<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captive Portal with LDAP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5781#M4224</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can browse the AD directory from the PaloAlto, also in CLI the FW is showing the users in the group i've selected.&lt;/P&gt;&lt;P&gt;However, when trying to authenticate users it seems like the FW can't reach the LDAP server.&amp;nbsp; I have 1 rule and it allows all!!&lt;/P&gt;&lt;P&gt;I can also ping from all the network interfaces on the firewall!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Dec 2011 09:00:26 GMT</pubDate>
    <dc:creator>johnd</dc:creator>
    <dc:date>2011-12-23T09:00:26Z</dc:date>
    <item>
      <title>Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5775#M4218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've read all the guides and on the forums and still can't figure out why my configuration won't work.&lt;/P&gt;&lt;P&gt;I want users to enter AD username/password to get access to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following has been configured:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device &amp;gt; User Identification &amp;gt; Group Mapping Settings:&lt;/P&gt;&lt;P&gt;1. Added server profile&lt;/P&gt;&lt;P&gt;2. Rest is default&lt;/P&gt;&lt;P&gt;3. Group Include List, entered AD and located my security group i want. (So LDAP connection is working).&lt;/P&gt;&lt;P&gt;Also, when running "Show user user-ID's", both the users in the group are listed, so they are being read.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device &amp;gt; User Identification &amp;gt; Captive Portal Settings:&lt;/P&gt;&lt;P&gt;1. Enabled captive portal&lt;/P&gt;&lt;P&gt;2. Authentication Profile is correct.&lt;/P&gt;&lt;P&gt;3. Mode redirect (Clients can see the webportal, so this is working)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Network &amp;gt; Zones &amp;gt; Trust:&lt;/P&gt;&lt;P&gt;1. Enabled User Identification.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device &amp;gt; LDAP:&lt;/P&gt;&lt;P&gt;This is obviously working or else i wouldnt have a connection (?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device &amp;gt; Authentication Profile:&lt;/P&gt;&lt;P&gt;1. Allow list is set to all.&lt;/P&gt;&lt;P&gt;2. Authentication set to LDAP.&lt;/P&gt;&lt;P&gt;3. Login attribute set to sAMAccountName&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When testing this on a client i get the following:&lt;/P&gt;&lt;P&gt;Captive Portal authentication failed for user: X on 192.168.X.X, vsys1&lt;/P&gt;&lt;P&gt;User 'X' failed authentication. Reason: Invalid username/password from: 192.168.X.X.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any clues?&amp;nbsp; I'm not using user-identification agent, this shouldnt be needed as i have LDAP and when using local users the authentication worked fine!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 14:00:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5775#M4218</guid>
      <dc:creator>johnd</dc:creator>
      <dc:date>2011-12-21T14:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5776#M4219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you try entering username &amp;amp; password, or domain\username &amp;amp; password?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 14:45:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5776#M4219</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-12-21T14:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5777#M4220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried both in all variations. Also reset my domain password to be sure.&lt;/P&gt;&lt;P&gt;As i said it worked just fine with local user accounts.&amp;nbsp; And AD seems to be working just fine, so I'm not sure what the problem is.&lt;/P&gt;&lt;P&gt;Does anyone know which debugging option i should enable to see whats wrong.&amp;nbsp; Guess i could do some packet capture as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 15:17:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5777#M4220</guid>
      <dc:creator>johnd</dc:creator>
      <dc:date>2011-12-21T15:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5778#M4221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can test the LDAP config by setting it to authenticate the admins.&amp;nbsp; Then use your LDAP username/password to login as an admin for the PA device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 15:49:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5778#M4221</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-12-21T15:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5779#M4222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, that didnt work either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tail mp-log authd.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dec 22 12:41:31 pan_authd_common_authenticate(pan_authd.c:1520): Authenticating user using service /etc/pam.d/pan_ldap_vsys1_:domain :users_1,username XX_USER_XX failed - trying other hosts&lt;BR /&gt;Dec 22 12:41:31 pan_authd_common_authenticate(pan_authd.c:1495): Skipping LDAP server due to missing Auth-Profile: pan_ldap_vsys1_:domain :users_2&lt;BR /&gt;Dec 22 12:41:31 pan_authd_common_authenticate(pan_authd.c:1495): Skipping LDAP server due to missing Auth-Profile: pan_ldap_vsys1_:domain :users_3&lt;BR /&gt;Dec 22 12:41:31 authentication failed for user &amp;lt;vsys1,Domain Users,XX_USER_XX&amp;gt;&lt;BR /&gt;Dec 22 12:41:31 pan_authd_process_authresult(pan_authd.c:1247): pan_authd_process_authresult: XX_USER_XX authresult not auth'ed&lt;BR /&gt;Dec 22 12:41:31 pan_authd_process_authresult(pan_authd.c:1271): Alarm generation set to: False.&lt;BR /&gt;Dec 22 12:41:31 User 'XX_USER_XX' failed authentication.&amp;nbsp; Reason: Invalid username/password From: 192.168.0.15.&lt;BR /&gt;Dec 22 12:41:31 pan_get_system_cmd_output(pan_cfg_utils.c:3019): executing: /usr/local/bin/sdb -n -r cfg.operational-mode&lt;BR /&gt;Dec 22 12:41:31 pan_authd_generate_system_log(pan_authd.c:833): CC Enabled=False&lt;BR /&gt;Dec 22 12:41:31 pan_get_system_cmd_output(pan_cfg_utils.c:3019): executing: /usr/local/bin/sdb -n -r cfg.operational-mode&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 09:09:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5779#M4222</guid>
      <dc:creator>johnd</dc:creator>
      <dc:date>2011-12-22T09:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5780#M4223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A couple of things to check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the log of your LDAP server and is it reporting incorrect&amp;nbsp; credential as well?&amp;nbsp; If so, have you try a different account, username/password?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you seeing LDAP groups if you issue CLI command: show user ldap-server server &amp;lt;name&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there's no groups listed in the output, then the LDAP config is incorrect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may also want to contact Support and have your configruation reviewed over a web meeting.&amp;nbsp; Thansks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 14:47:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5780#M4223</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-12-22T14:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5781#M4224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can browse the AD directory from the PaloAlto, also in CLI the FW is showing the users in the group i've selected.&lt;/P&gt;&lt;P&gt;However, when trying to authenticate users it seems like the FW can't reach the LDAP server.&amp;nbsp; I have 1 rule and it allows all!!&lt;/P&gt;&lt;P&gt;I can also ping from all the network interfaces on the firewall!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 09:00:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5781#M4224</guid>
      <dc:creator>johnd</dc:creator>
      <dc:date>2011-12-23T09:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5782#M4225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As the next step, I would suggest contacting Support and have it diagnose.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Dec 2011 19:14:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5782#M4225</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-12-25T19:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5783#M4226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was solved by removing all the LDAP config and Captive Portal config and adding it all again.&lt;/P&gt;&lt;P&gt;Seemed to be some bug with the config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 13:28:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5783#M4226</guid>
      <dc:creator>johnd</dc:creator>
      <dc:date>2012-01-12T13:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal with LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5784#M4227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear that it worked.&amp;nbsp;&amp;nbsp; Cheers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 21:08:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-with-ldap/m-p/5784#M4227</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-01-12T21:08:38Z</dc:date>
    </item>
  </channel>
</rss>

