<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captive Portal - identify user with certificate in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11117#M8187</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a document for utilizing client cert for ssl-vpn authentication but should be good for CP as well. Hope it helps but feel free to update this thread if you need further assistance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1934"&gt;https://live.paloaltonetworks.com/docs/DOC-1934&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Renato&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 22 Oct 2011 05:29:17 GMT</pubDate>
    <dc:creator>gswcowboy</dc:creator>
    <dc:date>2011-10-22T05:29:17Z</dc:date>
    <item>
      <title>Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11116#M8186</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everybody.&lt;/P&gt;&lt;P&gt;I have a question regarding &lt;STRONG&gt;captive portal&lt;/STRONG&gt; user identification.&lt;/P&gt;&lt;P&gt;As everybody know user like Mac, iPhone, Android are difficult to identify and manage without insert credential in captive portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For wireless policy in all my company device I've installed a user certificate who grant wireless access. i would like to use it for user identification in captive portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried to configure my PA-2050 4.0.5&amp;nbsp; like "How to configure captive portal" guide scenario 3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt; if I set under &lt;STRONG&gt;User identification&lt;/STRONG&gt; the client cerficate and the authentication profile (if a client don't have certificate can insert credential in captive portal) the browser goes wrong.&lt;/LI&gt;&lt;LI&gt;if i set only authentication profile everything is well.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got an internal CA. I've imported the ca certificate on PA and created the client certificate profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can help me?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Oct 2011 14:07:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11116#M8186</guid>
      <dc:creator>LCMember317</dc:creator>
      <dc:date>2011-10-21T14:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11117#M8187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a document for utilizing client cert for ssl-vpn authentication but should be good for CP as well. Hope it helps but feel free to update this thread if you need further assistance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1934"&gt;https://live.paloaltonetworks.com/docs/DOC-1934&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Renato&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Oct 2011 05:29:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11117#M8187</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2011-10-22T05:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11118#M8188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="hps"&gt;Seen it&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Unfortunately&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;I get the error&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;described&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;above.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Oct 2011 09:31:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11118#M8188</guid>
      <dc:creator>LCMember317</dc:creator>
      <dc:date>2011-10-25T09:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11119#M8189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please elaborate on the errors that you receive?&amp;nbsp; Also, have you tried using a different browser with the captive portal?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Oct 2011 12:38:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11119#M8189</guid>
      <dc:creator>ggarrison</dc:creator>
      <dc:date>2011-10-25T12:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11120#M8190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"If a client doesn't have a cert" ---&amp;gt; Could you please clarify? I am under the assumption, the client has the cert and thus should get the two-factor authentication from the PAN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Oct 2011 13:27:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11120#M8190</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2011-10-25T13:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11121#M8191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the problem he is having is the same as me... I want to use the captive portal with username/password for devices WITHOUT a certificate.&amp;nbsp; Example: say we have a presenter/visitor come into our building and they need internet access - they will hit the portal where we can give them a username and password.&amp;nbsp; But we want our other corporate devices like ipads, iphones, androids, etc to get on automatically by having the cert... so they don't have to enter their credentials each day.&amp;nbsp; Is there a way to do this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Sep 2012 22:21:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11121#M8191</guid>
      <dc:creator>etank</dc:creator>
      <dc:date>2012-09-13T22:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11122#M8192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Erik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per the current design, you cannot have both configured and still use only one of them. If you have certificates and an auth profile, it will be a 2-form authentication: you authenticate using a cert and also need to authenticate using username/password. If you want to use only certificates, leave the auth profile empty. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need the functionality of able to configure both and use only one form of authentication, please contact your SE to file a feature request. Hope this information was helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sri&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Sep 2012 23:40:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11122#M8192</guid>
      <dc:creator>zarina</dc:creator>
      <dc:date>2012-09-13T23:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11123#M8193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cannot one setup two interfaces (connected to each zone) where one interface is the regular captive portal (and default gw) and the other is ssl-vpn which your own devices (ipads etc) will connect directly to?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then in the security rules you set this as srczone: zone_portal, zone_vpn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 06:57:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11123#M8193</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-09-14T06:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11124#M8194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, make two different VLANs... one for guests, and the other for employees...&amp;nbsp; You can use captive portal for the guest network/subnet/vlan, and then use something different on your internal network.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 07:21:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11124#M8194</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2012-09-14T07:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11125#M8195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;jvalentine,&amp;nbsp; Our school district's networking equipment is ancient - the Palo Alto is one of two L3 devices on our network.&amp;nbsp; I have very little experience with vlans, given our 15+ year old cisco switches as the majority of our network.&amp;nbsp; I'm all ears if you want to let me know how to set it up though &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mikand - I don't know what you mean... I would plug in two cables from my network into the Palo Alto and have two separate gateways?&amp;nbsp; I'd love to hear more...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the responses... sorry to hijack a thread.&amp;nbsp; &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I started my own thread about this here: &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/18846#18846"&gt;https://live.paloaltonetworks.com/message/18846#18846&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Erik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 07:49:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11125#M8195</guid>
      <dc:creator>etank</dc:creator>
      <dc:date>2012-09-14T07:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - identify user with certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11126#M8196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you dont have any vlans at all (just a physical lan) and probably wont be able to change how the access network looks like my idea was something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) A regular interface, for example 192.168.0.254/24 (which you add in dhcp as default gw so regular clients will use 192.168.0.254 as default gw to reach Internet or whatever and before they are let out they must use the captive portal).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) A subinterface (or another physical interface), 192.168.0.253/??, which the ssl-vpn clients would connect to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its the last part which im not sure if its possible to accomplish on a PA (due to ip range collissions and such).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As sdarapuneni said if you enable both captive portal and ssl-vpn on the same interface then the PA will force both to be valid (meaning ssl-vpn users would still get a captive portal).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im thinking if it would be possible to trick PA into this support by using vrouter and/or dnat/snat in combination?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A workaround could be if you setup something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) 192.168.0.254/24 for regular clients (captive portal) on int1.&lt;/P&gt;&lt;P&gt;2) 10.0.0.254/24 for ssl-vpn clients on int2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connect both to your access network and in the dhcp put up static leases based on mac address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way a regular client will get a 192.168.0.x ip and 192.168.0.254 as default gw and your known ipad (etc) clients gets a 10.0.0.x ip and 10.0.0.254 as default gw. Because this ip "separation" isnt a true separation (they are all on the same vlan anyway) the only way for a client who gets a 10-ip to reach internet is either to auth using ssl-vpn OR go through 192.168.0.254 and use the captive portal - either way they must authenticate in order to leave your access network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course this doesnt fulfill any demands regarding strong auth (since you use captive portal) but your case doesnt seem to involve being 100% sure of who did what (because in order to use captive portal your access network must be secured/hardedened aswell like using protected vlan so clients cannot steal each other ip/mac addresses and such but also since if a user gets hold of another users login/pass they will use that instead of their own) but rather make it easier for your trusted clients to use your access network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 08:25:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-identify-user-with-certificate/m-p/11126#M8196</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-09-14T08:25:26Z</dc:date>
    </item>
  </channel>
</rss>

