08-10-2021 05:44 AM
We are not able to login into Palo Alto via TACACS user.
PA NGFW is asking for reset password before login.
We are not able to reset password.
We have reset password complexity by login with another local user.
We have not assigned any admin roles for TACACS user on firewall.
So, how to mitigate the issue, if PA NGFW is asking to reset password.
08-10-2021 07:33 AM
is it referring to the default user and password? i know you will receive notification if you havent updated the default password.
08-10-2021 09:41 PM
Hi @PankajDhobe ,
Can you give a bit more information? It would be useful to see your config (you can hide the TACACS server details).
- Have you configured authentication profile that is using the TACACS server?
- Have you configured that auth profile to be used for admin access - Device -> Management -> Authentication Settings
- Or you have configured the users locally and each user is configured with tacacs auth profile?
- This is a good document for configuring TACACS - https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO&lang=en_US%E2%80%A...
- What VSA have you configured on your server?
- Do you have duplication between local and tacacs usernames?
Long, long time ago I have experience something similar when authentication protocol (under Server profile) was wrong. My experience was with RADIUS and we initially configured something else, while the radius server was expecting PAP. Because of that when user put his credentials FW was prompting him with challenge-response - even that the radius server was not configured for such.
Password complexity policy should affect only local users so I am assuming either tacacs authentication is not working properly, or FW is matching your local user first.
08-11-2021 12:22 AM
Please, find answers to your questions;
- Have you configured authentication profile that is using the TACACS server?
=> Yes, we have configurd Authetication profile that is using TACACS Server
- Have you configured that auth profile to be used for admin access - Device -> Management -> Authentication Settings
=> Yes, we have configured Auth profile to be used for admin access.
- Or you have configured the users locally and each user is configured with tacacs auth profile?
=> No, we have not configured user locally with Tacacs auth profile attached.
- What VSA have you configured on your server?
=> As discussed with customer, VSA is not configured.
- Do you have duplication between local and tacacs usernames?
=> We had Tacacs user as "ITsupport" and local user as "itsupport".
But we have removed local user with same name still there is issue.
08-11-2021 12:52 AM
Hi @PankajDhobe,
As described in the documentation (step 6.3) - https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/configure-tacacs-authentica...
You need to define the VSA on the tacacs server for service, protocol and role. Additionally you can define user group (if you want to use the allow-list in the auth profile in PAN FW - https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/authentication-types/tacacs...
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!