<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Login issue for TACACS user in Palo Alto NGFW in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/426020#M94422</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/152936"&gt;@PankajDhobe&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Can you give a bit more information? It would be useful to see your config (you can hide the TACACS server details).&lt;BR /&gt;- Have you configured authentication profile that is using the TACACS server?&lt;/P&gt;&lt;P&gt;- Have you configured that auth profile to be used for admin access - Device -&amp;gt; Management -&amp;gt; Authentication Settings&lt;/P&gt;&lt;P&gt;- Or you have configured the users locally and each user is configured with tacacs auth profile?&lt;/P&gt;&lt;P&gt;- This is a good document for configuring TACACS -&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/P&gt;&lt;P&gt;- What VSA have you configured on your server?&lt;/P&gt;&lt;P&gt;- Do you have duplication between local and tacacs usernames?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Long, long time ago I have experience something similar when authentication protocol (under Server profile) was wrong. My experience was with RADIUS and we initially configured something else, while the radius server was expecting PAP. Because of that when user put his credentials FW was prompting him with challenge-response - even that the radius server was not configured for such.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Password complexity policy should affect only local users so I am assuming either tacacs authentication is not working properly, or FW is matching your local user first.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Aug 2021 04:41:53 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2021-08-11T04:41:53Z</dc:date>
    <item>
      <title>Login issue for TACACS user in Palo Alto NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/425743#M94400</link>
      <description>&lt;P&gt;We are not able to login into Palo Alto via TACACS user.&lt;/P&gt;&lt;P&gt;PA NGFW is asking for reset password before login.&lt;/P&gt;&lt;P&gt;We are not able to reset password.&lt;/P&gt;&lt;P&gt;We have reset password complexity by login with another local user.&lt;/P&gt;&lt;P&gt;We have not assigned any admin roles for TACACS user on firewall.&lt;/P&gt;&lt;P&gt;So, how to mitigate the issue, if PA NGFW is asking to reset password.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2021 12:44:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/425743#M94400</guid>
      <dc:creator>PankajDhobe</dc:creator>
      <dc:date>2021-08-10T12:44:10Z</dc:date>
    </item>
    <item>
      <title>Re: Login issue for TACACS user in Palo Alto NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/425786#M94402</link>
      <description>&lt;P&gt;is it referring to the default user and password? i know you will receive notification if you havent updated the default password.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2021 14:33:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/425786#M94402</guid>
      <dc:creator>juan.reynolds</dc:creator>
      <dc:date>2021-08-10T14:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: Login issue for TACACS user in Palo Alto NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/426020#M94422</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/152936"&gt;@PankajDhobe&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Can you give a bit more information? It would be useful to see your config (you can hide the TACACS server details).&lt;BR /&gt;- Have you configured authentication profile that is using the TACACS server?&lt;/P&gt;&lt;P&gt;- Have you configured that auth profile to be used for admin access - Device -&amp;gt; Management -&amp;gt; Authentication Settings&lt;/P&gt;&lt;P&gt;- Or you have configured the users locally and each user is configured with tacacs auth profile?&lt;/P&gt;&lt;P&gt;- This is a good document for configuring TACACS -&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/P&gt;&lt;P&gt;- What VSA have you configured on your server?&lt;/P&gt;&lt;P&gt;- Do you have duplication between local and tacacs usernames?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Long, long time ago I have experience something similar when authentication protocol (under Server profile) was wrong. My experience was with RADIUS and we initially configured something else, while the radius server was expecting PAP. Because of that when user put his credentials FW was prompting him with challenge-response - even that the radius server was not configured for such.