<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captive Portal LDAP Authentication redundancy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/310875#M80493</link>
    <description>&lt;P&gt;Actually, you are wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recommend you to check this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXnCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXnCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks anyway.&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2020 18:26:32 GMT</pubDate>
    <dc:creator>JuanAn</dc:creator>
    <dc:date>2020-02-12T18:26:32Z</dc:date>
    <item>
      <title>Captive Portal LDAP Authentication redundancy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/308276#M79998</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a Captive Portal that uses next Authentication Profile:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;CP_Auth&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Where:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Authentication Sequence:&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;CP_Auth - Auth_Mode_1,&amp;nbsp;Auth_Mode_2&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;Authentication Profile:&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Auth_Mode_1 - LDAP_1&lt;/LI&gt;&lt;LI&gt;Auth_Mode_2 - LDAP_2&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;LDAP Server Profile:&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;LDAP_1: 10.10.1.101, 10.10.1.102&lt;/LI&gt;&lt;LI&gt;LDAP_2:&amp;nbsp;10.10.2.103, 10.10.2.104&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Base on our monitor logs, we noticed that all our authentications are using LDAP Server 10.10.1.101.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A few days ago we detected that server 10.10.1.101 had an issue and we decided to power off the machine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After that, we were still seeing PA trying to reach this server and not trying to use the second LDAP server (10.10.1.102).&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Why was this happending? Shouldn't the firewall have to change to 10.10.1.102 as soon it detects timeout connections?&lt;/LI&gt;&lt;LI&gt;Is there any way to configure redundancy in case of issue?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kr.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 16:13:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/308276#M79998</guid>
      <dc:creator>JuanAn</dc:creator>
      <dc:date>2020-01-28T16:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal LDAP Authentication redundancy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/308290#M80000</link>
      <description>&lt;P&gt;Create 4 separate LDAP Server Profiles.&lt;/P&gt;&lt;P&gt;Assign them to 4 separate Authentication Profiles.&lt;/P&gt;&lt;P&gt;List all 4 in the Authentication Sequence.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The LDAP Server Profiles don't fail-through to the next one.&amp;nbsp; It tries the first one, and only if it gets a specific response from it will it try the second one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Authentication Sequence is where you list all the servers you want it to try, and the order to try them in.&amp;nbsp; The first one to respond with "allowed" ends the sequence.&amp;nbsp; If none of them return an "allowed" response, then the authentication fails.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 17:14:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/308290#M80000</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2020-01-28T17:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal LDAP Authentication redundancy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/308533#M80036</link>
      <description>&lt;P&gt;Many thanks for your response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't understand... base on this &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/device/device-server-profiles-ldap" target="_self"&gt;document&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Configure at least two LDAP servers to provide redundancy"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What kind of redundancy are they referring in the previous document?&lt;/P&gt;&lt;P&gt;What is the condition that triggers the event of using the secondary LDAP?&lt;/P&gt;&lt;P&gt;Is timeout event not enough to triggers that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kr.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 16:22:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/308533#M80036</guid>
      <dc:creator>JuanAn</dc:creator>
      <dc:date>2020-01-29T16:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal LDAP Authentication redundancy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/308535#M80038</link>
      <description>&lt;P&gt;The way it was explained to us in the 8.1 training course was along the lines of "the first server in the list to respond after boot is the only one it will use" or something along those lines.&amp;nbsp; The instructor actually questioned why they allow multiple servers to be listed in a single Server Profile when it doesn't actually work the way you expect, but was never able to get a straight answer about it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you actually want it to failover to another LDAP server, then you need to use a single server per LDAP Server Profile, and list all of those in an Authentication Sequence.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 16:28:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/308535#M80038</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2020-01-29T16:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal LDAP Authentication redundancy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/310875#M80493</link>
      <description>&lt;P&gt;Actually, you are wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recommend you to check this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXnCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXnCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks anyway.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 18:26:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-ldap-authentication-redundancy/m-p/310875#M80493</guid>
      <dc:creator>JuanAn</dc:creator>
      <dc:date>2020-02-12T18:26:32Z</dc:date>
    </item>
  </channel>
</rss>

