<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Test vlan network for rsa secureid in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253131#M71926</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;I have project where I need to have a test vlan in my pan820 that will intergrate with Secureid authentication manager 8.4, my plan is to have this test vlan separate from the inside network, and also from globalprotect, we will be putting pc's in this test network where when they login, it will trigger the mfa authentication. So what would be the needed process to get this working, I know I need to create a new test zone to tie it to the int, put an ip in it and then the part I'm not clear on is how to get it to trigger the mfa auth.&lt;/P&gt;&lt;P&gt;Any ideas or pointers would be great, thanks in advanced.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:06:23 GMT</pubDate>
    <dc:creator>cdcirexx</dc:creator>
    <dc:date>2019-03-11T21:06:23Z</dc:date>
    <item>
      <title>Test vlan network for rsa secureid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253131#M71926</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;I have project where I need to have a test vlan in my pan820 that will intergrate with Secureid authentication manager 8.4, my plan is to have this test vlan separate from the inside network, and also from globalprotect, we will be putting pc's in this test network where when they login, it will trigger the mfa authentication. So what would be the needed process to get this working, I know I need to create a new test zone to tie it to the int, put an ip in it and then the part I'm not clear on is how to get it to trigger the mfa auth.&lt;/P&gt;&lt;P&gt;Any ideas or pointers would be great, thanks in advanced.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:06:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253131#M71926</guid>
      <dc:creator>cdcirexx</dc:creator>
      <dc:date>2019-03-11T21:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: Test vlan network for rsa secureid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253919#M72084</link>
      <description>&lt;P&gt;Are you looking to implement this like .1x ?&amp;nbsp;(pnac)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that's the case that won't be possible (802.1x is not supported)&lt;/P&gt;
&lt;P&gt;you could look&amp;nbsp;into enabling captive portal and blocking all access for unknown users, forcing new visitors to open a web page first that redirects to a captive portal and requires authentication before access is granted&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 13:00:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253919#M72084</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-03-15T13:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: Test vlan network for rsa secureid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253960#M72106</link>
      <description>&lt;P&gt;Hi Reaper, thanks for the reply, I looked up 801.1x pnac, it's similar, but there no guest access, it's all domain users that need to get mfa from the inside vlan that will use radius, Could I use captive portal along with radius for that inside vlan to authenticate domain users? Basically upper management wanted to see how these tokens work from an inside perspective before fully implementing.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 18:21:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253960#M72106</guid>
      <dc:creator>cdcirexx</dc:creator>
      <dc:date>2019-03-15T18:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: Test vlan network for rsa secureid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253982#M72114</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/23401"&gt;@cdcirexx&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Generally speaking the SecureID tokens aren't meant for securing&amp;nbsp;&lt;EM&gt;network&amp;nbsp;&lt;/EM&gt;access; like to the point I've installed probably hundreds of installations and&amp;nbsp;&lt;EM&gt;never&lt;/EM&gt; had this come up. If your users are already logging into the domain, why would you add yet another layer to that? The MFA part comes in when they login to their desktop/laptop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are looking to&amp;nbsp;implement something like this I would do the following.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) All of your security profiles should be configured for the zone with the source-user of 'known-user'. This means that as long as the user-id mapping is present the user will hit this policy. You can either read your domain controller logs as the user-id source or the RSA Radius server logs as a source, or even both.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) An Authentication policy should be configured to catch any unknown users and direct them to a Captive Portal. You can use the built-in RSA Radius server as a auth source for the Captive Portal so the user is forced to enter their token if they don't have a current user-id mapping (or if the mapping ages out for example).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 20:49:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253982#M72114</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-03-15T20:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Test vlan network for rsa secureid</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253998#M72117</link>
      <description>&lt;P&gt;Thanks Bpry for the reply,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Yeah I've told management about the domain part already being secured, but this came up in our meetings cause were going through cyber security compliance right now and their worried of an audit that will come up about how we protect users identity inside of our network. So the idea of having an inside mfa came up. We will not use the token inside, we may use the secureid app, or even a thumbprint reader.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;So for the userid mapping, I have that under our inside zone enabled, and I already have a radius server profile setup, I had our tokens fully setup for globalprotect when I started the rsa trial.&lt;/P&gt;&lt;P&gt;I'm went through this article when I setup our radius server, that looks like step 6 on &lt;SPAN&gt;your 2nd explanation,&amp;nbsp; so I can setup a new production group that will trigger as unknown and will be redirected to the captive portal which points to the rsa auth manager server, then these domain users would go through the mfa process.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/user-id/enable-user-id#" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/user-id/enable-user-id#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll give this a try and we'll see how it works&lt;/P&gt;&lt;P&gt;thanks again&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 22:35:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/test-vlan-network-for-rsa-secureid/m-p/253998#M72117</guid>
      <dc:creator>cdcirexx</dc:creator>
      <dc:date>2019-03-15T22:35:35Z</dc:date>
    </item>
  </channel>
</rss>