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Password complexity policy should affect only local users so I am assuming either tacacs authentication is not working properly, or FW is matching your local user first.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 04:41:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/426020#M94422</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-08-11T04:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: Login issue for TACACS user in Palo Alto NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/426040#M94426</link>
      <description>&lt;P&gt;Please, find answers to your questions;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Have you configured authentication profile that is using the TACACS server?&lt;/P&gt;&lt;P&gt;=&amp;gt; Yes, we have configurd Authetication profile that is using TACACS Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Have you configured that auth profile to be used for admin access - Device -&amp;gt; Management -&amp;gt; Authentication Settings&lt;/P&gt;&lt;P&gt;=&amp;gt; Yes, we have configured Auth profile to be used for admin access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Or you have configured the users locally and each user is configured with tacacs auth profile?&lt;/P&gt;&lt;P&gt;=&amp;gt; No, we have not configured user locally with Tacacs auth profile attached.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- What VSA have you configured on your server?&lt;/P&gt;&lt;P&gt;=&amp;gt; As discussed with customer, VSA is not configured.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Do you have duplication between local and tacacs usernames?&lt;/P&gt;&lt;P&gt;=&amp;gt; We had Tacacs user as "ITsupport" and local user&amp;nbsp; as "itsupport".&lt;/P&gt;&lt;P&gt;But we have removed local user with same name still there is issue.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 07:22:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/426040#M94426</guid>
      <dc:creator>PankajDhobe</dc:creator>
      <dc:date>2021-08-11T07:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: Login issue for TACACS user in Palo Alto NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/426041#M94427</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/152936"&gt;@PankajDhobe&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;As described in the documentation (step 6.3) - &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/configure-tacacs-authentication.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/configure-tacacs-authentication.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You need to define the VSA on the tacacs server for service, protocol and role. Additionally you can define user group (if you want to use the allow-list in the auth profile in PAN FW - &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/authentication-types/tacacs.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/authentication-types/tacacs.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 07:52:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/426041#M94427</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-08-11T07:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: Login issue for TACACS user in Palo Alto NGFW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/426911#M94555</link>
      <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;Thanks for you support.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had raised the case with Palo Alto TAC.&lt;/P&gt;&lt;P&gt;TAC engineer took the root access of firewall by using below commands&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;debug tac-login challenge&lt;/P&gt;&lt;P&gt;(Receive an output and TAC engineer coped it)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;debug tac-login response.&lt;/P&gt;&lt;P&gt;(After that entered the response generated for above challenge )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After that deleted the user name from the password change database of both(active and passive) PA firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please, find the PA TAC call summery for more details.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;=================================================&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;for&amp;nbsp;your&amp;nbsp;time&amp;nbsp;on&amp;nbsp;call.