<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global Protect Agent GW Login Lifetime in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-gw-login-lifetime/m-p/270597#M74730</link>
    <description>&lt;P&gt;We are having an issue where our internal GP agent is authenticating to both of our internal gateways normally, but after the period set for "Login Lifetime" - the firewall is clearing the IP to username mapping, even though the GP agent still shows logged in, AND authenticated to both of our internal gateways....&amp;nbsp; &amp;nbsp;Is the login lifetime the MAX time a user can be signed in period? and what correlation does this have to the IP/User mapping on the firewall itself?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jun 2019 16:28:40 GMT</pubDate>
    <dc:creator>Sec101</dc:creator>
    <dc:date>2019-06-17T16:28:40Z</dc:date>
    <item>
      <title>Global Protect Agent GW Login Lifetime</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-gw-login-lifetime/m-p/270597#M74730</link>
      <description>&lt;P&gt;We are having an issue where our internal GP agent is authenticating to both of our internal gateways normally, but after the period set for "Login Lifetime" - the firewall is clearing the IP to username mapping, even though the GP agent still shows logged in, AND authenticated to both of our internal gateways....&amp;nbsp; &amp;nbsp;Is the login lifetime the MAX time a user can be signed in period? and what correlation does this have to the IP/User mapping on the firewall itself?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 16:28:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-gw-login-lifetime/m-p/270597#M74730</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2019-06-17T16:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Agent GW Login Lifetime</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-gw-login-lifetime/m-p/270730#M74750</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59122"&gt;@Sec101&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Login Lifetime is the maximum amount of time a session is allowed to be open, barring any other timeouts, until the session is force logged out. This method of clearing the connection isn't exactly 'clean' from an agent perspective. I would guess that if you tried to actually use the associated client, you would find that you don't actually have a connection through GP anymore.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for the IP/User mapping on the firewall, GlobalProtect is slightly different than normal User-ID mappings because it knows all of the information itself. As soon as the session is cleared when it hits the Login Lifetime value you have configured, the User-ID mapping would be cleared as it knows that the user is no longer mapped to that IP address.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 02:40:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-gw-login-lifetime/m-p/270730#M74750</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-06-18T02:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Agent GW Login Lifetime</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-gw-login-lifetime/m-p/270902#M74772</link>
      <description>&lt;P&gt;Many thanks BPry!&amp;nbsp; That is the answer I was looking for.&amp;nbsp; &amp;nbsp;A few questions regarding the finer details below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The GP agent itself doesn't show logged out when this happens. It actually still shows logged in, and authenticated to either gateway.&amp;nbsp; But yes, you are correct, if I try to get to the internet, our FW isn't letting traffic through, as it no longer knows about that user to IP mapping.&amp;nbsp; A "show user ip-user-mapping all " doesn't show a mapping on the FW for that user.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;running the CLI command "show log userid direction equal backward ip in 192.x.x.x"&amp;nbsp; actually shows that ip address and user as "USERID, logout, 3505"&amp;nbsp; - I've noticed that this directly coincides with the timeout values that are placed in the "login lifetime" on the Gateways.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way around this to keep the user logged in (we are using internal only)?&amp;nbsp; If not, maybe the idea would be to set it for a long timeout period, as hopefully the user would manually logout of their computer, prompting the GP agent to restart the timer on the "login lifetime" events?&amp;nbsp; I've also noticed that after exactly 1 hour, the agent will reauthenticate itself, and remap that user to the firewall.&amp;nbsp; We are using cookies, so my guess is the HIP check is doing something in the background to remap that IP to username using a cookie?&amp;nbsp; Running the "show log userid direction equal backward ip in 192.x.x.x" after 1 hour, will actually show that the user to IP address mapping is&amp;nbsp; added back, and I can get internet again....&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 13:29:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-agent-gw-login-lifetime/m-p/270902#M74772</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2019-06-18T13:29:47Z</dc:date>
    </item>
  </channel>
</rss>

