Our captive portal is configured to use RADIUS (Cisco Secure ACS) to authenticate our AD users. The Cisco ACS will authenticate a user even if they do not include their domain information in the userid string... 'userid' rather than 'domain\userid'.
we installed GP 1.2.1 on a Windows 8 32 bit pro tablet (thinkpad 2). With WiFi it works perfectly but when we use 3G, we can't even open the Portal website in the Internet Explorer and the GP client can't connect.
I have the WAN it's vlan 9 with the IP x.x.9.1 and I have to give access to vlan 6 which is the part of users, the Palo Alto must make the routing, vlan 6 has the IP's: x.x.6.0/24, x.x.109.0/24, which should go out x.x.6.254.
I'm trying to authenticate an AD group for administrative access for our PA. I'm missing the last step to implement it and I may have some of the steps messed up. could someone fill in the blanks for me?
I have configured a VPN portal and a gateway, both of them with an authentication profile that it's based on just an allow list (no authentication by RADIUS or anything else). The user is obtained from the common-name field of the user certificate th
I'm having a discussion with my firewall engineer about rules in the PA5020. If I define an application to be used, say SSL, and I want to run that on a random port, say 8443. When I define that port (service) 8443 and choose the Application 'ssl',
Hello. I am working on the initial configuration of our new palo alto's. These are not in production yet. These new firewalls will be taking over our vlan's (will be the gateway) and will be running OSPF. I will stop the ospf instance on the local ro