Clientless GP Authentication failing using EAP on RAIDUS Server
18666
Created On 05/10/21 20:33 PM - Last Modified 08/05/21 17:52 PM
Symptom
- GlobalProtect Clientless VPN configured to authenticate via Extensible Authentication Protocol (EAP) for RADIUS
- Certificate error's when looking at the authd.log from the Firewall CLI
2021-05-10 16:58:48.745 +0800 Error: EapolStatusCb(pan_auth_eapol.c:998): (AId:6751996388145100014) Certificate error (unable to get local issuer certificate). 2021-05-10 16:58:48.745 +0800 Error: EapolStatusCb(pan_auth_eapol.c:998): (AId:6751996388145100014) Certificate error (unknown CA). 2021-05-10 16:58:48.745 +0800 debug: mark_success(pan_auth_eapol.c:334): (AID:6751996388145100014) failed
Environment
- PAN-OS
- GlobalProtect Clientless VPN
- Authentication via Extensible Authentication Protocol (EAP) for RADIUS
- Windows Server 2008
Cause
The firewall is not able to validate the certificate configured for EAP on the RADIUS Server.
Resolution
Verify the certificate configured for EAP on the RADIUS Server is the same one configured on the Palo Alto Firewall.
Additional Information
Extensible Authentication Protocol (EAP) Support for RADIUS
Installing Certificate for (EAP) Extensible Authentication Protocol on Radius server
www.entrust.com/knowledgebase/ssl/how-is-the-server-certificate-installed-on-microsoft-network-policy-server-nps-on-windows-2008-serverNote: This article is written for informational purposes only. Palo Alto Networks does not support any third-party operating systems.
- Get the Radius server certificate either from the third party certificate authority or generate the server certificate from the firewall.
- Install the certificate with the private key in personal certificate store local to the windows machine.
- Type administrative tool and open it
- Open Network policy server,
- Click on Network Policies and select the policy created for user authenticate for palo alto firewall. Example
- Right click on properties, in the below example right click on palo and click on properties
- Click on Constraints->Authentication Methods
- Edit the Microsoft: Protected EAP( PEAP)
- Select the correct server certificate which this radius server should present when any device tries to access this radius server.
- Click OK