&amp;nbsp;A&amp;nbsp;quick&amp;nbsp;recap&amp;nbsp;of&amp;nbsp;the&amp;nbsp;zoom&amp;nbsp;meeting&amp;nbsp;:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;1.&amp;nbsp;Firewall&amp;nbsp;was&amp;nbsp;prompting&amp;nbsp;for&amp;nbsp;password&amp;nbsp;change&amp;nbsp;for&amp;nbsp;TACACS&amp;nbsp;user&amp;nbsp;"ITsupport".&amp;nbsp;In&amp;nbsp;the&amp;nbsp;past,&amp;nbsp;you&amp;nbsp;had&amp;nbsp;the&amp;nbsp;same&amp;nbsp;local&amp;nbsp;username&amp;nbsp;on&amp;nbsp;the&amp;nbsp;firewall&amp;nbsp;which&amp;nbsp;is&amp;nbsp;now&amp;nbsp;deleted.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2.&amp;nbsp;We&amp;nbsp;took&amp;nbsp;root&amp;nbsp;access&amp;nbsp;of&amp;nbsp;the&amp;nbsp;firewall&amp;nbsp;and&amp;nbsp;removed&amp;nbsp;the&amp;nbsp;below&amp;nbsp;problematic&amp;nbsp;usernames&amp;nbsp;from&amp;nbsp;lastpwchange&amp;nbsp;&amp;amp;&amp;nbsp;pwchangerequired&amp;nbsp;SQL&amp;nbsp;database.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;#Troubleshooting&amp;nbsp;commands:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[root@yyyy~]#&amp;nbsp;sqlite3&amp;nbsp;/opt/pancfg/mgmt/global/db/loginhistory.db&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;SQLite&amp;nbsp;version&amp;nbsp;3.6.12&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Enter&amp;nbsp;".help"&amp;nbsp;for&amp;nbsp;instructions&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Enter&amp;nbsp;SQL&amp;nbsp;statements&amp;nbsp;terminated&amp;nbsp;with&amp;nbsp;a&amp;nbsp;";"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sqlite&amp;gt;&amp;nbsp;.schema&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;CREATE&amp;nbsp;TABLE&amp;nbsp;gracelogin(name&amp;nbsp;varchar,&amp;nbsp;start&amp;nbsp;datetime,&amp;nbsp;count&amp;nbsp;integer);&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;CREATE&amp;nbsp;TABLE&amp;nbsp;lastpwchange(name&amp;nbsp;varchar,&amp;nbsp;dt&amp;nbsp;datetime);&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;CREATE&amp;nbsp;TABLE&amp;nbsp;loginhistory(name&amp;nbsp;varchar,&amp;nbsp;dt&amp;nbsp;datetime,&amp;nbsp;status&amp;nbsp;integer,&amp;nbsp;client&amp;nbsp;varchar);&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;CREATE&amp;nbsp;TABLE&amp;nbsp;pwchangerequired(name&amp;nbsp;varchar,&amp;nbsp;pwchanged&amp;nbsp;integer);&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sqlite&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sqlite&amp;gt;&amp;nbsp;select&amp;nbsp;*&amp;nbsp;from&amp;nbsp;lastpwchange;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sqlite&amp;gt;&amp;nbsp;delete&amp;nbsp;from&amp;nbsp;lastpwchange&amp;nbsp;where&amp;nbsp;name='xxxx';&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sqlite&amp;gt;&amp;nbsp;select&amp;nbsp;*&amp;nbsp;from&amp;nbsp;pwchangerequired;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sqlite&amp;gt;&amp;nbsp;delete&amp;nbsp;from&amp;nbsp;pwchangerequiredwhere&amp;nbsp;name='xxxx';&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sqlite&amp;gt;&amp;nbsp;.quit&amp;nbsp;:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[root@yyyy~]#&amp;nbsp;exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;logout&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;3.&amp;nbsp;After&amp;nbsp;the&amp;nbsp;above&amp;nbsp;changes&amp;nbsp;we&amp;nbsp;were&amp;nbsp;able&amp;nbsp;to&amp;nbsp;log&amp;nbsp;in&amp;nbsp;to&amp;nbsp;the&amp;nbsp;Active&amp;nbsp;firewall&amp;nbsp;with&amp;nbsp;"ITsupport"&amp;nbsp;TACACS&amp;nbsp;account.&amp;nbsp;Repeated&amp;nbsp;same&amp;nbsp;process&amp;nbsp;for&amp;nbsp;passive&amp;nbsp;firewall.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Per&amp;nbsp;your&amp;nbsp;confirmation,&amp;nbsp;this&amp;nbsp;ticket&amp;nbsp;will&amp;nbsp;now&amp;nbsp;be&amp;nbsp;closed.&amp;nbsp;It&amp;nbsp;was&amp;nbsp;my&amp;nbsp;pleasure&amp;nbsp;assisting&amp;nbsp;you&amp;nbsp;with&amp;nbsp;this&amp;nbsp;case. After that issue has been resolved Tacacs user was successfully able to login to the PA firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;================================================&lt;/P&gt;</description>
      <pubDate>Sun, 15 Aug 2021 12:54:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/login-issue-for-tacacs-user-in-palo-alto-ngfw/m-p/426911#M94555</guid>
      <dc:creator>PankajDhobe</dc:creator>
      <dc:date>2021-08-15T12:54:41Z</dc:date>
    </item>
  </channel>
</rss>

