Skip to main content

Palo Alto VPN Integration Guide (RADIUS)


Use this guide to enable Multi-Factor Authentication access via RADIUS to Palo Alto Networks (PAN) VPN.


1. Have PAN-OS 5.0 and above

2. Configure the Multi-Factor App Enrollment Realm (SecureAuth998) in the SecureAuth IdP Web Admin for the RADIUS OTP authentication requests

3. Install and configure the SecureAuth RADIUS Server

Palo Alto Configuration Steps


1. Create a RADIUS Server Profile by navigating to Server Profile > RADIUS > click Add

2. Name the RADIUS Server profile

  • Leave the Domain name Blank

  • Time out = 30 seconds

  • Retries = 3 (default)


3. Add Server to the profile by clicking Add on the bottom of the profile

  • Name = Generic name for the RADIUS Server

  • IP address = IP address of the SecureAuth Server

  • Secret = Secret shared between Palo Alto and SecureAuth RADIUS

  • Port = 1812 (UDP)


4. Navigate to Authentication Profile and click Add to add a new profile

5. Enter a name for the new Authentication Profile and configure the settings

6. For Authentication, select RADIUS as the authentication method

7. For Server Profile, select the SecureAuth RADIUS Profile created in step 2 and click OK


8. Click the Network tab


9. Navigate to the GlobalProtect Portal of the PAN by clicking Portals and then clicking Add


You can also use the existing portal, if any exists


10. Configure the portal with the following information

  • Name: Enter a name for the realm

  • Network Setting:

    • Interface

    • IP Address

    • Server Certificate

  • Authentication:

    • Authentication Profile: Select the same one created in step 4

    • Other options can be customized as needed

11. Click OK and then test the Palo Alto Networks VPN