Table of Contents ....................................................................................................................................................... 2
Palo Alto Networks GlobalProtect provides security for host systems, such as laptops, that are used in the field by
allowing easy and secure login from anywhere in the world. With GlobalProtect, users are protected against
threats even when they are not on the enterprise network, and application and content usage is controlled on the
host system to prevent leakage of data, etc. This document covers the configuration of GlobalProtect with ActivID
AAA for remote access VPN with HID Global solutions.
The HID Global Identity Assurance solutions that work with Palo Alto Networks incorporate VPN solutions that are
versatile, with strong authentication that is flexible, scalable, and simple to manage. HID Global Identity
Assurance offers two solutions:
ActivID® AAA Server for Remote Access addresses the security risks associated with a mobile
workforce remotely accessing systems and data.
ActivID® Appliance offers support for multiple authentication methods that are useful for diverse
audiences across a variety of service channels (SAML, Radius, etc.), including user name and
password, mobile and PC soft tokens, one-time passwords, and transparent Web soft tokens.
1.1 Scope of Document
This document describes how to set up ActivID AAA authentication with Palo Alto Networks GlobalProtect to
enable authentication via a hard/soft token or an OTP received by Email/SMS using an SSL-protected Palo Alto
Networks VPN.
1.2 Prerequisites
ActivID AAA Server is up-to-date (version 6.7) with LDAP users and groups already configured.
For OOB authentication (optional):
There is an existing Short Message Peer-to-Peer Protocol (SMPP) gateway to send one-
time-password OOB codes to users.
User phone numbers are declared in a functioning LDAP server.
Palo Alto Networks PAN OS 6.0 and later
GlobalProtect is already installed
HID Global and Palo Alto Networks Integration | Integration Handbook
Identify the authentication method that will be used to authenticate GlobalProtect users. Palo Alto Networks nextgeneration firewalls support local database, LDAP, RADIUS or Kerberos authentication servers for authenticating
users.
In this case we will use the ActivID AAA (Radius Server) for authenticating users.
1. Navigate to Device > Server Profiles > Radius.
2. Specify the ActivID AAA IP address, port and the shared secret.
3. Click OK.
HID Global and Palo Alto Networks Integration | Integration Handbook
The authentication profile refers to the authentication method configured in the previous step. The authentication
profile is then used to associate the authentication method in the GlobalProtect Portal configuration.
To create an authentication profile for the radius users created above:
1. Click on the Device tab
2. From the left pane, click Authentication Profile and click Add.
3. Enter a Name for the profile.
4. Choose the authentication method as RADIUS.
5. Select the HID server created previously (e.g., HID_IDP).
6. Click OK.
HID Global and Palo Alto Networks Integration | Integration Handbook
Important: When you specify a specific group, you must use a specific RADIUS dictionary on the AAA
Server and also create an authorization profile. For more information on this topic, refer to the guide
named 4TRESS_AAA_AdminGuide.pdf, specifically the section called Create a New RADIUS Authorization Profile. Also refer to the following vendor-specific requirements:
https://live.paloaltonetworks.com/docs/DOC-3189.
7. If only certain users groups are authorized, in the “allow list”, specify the groups authorized and remove “all” which is set by default.
2.3 Configuring the SSL VPN Global Protect
You must configure the SSL connection and related attributes in order utilize the GlobalProtect functionality:
Portal - Palo Alto Networks firewall that provides centralized management for the GlobalProtect system.
Gateways - Palo Alto Networks firewalls that provide security enforcement for traffic from GlobalProtect
agents.
The following sections describe the steps for the attributes that must be configured:
2.3.1 Configuring the Security zone
A security zone identifies one or more sources or destination interfaces on the firewall. When you define a
security policy rule, you must specify the source and destination security zones of the traffic.
In our example, we have created “layer 3” zone named “VPN SSL” in order to identify traffic come from
VPN SSL users.
1. To create this zone, click on the tab Network
2. From the left pane, click Zones.
HID Global and Palo Alto Networks Integration | Integration Handbook
Each SSL connection (like a tunnel) is bound to a tunnel interface. It is necessary to assign the tunnel
interface to the same virtual router as the incoming (clear text) traffic. This way, when a packet comes to
the firewall, the route lookup function can determine the appropriate tunnel to use. The tunnel interface
appears to the system as a normal interface, and the existing routing infrastructure can be applied.
In our example, the interface “tunnel.10” will be used for the VPN SSL traffic.
Loading...
+ 18 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.