<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP-S Authentification failed (LDAP-S with TLS1 ?) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/333474#M84212</link>
    <description>&lt;P&gt;Is it worth dropping this back to 389 just to ensure comms an bind is all ok.&lt;/P&gt;</description>
    <pubDate>Mon, 15 Jun 2020 17:13:59 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2020-06-15T17:13:59Z</dc:date>
    <item>
      <title>LDAP-S Authentification failed (LDAP-S with TLS1 ?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/333424#M84204</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;while using LDAP-S (port 636) on a PAN Firewall for a connection to an active directory on a Windows Server 2019 I have the problem that the Firewall just can't connect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I try the "test" command for testing the authentication profile I get this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication to LDAP server at [....] for user "ldap"&lt;/P&gt;&lt;P&gt;Egress: [.....]&lt;/P&gt;&lt;P&gt;Type of authentication: GSSAPI&lt;/P&gt;&lt;P&gt;Starting LDAPS connection...&lt;/P&gt;&lt;P&gt;Failed to create a session with LDAP server&lt;/P&gt;&lt;P&gt;Authentication failed against LDAP server at [...] for user "ldap"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication failed for user "ldap"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because it worked with Windows Server 2016 I took TCP Dumps and could observe that the working connection to the Windows Server 2016 used TLS1.2 while the connection to the Windows Server 2019 used TLS1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could it be that the NGFW refuses the connection because of the TLS1 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: On the Windows Server 2019 I activated LDAP-S and can connect to the localhost over port 636. So that can not be the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 14:19:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/333424#M84204</guid>
      <dc:creator>Marc.Luecke</dc:creator>
      <dc:date>2020-06-15T14:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP-S Authentification failed (LDAP-S with TLS1 ?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/333474#M84212</link>
      <description>&lt;P&gt;Is it worth dropping this back to 389 just to ensure comms an bind is all ok.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 17:13:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/333474#M84212</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-06-15T17:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP-S Authentification failed (LDAP-S with TLS1 ?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/333584#M84229</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I use LDAP over Port 389 everything works fine so the binding seems to be ok.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition to this Case I tried to connect over Port 636 to a Windows Server 2012 and 2016 what did work with no problems.&lt;/P&gt;&lt;P&gt;Only the connection to Windows Server 2019 does not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think it has something to do with the Server using TLS1 by default.&lt;/P&gt;&lt;P&gt;I see this within the Windows Server 2019 options:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;domainControllerFunctionality: 7 = ( WIN2016&amp;nbsp;);&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;domainFunctionality: 7 = ( Win2008R2 );&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dsServiceName: CN=NTDS Settings,CN=[...],CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=[...],DC=[...];&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;forestFunctionality: 7 = ( Win2008R2 );&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Maybe it has something to do with the reference to the Windows Server 2008R2 build and that this Server somehow prefers TLS1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;what the NGFW denies...But&amp;nbsp; I have no proof or workaround so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 07:14:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/333584#M84229</guid>
      <dc:creator>Marc.Luecke</dc:creator>
      <dc:date>2020-06-16T07:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP-S Authentification failed (LDAP-S with TLS1 ?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/349443#M86855</link>
      <description>&lt;P&gt;I do not have a solution, but a possible work around.&amp;nbsp; I am having the same problem getting LDAPS to work with our Email Gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I installed Wireshark to troubleshoot and discovered that the npcap drivers, which I installed with Wireshark, actually fixed the problem.&amp;nbsp; I could uninstall Wireshark and still connect to the domain controllers using LDAPS, but once I uninstalled npcap, LDAPS no longer worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is not a solution I am comfortable with, but it may help set you on the right path to figuring out the root cause.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Sep 2020 17:36:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/349443#M86855</guid>
      <dc:creator>Bob_Foglia</dc:creator>
      <dc:date>2020-09-15T17:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP-S Authentification failed (LDAP-S with TLS1 ?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/349740#M86891</link>
      <description>&lt;P&gt;Hi Bob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;very kind of you to share this detail.&lt;/P&gt;&lt;P&gt;I will add this to our local knowledge base!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am kind of ashamed that I did not share the solution that I had regarding this case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem on my side was that without SSL Decryption the application default services won't work.&lt;/P&gt;&lt;P&gt;I fixed that and everything worked fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have a great day!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 09:31:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/349740#M86891</guid>
      <dc:creator>Marc.Luecke</dc:creator>
      <dc:date>2020-09-16T09:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP-S Authentification failed (LDAP-S with TLS1 ?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/462343#M102260</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/123063"&gt;@Marc.Luecke&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are the man!&amp;nbsp; Removing application default from my security poicy rule did the trick.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jan 2022 23:30:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-s-authentification-failed-ldap-s-with-tls1/m-p/462343#M102260</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-01-31T23:30:28Z</dc:date>
    </item>
  </channel>
</rss>

