04-12-2018 08:29 AM
I have two servers listed in my RADIUS Server Profile.
If I shutdown RADIUS on the server that is first in the list I do not see my firewall attempt authentication to the second server. Authentication fails.
If I completely shutdown the first server in the list I do not see any attempts to authenticate to the second server. Authentication fails.
I have swapped IPs and have authenticated to the second server, so confirmed routing/password/port to second server is correct.
Checking logs I never see authentication going to the second RADIUS server, so having two servers in the RADIUS Server Profile seems to have absolutly no effect.
Anyone test this before and got it working?
Note: I do have a support ticket open, going as well as searching through knowledge base articles on RADIUS... (I already did that myself).
11-20-2018 12:48 PM
Managed to solve the issue with PAN TAC support. These were the changes we made (note that we use 2FA which is why the longer than usual time-outs):
- We changed the following configuration in the GUI to allow the necessary time to connect:
From FW > Network > Globalprotect > Agent > <agent_config_name> > APP
- Portal connection timeout = 90
- TCP connection timeout = 90
- TCP receive timeout = 90
Changed the GP timeout from the cli:
# set deviceconfig setting global-protect timeout 50
Reduced the RADIUS timeout slightly in the GUI:
FW > Device > Server Profile > RADIUS > Timeout = 25, Retries = 1
04-12-2018 10:59 AM
Swapping ip will only test that the password/ shared secret is correct for the first entry.
just as a test i would remove server 1 entry and just test server 2 on its own.
but of course you may be correct that it never tries server 2 but may be worth a test.
04-25-2018 11:59 AM
I have done the test as you suggested, both RADIUS servers work as expected so it doesn't seem like an issue on my side.
Not sure what Palo Alto is using to determine if a RADIUS server is not working.
11-16-2018 12:06 PM
Just wondering if you managed to find a solution to your problem? I'm having the same issue...
11-16-2018 12:57 PM
No, I opened a ticket but the "solutions" provided didn't fit in with my use case.
This is the answer provided to me
1. ==> There is a global timeout for global-protect process which is 25 seconds by default. It must be the same as or greater than the total time that any server profile allows for connection attempts. The total time in a server profile is the timeout value multiplied by the number of retries and the number of servers. For example, if a RADIUS server profile specifies a 3-second timeout, 3 retries, and 2 servers, the total time that the profile allows for connection attempts is 18 seconds (3 x 3 x 2).
This is just not acceptable when using two factor authentication.
You can adjust via CLI with "set deviceconfig setting global-protect timeout <range is 3-150 sec>", it is not in any GUI.
I also have no idea how this may work with multiple GP gateways... as the whole retry for that is insane.
A good idea I was provided is setting authentication protocol in your RADIUS server profile to either CHAP or PAP and not AUTO. This will cut down on the overall time it takes to retry on a failed server as it will query each host for CHAP and PAP per RADIUS server retry count.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!