Has anyone managed to get authentication on PAN-OS 7.0 working with microsoft NPS servers?
Since version 7.0 authentication against our microsoft NPS radius servers is broken. Because the firewall now always first tries CHAP instead op PAP (see this article) and microsoft NPS always replies with a ACCESS-REJECT massage (see this article -> item 9).
As it's insane to start storing our AD credentials with reversible encryption I guess microsoft NPS isn't compatible anymore with Palo Alto? Or am I missing something here?
Solved! Go to Solution.
Recreating the RADIUS server profile did the trick. (actually, changed the timeout and retry from 3 to 2 and pushed from panorama). The system log now says it switched to PAP for that radius server.
That's a nasty bug... Never would have tought 'touching' the radius config could fix the issue...
What are the settings of your policy? I've enable only PAP as an allowed authentication method.
I can't figure out how to trigger the PAP failover on palo alto. It keeps on using CHAP which isn't supported on our domain.
We're using it for admin access on PAN-OS 7.0.2.
NPS logs give an error (19): No reversibly encrypted password is stored for the user account. This means you should enable reversible encryption on you domain controllers with the policy setting "Store password using reversible encryption for all users in the domain" which is not something we can do.
Packet captures show only 1 request and an ACCESS-REJECT radius reply from NPS (because of the CHAP). So no second attempt by the firewall.using PAP
Yes, The NPS settings are exactly the same as on your screenshot. I also see you're running windows server 2012.
Maybe 2012 does not reply on CHAP requests triggering a timeout, while 2008 replies with an access-reject?
All versions of NPS (2008 <-> 2012 R2) should behave the same way.
Dump below is from a 2012 R2. First a CHAP request is sent, that is rejected, and then PAP is tried.
The Event Viewer will also indicate two logins. Subsequent logins are only sent using PAP though.
Might be worth a shot to re-create the RADIUS server profile on the firewall.
What does a Wireshark trace from the NPS look like?
The whole CHAP implementation in 7.0 is pretty silly. The failover only works half the time for the inital logins, it causes massive issues with Multi Factor Authentication solutions using RADIUS Challenge/Response, there's no tickbox to turn it off and completely baffling that CHAP, instead of MS-CHAPv2 is supported..
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!