- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
09-11-2024 01:02 PM - edited 09-11-2024 01:02 PM
Hi folks,
We are currently using an LDAP auth profile to auth our GP clients to PA. This is working fine, but the portal logs are just swamped with brute force attacks day & night and PAN refuses to fix this, so we are wanting to move over to certificate authentication instead.
In brief, we have an AD-integrated MS PKI that issues user and machine certs via group policy. The machine certs are currently being used successfully to authenticate machines in a 'pre-logon' profile before the user logs in, so it would seem this is possible, but for the life of me I cannot figure out what is necessary to configure this for user auth through the Strata Cloud Manager (we do not use Panorama), and I'm completely unable to locate any PAN documentation describing this configuration process.
Can anyone here help?
Thanks very much!
09-12-2024 12:03 PM
Hi @LCMember40912 ,
There is a section called "copilot" in SCM can you paste you query to find out the configuration guidance meanwhile we are checking internally.
09-12-2024 01:44 PM
Hi, I do not have a 'Copilot' section in SCM. Thanks for your suggestion however.
09-13-2024 01:43 PM
I'm going to suspend this topic. My goal in moving toward cert auth was to eliminate the flood of brute-force attacks against the portal. Turns out that won't help. The web portal can't be disabled, even if GP uses cert auth, so as long as the portal is up, people are free to brute force it to their heart's content and there's absolutely nothing you can do about it until PAN gets off their butt and address it. Really bad look for an erstwhile 'security' organization...
09-13-2024 02:15 PM
@LCMember40912 apology for the incovinience.
Please go though above document(Enable Mobile Users to Authenticate to Prisma Access).
This document has the available options to authenticate mobile users.
10-17-2024 09:50 AM
Yeah, I have the same problem with brute force.
It’s possible to deny the traffic by country, but not by the source IP.
With Allow Lists you can prevent sending brute force logins to your AD, but you will continue to see the logs.
AFAIK, it’s not possible to configure security policy on the internet-portal traffic neither block by source IP address.
10-17-2024 01:45 PM
"It’s possible to deny the traffic by country, but not by the source IP."
No, you can put subnets as well as regions in the embargo list...
10-20-2024 11:18 PM
Interesting - do you have positive results with blocking /32 „subnets”?
I’ve added my own IP address to the working embargo policy but I was still able to access both Portal & Gateways.
10-21-2024 08:44 AM
Yes. Check logs for failed username and passwords, add the source IP's\ranges to the embargo and watch them disappear.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!