No, I opened a ticket but the "solutions" provided didn't fit in with my use case. This is the answer provided to me 1. ==> There is a global timeout for global-protect process which is 25 seconds by default. It must be the same as or greater than the total time that any server profile allows for connection attempts. The total time in a server profile is the timeout value multiplied by the number of retries and the number of servers. For example, if a RADIUS server profile specifies a 3-second timeout, 3 retries, and 2 servers, the total time that the profile allows for connection attempts is 18 seconds (3 x 3 x 2). This is just not acceptable when using two factor authentication. You can adjust via CLI with "set deviceconfig setting global-protect timeout <range is 3-150 sec>", it is not in any GUI. I also have no idea how this may work with multiple GP gateways... as the whole retry for that is insane. A good idea I was provided is setting authentication protocol in your RADIUS server profile to either CHAP or PAP and not AUTO. This will cut down on the overall time it takes to retry on a failed server as it will query each host for CHAP and PAP per RADIUS server retry count.
... View more