Login issue for TACACS user in Palo Alto NGFW

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Login issue for TACACS user in Palo Alto NGFW

L2 Linker

We are not able to login into Palo Alto via TACACS user.

PA NGFW is asking for reset password before login.

We are not able to reset password.

We have reset password complexity by login with another local user.

We have not assigned any admin roles for TACACS user on firewall.

So, how to mitigate the issue, if PA NGFW is asking to reset password.

5 REPLIES 5

L0 Member

is it referring to the default user and password? i know you will receive notification if you havent updated the default password.

Hi @PankajDhobe ,

Can you give a bit more information? It would be useful to see your config (you can hide the TACACS server details).
- Have you configured authentication profile that is using the TACACS server?

- Have you configured that auth profile to be used for admin access - Device -> Management -> Authentication Settings

- Or you have configured the users locally and each user is configured with tacacs auth profile?

- This is a good document for configuring TACACS - https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO&lang=en_US%E2%80%A...

- What VSA have you configured on your server?

- Do you have duplication between local and tacacs usernames?

 

Long, long time ago I have experience something similar when authentication protocol (under Server profile) was wrong. My experience was with RADIUS and we initially configured something else, while the radius server was expecting PAP. Because of that when user put his credentials FW was prompting him with challenge-response - even that the radius server was not configured for such.

 

Password complexity policy should affect only local users so I am assuming either tacacs authentication is not working properly, or FW is matching your local user first.

Please, find answers to your questions;

 

- Have you configured authentication profile that is using the TACACS server?

=> Yes, we have configurd Authetication profile that is using TACACS Server

 

- Have you configured that auth profile to be used for admin access - Device -> Management -> Authentication Settings

=> Yes, we have configured Auth profile to be used for admin access.

 

- Or you have configured the users locally and each user is configured with tacacs auth profile?

=> No, we have not configured user locally with Tacacs auth profile attached.

 

- What VSA have you configured on your server?

=> As discussed with customer, VSA is not configured. 

 

- Do you have duplication between local and tacacs usernames?

=> We had Tacacs user as "ITsupport" and local user  as "itsupport".

But we have removed local user with same name still there is issue.

Hi @PankajDhobe,

As described in the documentation (step 6.3) - https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/configure-tacacs-authentica...

You need to define the VSA on the tacacs server for service, protocol and role. Additionally you can define user group (if you want to use the allow-list in the auth profile in PAN FW - https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/authentication-types/tacacs...

HI @aleksandar.astardzhiev Thanks for you support.

 

I had raised the case with Palo Alto TAC.

TAC engineer took the root access of firewall by using below commands

 

>debug tac-login challenge

(Receive an output and TAC engineer coped it)

 

>debug tac-login response.

(After that entered the response generated for above challenge )

 

After that deleted the user name from the password change database of both(active and passive) PA firewall.

 

Please, find the PA TAC call summery for more details.

 

=================================================

Thanks for your time on call. A quick recap of the zoom meeting :

1. Firewall was prompting for password change for TACACS user "ITsupport". In the past, you had the same local username on the firewall which is now deleted.
2. We took root access of the firewall and removed the below problematic usernames from lastpwchange & pwchangerequired SQL database.

#Troubleshooting commands:
[root@yyyy~]# sqlite3 /opt/pancfg/mgmt/global/db/loginhistory.db
SQLite version 3.6.12
Enter ".help" for instructions
Enter SQL statements terminated with a ";"
sqlite> .schema
CREATE TABLE gracelogin(name varchar, start datetime, count integer);
CREATE TABLE lastpwchange(name varchar, dt datetime);
CREATE TABLE loginhistory(name varchar, dt datetime, status integer, client varchar);
CREATE TABLE pwchangerequired(name varchar, pwchanged integer);
sqlite>
sqlite> select * from lastpwchange;
sqlite> delete from lastpwchange where name='xxxx';
sqlite> select * from pwchangerequired;
sqlite> delete from pwchangerequiredwhere name='xxxx';
sqlite> .quit :
[root@yyyy~]# exit
logout

3. After the above changes we were able to log in to the Active firewall with "ITsupport" TACACS account. Repeated same process for passive firewall.


Per your confirmation, this ticket will now be closed. It was my pleasure assisting you with this case. After that issue has been resolved Tacacs user was successfully able to login to the PA firewall.

 

================================================

  • 4709 Views
  • 5 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!