<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect remote access - some pointers in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/217952#M63025</link>
    <description>&lt;P&gt;Steve, Hi.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LDAP works fine for me, although we only use it for IPads, or win7/10 are cert based authentication. (we do not use pre-logon).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am surprised that after creating a second LDAP profile it caused issues to your user group policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you apply that new (2nd) server profile to the group mapping or did it have the original server profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what you are trying to set up here seems perfectly acceptable but I would get LDAP working first prior to pre-logon. (or kerberos). I found LDAP very easy to setup and support. hence we stuck with it...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for me.. i would create a new LDAP profile and not link it to any service, then test it via cli "test authentication". perhaps you just did this already and crashed your policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;laters...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 Jun 2018 16:54:14 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2018-06-14T16:54:14Z</dc:date>
    <item>
      <title>GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/217707#M62956</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm relatively new to Palo Alto firewalls and I am attempting to implement GlobalProtect to provide remote users with access to our internal network through the Palo Alto firewall and I am striggling to get even the most basic system working, so I wonder whether I could ask for some pointers for anyone who has got a working GlobalProtect remote access environment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem I currently have is attempting to establish which authentication method should work successfully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been attempting to get RADIUS working, but this appears not to work with our Active Directory, the authentication fails for both CHAP and PAP and looking on the AD security log, I see an error that states "The user attempted to use an authentication method that is not enabled on the matching network policy." As I have spent over a week on this trying various combinations of setup, I have decided this is not the way forward.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just tried LDAP, but broke the firewall outbound Internet access, as I also use LDAP for user to group mappings in&amp;nbsp;security policies,&amp;nbsp;and&amp;nbsp;creating a second LDAP server profile and authentication profile&amp;nbsp;caused that mechanism to fail and block Internet access for all users for some reason I do not yet understand, so that feels a&amp;nbsp;risky&amp;nbsp;way to proceed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am now trying Kerberos, but it is not clear to me whether this is a viable authentication method for authentication to the GlobalProtect portal / gateway for a laptop out on the Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone please provide some pointers as to which authentication method is likely to work in this scenario?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an internal Certificate Authority on our domain, and I have configured the root CA information into Palo Alto,&amp;nbsp;so Ideally, what I want is to use a pre-athentication connection for a remote laptop so that it can connect to the portal / gateway using an internal Certificate Authority certificate in the certificate store of the laptop which allows an initial IPSec VPN connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once that pre-auth connection is made, what I would then like is for&amp;nbsp;when a user logs into Windows using their domain credentials, these credentials are passed through "single sign-on" (via the pre-auth VPN tunnel)&amp;nbsp;and the user and laptop are granted full access to the internal network via the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The documentation states this should be feasible but&amp;nbsp;I cannot fathom out the authentication methods&amp;nbsp;to implement to facilitate this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any pointers to a real-world implementation of what I am trying to achieve would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 11:05:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/217707#M62956</guid>
      <dc:creator>Steve-Phillips</dc:creator>
      <dc:date>2018-06-13T11:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/217737#M62966</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66688"&gt;@Steve-Phillips&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;That's a big wall of text &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Joking aside I would really recommend that you contact your SE or support and have them walk through the setup with you since you're really just at the beginning of even getting any of this configured. They can talk you through everything and answer any questions as they come up and will get you configured correctly, you'll just have to dedicate some time to working with them. Working through all of this through Live would be a little complex.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 13:25:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/217737#M62966</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-06-13T13:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/217747#M62970</link>
      <description>&lt;P&gt;BPry, many thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Indeed, that is rather a lot of questions, I realise that after I posted and read it all back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All I was really after was a pointer to which stone I should step on first (the most appropriate authentication method) and work my way forward from there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you suggest, I'll approach support and see what I can learn from there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 14:53:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/217747#M62970</guid>
      <dc:creator>Steve-Phillips</dc:creator>
      <dc:date>2018-06-13T14:53:49Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/217952#M63025</link>
      <description>&lt;P&gt;Steve, Hi.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LDAP works fine for me, although we only use it for IPads, or win7/10 are cert based authentication. (we do not use pre-logon).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am surprised that after creating a second LDAP profile it caused issues to your user group policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you apply that new (2nd) server profile to the group mapping or did it have the original server profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what you are trying to set up here seems perfectly acceptable but I would get LDAP working first prior to pre-logon. (or kerberos). I found LDAP very easy to setup and support. hence we stuck with it...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for me.. i would create a new LDAP profile and not link it to any service, then test it via cli "test authentication". perhaps you just did this already and crashed your policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;laters...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jun 2018 16:54:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/217952#M63025</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-06-14T16:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221923#M63851</link>
