Unable to Login to Firewalls through the GUI or CLI with any users
80768
Created On 07/22/21 11:24 AM - Last Modified 09/06/21 21:34 PM
Symptom
- Unable to Login to Firewalls through the GUI or CLI with any users, no prior warning received
- Password expired for failed user
-
The Firewall authd.logs show "warning period=0" and "password_expiry_locked = TRUE" for this user
2021-06-07 08:15:31.025 +0300 debug: pan_auth_check_password_expiry_and_authenticate(pan_auth_state_engine.c:1266): Password profile values for user: user1:profile=global, expiry period=90, warning period=0, expired admin logon count=0, grace period=0 2021-06-07 08:15:31.025 +0300 debug: pan_auth_check_password_expiry_and_authenticate(pan_auth_state_engine.c:1274): user "user1": last password change tim = Mon Mar 8 13:26:16 2021, so elapsed_days = 90, while expiry period = 90 2021-06-07 08:15:31.033 +0300 debug: _lock_unlock_user(pan_auth_state_engine.c:335): lock_user = 1; is_exp_admin = 0 --> password_expiry_locked = TRUE 2021-06-07 08:15:31.033 +0300 debug: pan_auth_check_password_expiry_and_authenticate(pan_auth_state_engine.c:1367): Password expired for failed authenticated user "user1
Environment
- PAN-OS
- Palo Alto Firewall
Cause
Password expired for failed authenticated user. The "warning period=0" indicates why a warning wasn't received.Resolution
To log back into the firewall
- Reboot the firewall and then try to login the device
- If the above procedure is failed, then Boot into maintenance mode and load a previously saved named config as follows.
- Once in maintenance mode, continue to the 'Select Running Config' option.
- .Choose a previous version of the running-config for which the administrator password is known and reboot the device with this config.
- .Check if you are able to login in to the firewall,
- If you are able to log in, and the device is in HA then sync the configuration to the peer from the command line
> request high-availability sync-to-remote running-config
- If you are able to log in, and the device is in HA then sync the configuration to the peer from the command line
- If the above fails, a factory reset will need to be performed.
Additional Information
If you want to collect a technical support file please do so before performing a factory reset
How to Retrieve the Palo Alto Networks Firewall Configuration in Maintenance Mode
To avoid the password expiring without warning the following can be configured:
Post Expiration Admin Login Count - can be configured, which allows the administrator to log in a specified number of times after their account has expired. Example, if the value is set to 3 and their account has expired, they can log in 3 more times before their account is locked out (range is 0 to 3).
Post Expiration Grace Period (days) - Allow the administrator to log in the specified number of days after their account has expired (range is 0 to 30).
For more information please refer to the link below:
Device > Password Profiles
Information Synchronized in an HA Pair
How to Reset the Administrator Password