<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global Protect, Radius, SecurEnvoy,  question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-radius-securenvoy-question/m-p/154567#M50907</link>
    <description>&lt;P&gt;We had a strange issue with our 2Factor breaking this week, logs looked to be showing a radius auth MD5 missmatch. Between PAN 3020 and SecurEnvoy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;During that time we had to many hands on the issue, and feel the team made it worse...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So some back ground,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a 3020 current as our vpn using radius for user auth, that connection/password then passes threw a Foritgate 300c, then to SecurEnvoy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I saw the logs, it looked as if the PAN and SecurEnvory had a shared password mismatch.&amp;nbsp;During the trouble shooting, we changed the pan's and securenvoy shared password "only, not on the foritgate", restarted services, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But still no go... get Access-Rejected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if I used the Foritgate vpn using the 2 factor/securenvoy I auth and have access, crappy part the company has no knowledge of that password "Im the new guy cleaning up the mess"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have both the MGT and Inside IP as a client on securenvoy, and the forigate IP. But the PAN/SecurEnvoy have matching shared keys. And the Foritgate/SecurEnvoy use a different shared key.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And this doesnt seem to be access issue, as I can use LDAP with no problem, but in my gut I feel that we need to have the same shared key on PAN, Forigate, SecurEnvoy inorder to decrypt correctly the shared key?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this seem like Im on the right track? Should my shared key be the same between the 3020, 300C, and SecurEnvoy?&lt;/P&gt;</description>
    <pubDate>Fri, 28 Apr 2017 17:48:28 GMT</pubDate>
    <dc:creator>ktruex99</dc:creator>
    <dc:date>2017-04-28T17:48:28Z</dc:date>
    <item>
      <title>Global Protect, Radius, SecurEnvoy,  question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-radius-securenvoy-question/m-p/154567#M50907</link>
      <description>&lt;P&gt;We had a strange issue with our 2Factor breaking this week, logs looked to be showing a radius auth MD5 missmatch. Between PAN 3020 and SecurEnvoy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;During that time we had to many hands on the issue, and feel the team made it worse...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So some back ground,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a 3020 current as our vpn using radius for user auth, that connection/password then passes threw a Foritgate 300c, then to SecurEnvoy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I saw the logs, it looked as if the PAN and SecurEnvory had a shared password mismatch.&amp;nbsp;During the trouble shooting, we changed the pan's and securenvoy shared password "only, not on the foritgate", restarted services, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But still no go... get Access-Rejected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if I used the Foritgate vpn using the 2 factor/securenvoy I auth and have access, crappy part the company has no knowledge of that password "Im the new guy cleaning up the mess"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have both the MGT and Inside IP as a client on securenvoy, and the forigate IP. But the PAN/SecurEnvoy have matching shared keys. And the Foritgate/SecurEnvoy use a different shared key.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And this doesnt seem to be access issue, as I can use LDAP with no problem, but in my gut I feel that we need to have the same shared key on PAN, Forigate, SecurEnvoy inorder to decrypt correctly the shared key?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this seem like Im on the right track? Should my shared key be the same between the 3020, 300C, and SecurEnvoy?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 17:48:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-radius-securenvoy-question/m-p/154567#M50907</guid>
      <dc:creator>ktruex99</dc:creator>
      <dc:date>2017-04-28T17:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect, Radius, SecurEnvoy,  question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-radius-securenvoy-question/m-p/154591#M50912</link>
      <description>&lt;P&gt;From the brief overview of your enviroment then you would be correct, the three devices really should be using a known pre-shared to get things to function correctly. You shouldn't really cause any issues changing the entire paths shared-key at all either.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 20:11:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-radius-securenvoy-question/m-p/154591#M50912</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-28T20:11:48Z</dc:date>
    </item>
  </channel>
</rss>

