Skip to main content

Palo Alto VPN Integration Guide (RADIUS)

Introduction

Use this guide to enable Multi-Factor Authentication access via RADIUS to Palo Alto Networks (PAN) VPN.

Prerequisites

1. Have PAN-OS 5.0 and above

2. Configure the Multi-Factor App Enrollment Realm (SecureAuth998) in the SecureAuth IdP Web Admin for the RADIUS OTP authentication requests

3. Install and configure the SecureAuth RADIUS Server

Palo Alto Configuration Steps

44832901.jpg

1. Create a RADIUS Server Profile by navigating to Server Profile > RADIUS > click Add

2. Name the RADIUS Server profile

  • Leave the Domain name Blank

  • Time out = 30 seconds

  • Retries = 3 (default)

44832900.jpg

3. Add Server to the profile by clicking Add on the bottom of the profile

  • Name = Generic name for the RADIUS Server

  • IP address = IP address of the SecureAuth Server

  • Secret = Secret shared between Palo Alto and SecureAuth RADIUS

  • Port = 1812 (UDP)

44832899.jpg

4. Navigate to Authentication Profile and click Add to add a new profile

5. Enter a name for the new Authentication Profile and configure the settings

6. For Authentication, select RADIUS as the authentication method

7. For Server Profile, select the SecureAuth RADIUS Profile created in step 2 and click OK

44832897.jpg

8. Click the Network tab

44832896.jpg

9. Navigate to the GlobalProtect Portal of the PAN by clicking Portals and then clicking Add

Tip

You can also use the existing portal, if any exists

44832898.jpg

10. Configure the portal with the following information

  • Name: Enter a name for the realm

  • Network Setting:

    • Interface

    • IP Address

    • Server Certificate

  • Authentication:

    • Authentication Profile: Select the same one created in step 4

    • Other options can be customized as needed

11. Click OK and then test the Palo Alto Networks VPN