube.com/watch?v=1yYywwPWXys&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 08:55:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65446#M39082</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-10-05T08:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65447#M39083</link>
      <description>&lt;P&gt;Oh, so you are running the windows 2012 version of NPS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're running it on 2008 R2. It might be there's a behaviour change between the 2 windows versions.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 09:05:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65447#M39083</guid>
      <dc:creator>nwsol</dc:creator>
      <dc:date>2015-10-05T09:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65452#M39088</link>
      <description>&lt;P&gt;Are you using the NPS for administrator or GlobalProtect access?&lt;/P&gt;&lt;P&gt;What version of PAN-OS?&lt;/P&gt;&lt;P&gt;What does the Event Viewer on the NPS say? Event Viewer -&amp;gt; Server Roles -&amp;gt; Network Policy Server&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 10:51:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65452#M39088</guid>
      <dc:creator>BLH</dc:creator>
      <dc:date>2015-10-05T10:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65455#M39089</link>
      <description>&lt;P&gt;We're using it for admin access on PAN-OS 7.0.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;NPS logs give an error (19): &lt;/SPAN&gt;No reversibly encrypted password is stored for the user account. This means you should enable reversible encryption on you domain controllers with the policy setting "Store password using reversible encryption for all users in the domain" which is not something we can do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Packet captures show only 1 request and an ACCESS-REJECT radius reply from NPS (because of the CHAP). So no second attempt by the firewall.using PAP&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 11:33:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65455#M39089</guid>
      <dc:creator>nwsol</dc:creator>
      <dc:date>2015-10-05T11:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65458#M39090</link>
      <description>&lt;P&gt;Is the Network Policy (or Connection Request Policy, if using overrides), specifically configured to only allow PAP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/550i5F1F3C8D617CCBB7/image-size/original?v=mpbl-1&amp;amp;px=-1" alt="pap.PNG" title="pap.PNG" border="0" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 11:52:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65458#M39090</guid>
      <dc:creator>BLH</dc:creator>
      <dc:date>2015-10-05T11:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65459#M39091</link>
      <description>&lt;P&gt;Yes, The NPS settings are exactly the same as on your screenshot.&amp;nbsp;I also see&amp;nbsp;you're running windows server 2012.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe 2012 does not reply on CHAP requests triggering a timeout, while 2008 replies with an access-reject?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 11:59:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65459#M39091</guid>
      <dc:creator>nwsol</dc:creator>
      <dc:date>2015-10-05T11:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65466#M39093</link>
      <description>&lt;P&gt;All versions of NPS (2008 &amp;lt;-&amp;gt; 2012 R2) should behave the same way.&lt;/P&gt;&lt;P&gt;Dump below is from a 2012 R2. First a CHAP request is sent, that is rejected, and then PAP is tried.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/551i1387370BF0127470/image-size/original?v=mpbl-1&amp;amp;px=-1" alt="2015-10-05_1441.png" title="2015-10-05_1441.png" border="0" /&gt;&lt;/P&gt;&lt;P&gt;The Event Viewer will also indicate two logins. Subsequent logins are only sent using PAP though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Might be worth a shot to re-create the RADIUS server profile on the firewall.&lt;/P&gt;&lt;P&gt;What does a Wireshark trace from the NPS look like?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The whole CHAP implementation in 7.0 is pretty silly. The failover only works half the time for the inital logins, it causes massive issues with Multi Factor Authentication solutions using RADIUS Challenge/Response, there's no tickbox to turn it off and completely baffling that CHAP, instead of MS-CHAPv2 is supported..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 13:02:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65466#M39093</guid>
      <dc:creator>BLH</dc:creator>
      <dc:date>2015-10-05T13:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65475#M39096</link>
      <description>&lt;P&gt;Recreating the RADIUS server profile did the trick. (actually, changed the timeout and retry from 3 to 2 and pushed from panorama).&amp;nbsp;The system log now says it switched to PAP for that radius server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's a nasty bug... Never would have tought 'touching' the radius config could fix the issue...&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 13:42:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/65475#M39096</guid>
      <dc:creator>nwsol</dc:creator>
      <dc:date>2015-10-05T13:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/66842#M39342</link>
      <description>&lt;P&gt;Found this issue on another firewall (Panorama 7.0.2) - I could also resolve it by modifying the RADIUS configuration. Great find!&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2015 14:27:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/66842#M39342</guid>
      <dc:creator>BLH</dc:creator>
      <dc:date>2015-10-19T14:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69798#M40394</link>
      <description>&lt;P&gt;Woop woop.. From the PAN-OS 7.0.4 release notes:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="pdf-link-anchor" name="pgfId-546895" target="_blank"&gt;&lt;/A&gt; Added a new CLI operational command ( set authentication radius-auth-type &amp;lt;auto|chap|pap&amp;gt; ) to address an incompatibility issue between PAN-OS and some RADIUS servers. With this fix, you can manually override the automatic selection mechanism introduced with Challenge-Handshake Authentication Protocol (CHAP) support in PAN-OS 7.0 to select either CHAP or Password Authentication Protocol (PAP) as needed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TLDR; CLI command &lt;EM&gt;set authentication radius-auth-type &amp;lt;auto|chap|pap&amp;gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Dec 2015 06:17:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69798#M40394</guid>
      <dc:creator>BLH</dc:creator>
      <dc:date>2015-12-23T06:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69875#M40420</link>
      <description>&lt;P&gt;Thank you. But, it looks like it can be done only via CLI, how about configuring CHAP from GUI?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Dec 2015 01:29:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69875#M40420</guid>
      <dc:creator>rbista</dc:creator>
      <dc:date>2015-12-25T01:29:33Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69877#M40421</link>
      <description>&lt;P&gt;Well, even from the CLI, it doesn't seem to take the command.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;rbista@MyFirewall&amp;gt; configure&lt;BR /&gt;Entering configuration mode&lt;BR /&gt;[edit]&lt;BR /&gt;rbista@MyFirewall# set authentication radius-auth-type chap&lt;/P&gt;
&lt;P&gt;Invalid syntax.&lt;BR /&gt;[edit]&lt;BR /&gt;rbista@MyFirewall#&amp;nbsp; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestions? I ran the command # find command keyword "radius-auth-type", it display the command though.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;rbista@MyFirewall&amp;gt; find command keyword "radius-auth-type"&lt;BR /&gt;set authentication radius-auth-type &amp;lt;auto|chap|pap&amp;gt;&lt;BR /&gt;rbista@MyFirewall&amp;gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Dec 2015 01:37:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69877#M40421</guid>
      <dc:creator>rbista</dc:creator>
      <dc:date>2015-12-25T01:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69879#M40422</link>
      <description>&lt;P&gt;What is the PAN-OS on the firewall?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Dec 2015 09:51:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69879#M40422</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-12-25T09:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto RADIUS authentication against Microsoft NPS is broken</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69880#M40423</link>
      <description>&lt;P&gt;It will work on PAN-OS 7.0.4. You dont have to go in configure mode.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;admin@fw63&amp;gt; set authentication radius-auth-type chap&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Merry Christmas &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Dec 2015 10:34:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-radius-authentication-against-microsoft-nps-is-broken/m-p/69880#M40423</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-12-25T10:34:06Z</dc:date>
    </item>
  </channel>
</rss>

