Palo Alto Network VPN configuration for the LastPass Universal Proxy RADIUS protocol
About this task:
Note: Only Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) modes are supported by the service.
Enable cookie generation on the GlobalProtect Portal
Enable cookie acceptance in the GlobalProtect Gateway
Set the GlobalProtect connection timeout to 60 seconds on the Palo Alto server
Increase the authentication timeout to 60 seconds.
Note:
As the LastPass Authenticator app push notification timeout is 60 seconds, set to 60 seconds.
The authentication timeout is calculated as: set connection timeout - 5 seconds. The default timeout is 30 seconds, which in turn makes the default authentication timeout as 25 seconds.
You can only change the authentication timeout settings from CLI:
- SSH into the Palo Alto server from the command line.
- Run the following command to increase the default timeout value to 60 seconds:
vpnadmin@paloaltovpntest> configure Entering configuration mode [edit] vpnadmin@paloaltovpntest# set deviceconfig setting global-protect timeout 65 [edit] vpnadmin@paloaltovpntest# commit
Note: In order to set the timeout to 60 seconds, you should add timeout 65, 5 seconds more, because of the server's calculation. - Run the following command, to check the previously modified settings:
vpnadmin@paloaltovpntest# show deviceconfig setting global-protect
Result:
If set correctly, the following result appears:
global-protect { timeout 65; }
Add a RADIUS server profile
Results: You have now configured RADIUS authentication for your Palo Alto VPN.