Sie sind auf Seite 1von 4

Configuring Authentication with Fallback Options | Palo Alto Networks Live 3/22/15, 2:25 PM

All Places > Knowledge Base > Documents

Configuring Authentication with Fallback


Options Version 8

created by Ameya on Jul 23, 2012 7:05 PM, last modified by Ameya on Feb 7, 2014 9:21 AM

This document describes the following configurations :


Authentication : RADIUS. LDAP and LOCAL
Authenticate Profile : RADIUS, LDAP and LOCAL
Authentication Sequence : RADIUS, fallback to LDAP, fallback to LOCAL
Using the Authentication Sequence for Firewall Administrator and Captive Portal

RADIUS Authentication
Device > Server-Profile > Radius
Configure the fields:
Domain name: RADIUS server domain
Server: Friendly Name identifying Server
IP address: Address of Server
Port-1812 (authentication)

Local User Authentication


Device > Local User Database > Users
Create a local user adding a password and enabling the user.

https://live.paloaltonetworks.com/docs/DOC-3388 Page 1 of 5
Configuring Authentication with Fallback Options | Palo Alto Networks Live 3/22/15, 2:25 PM

LDAP Authentication
Device > Server-Profile > LDAP
Base field represents the point in the LDAP tree where the firewall will connect to and begin the search for
users and groups.
Bind DN field contains the user name credentials that the firewall uses to access the AD/ LDAP server to
be able to pull users and groups
SSL is checked by default and needs server port 636, make sure to uncheck SSL if port 389 is used
Domain: Needs to be the NETBIOS domain or leave blank and the system will pull the domain info.
automatically

Authenticate Profile
Device > Authenticate Profile

https://live.paloaltonetworks.com/docs/DOC-3388 Page 2 of 5
Configuring Authentication with Fallback Options | Palo Alto Networks Live 3/22/15, 2:25 PM

Configure Authentication profile for Local, Radius and LDAP authentication by selecting Authentication and
Server profiles.

Authentication Sequence
Device > Authenticate Sequence

Snapshot depicts Radius as primary authentication, first fallback as LDAP and second fallback as Local
Database.
Radius > Fallback to LDAP > Fallback to Local
Lockout Time : Number of minutes that a user is locked out if the number of failed attempts is reached (0-60
minutes, default 0). 0 means that the lockout is in eect until it is manually unlocked.
Failed Attempts : Number of failed login attempts that are allowed before the account is locked out (1-10,
default 0). 0 means that there is no limit.

Authentication Sequence for Firewall Administrator


Device > Administrators
Create Administrator with Authentication Profile = Authentication Sequence profile.
Choose Role-Dynamic-SuperUser.

https://live.paloaltonetworks.com/docs/DOC-3388 Page 3 of 5
Configuring Authentication with Fallback Options | Palo Alto Networks Live 3/22/15, 2:25 PM

Authentication Sequence for Captive-Portal Authentication


Device > User Identification > Captive Portal Settings

Select Authentication-Sequence as a Authentication Profile.

owner: akawimandan

2265 Views Categories: User-ID & Authentication


Tags: authentication, ldap, radius, user-id, configuration, local, authentication_profile

Average User Rating

(5 ratings)

2 Comments
https://live.paloaltonetworks.com/docs/DOC-3388 Page 4 of 5

Das könnte Ihnen auch gefallen