      <description>&lt;P&gt;Mick,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your reply. I have been working on this problem for a month now, and I am still no further forward.&amp;nbsp; I have our Palo Alto reseller support team working on this, but so far thay have not been able to work out what is&amp;nbsp; going wrong, so I thought I would continue with this post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have settled on LDAP and I can successfully get a user authenticated when using the command line test, as long as the Authentication Profile Allow List is set to "All" (why this is the case is a mystery):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;admin@PaloAlto&amp;gt; test authentication authentication-profile "Remote Access Users - LDAP" username zzztest password&lt;BR /&gt;Enter password :&lt;/P&gt;&lt;P&gt;Target vsys is not specified, user "zzztest4" is assumed to be configured with a shared auth profile.&lt;/P&gt;&lt;P&gt;Do allow list check before sending out authentication request...&lt;BR /&gt;name "zzztest4" is in group "all"&lt;/P&gt;&lt;P&gt;Authentication to LDAP server at 10.10.10.10 for user "zzztest"&lt;BR /&gt;Egress: 10.10.10.110&lt;BR /&gt;Type of authentication: plaintext&lt;BR /&gt;Starting LDAP connection...&lt;BR /&gt;Succeeded to create a session with LDAP server&lt;BR /&gt;DN sent to LDAP server: CN=zzzTest,OU=Test,OU=Users,DC=domain,DC=co,DC=uk&lt;BR /&gt;User expires in days: never&lt;/P&gt;&lt;P&gt;Authentication succeeded for user "zzztest"&lt;/P&gt;&lt;P&gt;admin@PaloAlto&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, if I then attempt to log in to the GlobalProtect portal using the same user, I receive an "Authentication failure: Invalid username or password".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When this occurs, if I use the "tail follow yes mp-log authd.log" command to examine the authentication logs, I see the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-07-12 15:23:58.420 +0100 Error:&amp;nbsp; _get_auth_prof_detail(pan_auth_util.c:1060): non-admin user thru Global Protect "zzztest" does NOT have auth profile&lt;BR /&gt;2018-07-12 15:23:58.420 +0100 Error:&amp;nbsp; pan_get_authprofile_n_setting(pan_auth_util.c:1123): Failed to get authentication profile for non-admin user thru Global Protect "zzztest"&lt;BR /&gt;2018-07-12 15:23:58.420 +0100 failed authentication for user 'zzztest'.&amp;nbsp; Reason: Authentication profile not found for the user. From: &amp;lt;external IP&amp;gt;.&lt;BR /&gt;2018-07-12 15:23:58.421 +0100 Error:&amp;nbsp; _authenticate_initial(pan_auth_state_engine.c:2518): Failed to get authentication profile&lt;BR /&gt;2018-07-12 15:23:58.421 +0100 Error:&amp;nbsp; pan_auth_request_process(pan_auth_state_engine.c:3324): _authenticate_initial()&lt;BR /&gt;2018-07-12 15:23:58.421 +0100 Error:&amp;nbsp; _taskq_worker(pan_taskq.c:622): Error executing tasks process fn&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do have an Authentication Profile named "Remote Access Users - LDAP" with the following settings:&lt;/P&gt;&lt;P&gt;Type: LDAP&lt;/P&gt;&lt;P&gt;Login Attribute: sAMAccountName&lt;/P&gt;&lt;P&gt;User Domain: &amp;lt;blank&amp;gt;&lt;/P&gt;&lt;P&gt;Username Modifier: %USERINPUT%@%USERDOMAIN%&lt;/P&gt;&lt;P&gt;Allow List: All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This Authentication Profile is then referenced in both the GlobalProtect &amp;gt; Gateway authentication settings and in the GlobalProtect &amp;gt; Portal authentication settings.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, as the Allow List is set to "All", surely this means that any user would match this Authentication Profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice on this is&amp;nbsp;much appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 14:34:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221923#M63851</guid>
      <dc:creator>Steve-Phillips</dc:creator>
      <dc:date>2018-07-12T14:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221924#M63852</link>
      <description>&lt;P&gt;If your auth profile domain is blank, why are you using it in the modifier, just try “%USERINPUT%”.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 14:46:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221924#M63852</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-07-12T14:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221933#M63853</link>
      <description>&lt;P&gt;Also.... why not use packet capture in monitor tab, set interface to default service route for ldap and set 2 filters, destination 10.10.10.10 from any and source 10.10.101.10 to any, you will need to disable secure ldap to see packets in wireshark. This will show you the exact user id and password the palo is sending.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 14:52:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221933#M63853</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-07-12T14:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221937#M63856</link>
      <description>&lt;P&gt;Very good point, I have changed this to %USERINPUT%. I have been experimenting with many combinations, that just happened to be the one it was left on, which was not the best choice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 15:05:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221937#M63856</guid>
      <dc:creator>Steve-Phillips</dc:creator>
      <dc:date>2018-07-12T15:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221939#M63857</link>
      <description>&lt;P&gt;Using the packet capture is a VERY good idea, many thanks for that.&amp;nbsp; I shall investigate and report back in due course.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 15:06:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221939#M63857</guid>
      <dc:creator>Steve-Phillips</dc:creator>
      <dc:date>2018-07-12T15:06:45Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect remote access - some pointers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221940#M63858</link>
      <description>&lt;P&gt;Also-2, you may need to add your domain in the auth profile as the all option may apply to a domain group “all” and not just mean “everyone”&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or, add domain\all to the allow list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i hope that make sense...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;laters...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 15:40:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-remote-access-some-pointers/m-p/221940#M63858</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-07-12T15:40:55Z</dc:date>
    </item>
  </channel>
</rss>

