Symantec Vip Integration Guide For Palo Alto Networks Globalprotect VPN
Symantec Vip Integration Guide For Palo Alto Networks Globalprotect VPN
Symantec Vip Integration Guide For Palo Alto Networks Globalprotect VPN
GlobalProtect VPN
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Table of Contents
About integrating Palo Alto Networks GlobalProtect VPN with Symantec VIP............................. 3
Scope of document..........................................................................................................................................................3
Supported platforms........................................................................................................................................................ 3
Supported VIP features................................................................................................................................................... 3
Authentication method: User ID–LDAP Password–Security Code.............................................................................4
Integrating GlobalProtect with VIP Enterprise Gateway..................................................................7
Installing GlobalProtect................................................................................................................................................... 7
Installing and configuring VIP Enterprise Gateway..................................................................................................... 7
Configuring GlobalProtect to integrate with the VIP integration module.................................................................. 8
Configuring the authentication server and profile.......................................................................................................8
Creating the RADIUS server profile.................................................................................................................... 9
Creating an authentication profile......................................................................................................................10
Configuring the GlobalProtect Gateway................................................................................................................... 10
Creating a gateway............................................................................................................................................11
Specifying network settings to connect to the gateway.................................................................................... 12
Specifying authentication information for the gateway......................................................................................12
Configuring the GlobalProtect Gateway............................................................................................................ 13
Setting advanced configurations...............................................................................................................................14
Enabling VIP Access Push................................................................................................................................ 15
Enabling selective strong authentication........................................................................................................... 15
Testing the integration...............................................................................................................................................16
Hardware and VIP Access Credential Authentication....................................................................................... 17
SMS or Voice authentication............................................................................................................................. 17
VIP Access Push authentication........................................................................................................................18
Troubleshooting the integration....................................................................................................... 19
Copyright Statement.......................................................................................................................... 20
2
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Scope of document
Symantec’s Validation and ID Protection (VIP) Enterprise Gateway enables your organization's employees and associates
to use the strong authentication capabilities that VIP Services provides, along with their enterprise directory authentication
credentials.
This document is intended to assist system administrators of VIP Enterprise Gateway working with Palo Alto Networks
GlobalProtect to enable two-factor authentication capabilities. This document describes how to integrate Palo Alto
Networks GlobalProtect with VIP Enterprise Gateway 9.8 or later to enable two-factor authentication for users who access
your protected resources. If you have Symantec VIP Enterprise Gateway 9.7 or earlier, then download the pre-9.8 version
document from the Account > Download Files link in VIP Manager.
Supported platforms
Table 1: Supported platforms
3
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
First-factor authentication
AD/LDAP password through VIP Enterprise Gateway Yes
VIP PIN No
Second-factor authentication
VIP Push Yes
SMS Yes
Voice Yes
Selective Strong authentication
End user-based Yes
Risk-based No
General authentication
Multi-domain Yes
Anonymous user name Yes
Legacy authentication provider integration (delegation) Yes
AD password reset Yes
Integration Method
VIP JavaScript No
VIP Login No
RADIUS Yes
4
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Step Action
1 The user enters a user name, password, and a security code on GlobalProtect client. The GlobalProtect client sends the
user name, password, and the security code to GlobalProtect server.
2 The GlobalProtect server sends the user name, password, and the security code to VIP Enterprise Gateway.
5
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Step Action
3 As the first part of the two-factor authentication process, the VIP Enterprise Gateway Validation server authenticates the
user name and the password against your user store. For example, if AD/LDAP is the user store, the Validation server
authenticates the user name and the password against AD/LDAP.
4 As the second part of the two-factor authentication process, VIP Enterprise Gateway authenticates the user name and
the security code with the VIP Service.
5 If the user name and the security code are successfully authenticated, VIP Enterprise Gateway returns an Access-
Accept Authentication response to the GlobalProtect server.
6 Based on the Access-Accept Authentication response, the GlobalProtect server gives the user access to the
protected resource.
6
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Step Task
Installing GlobalProtect
Before you integrate GlobalProtect with Symantec VIP for second-factor authentication, you must install the GlobalProtect
server and ensure that the first factor works. That is, ensure that the application is configured with LDAP and a user is
able to log into the application with a user name and password. For more information, refer to the Palo Alto Networks
GlobalProtect documentation.
7
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Optionally, if you want to authorize the user according to the LDAP Groups, configure the LDAP–RADIUS mapping
in the Validation server.
• Click Continue.
Table 5: Steps for integrating GlobalProtect with the VIP integration module
Step Task
Step Task
8
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
9
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
10
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Step Task
1 Create a gateway.
See Creating a gateway.
2 Specify network settings to connect to the gateway.
See Specifying network settings to connect to the gateway.
3 Specify authentication information for the gateway.
See Specifying authentication information for the gateway.
4 Configure the GlobalProtect Gateway.
See Configuring the GlobalProtect Gateway.
Creating a gateway
1. Select Network > GlobalProtect > Gateways.
2. Select an existing gateway to update, or create a new gateway:
• Click Add to create a new gateway.
• On the General tab (GlobalProtect Gateway Portal page), enter a name for the gateway.
11
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
12
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
13
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
14
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Step Task
15
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
16
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
• Hardware and VIP Access Credential: In this method, your users generate a security code on their hardware or VIP
Access credential. Your users enter that security code, along with their user name and password, to access protected
resources.
See Hardware and VIP Access Credential Authentication.
• SMS or Voice: If you have configured out-of-band authentication in the VIP Enterprise Gateway validation server
and in VIP Manager, then VIP sends a security code is sent to the registered mobile devices of your users over SMS
or a Voice call. Your users enter that security code, along with their user name and password, to access protected
resources.
See SMS or Voice authentication.
• VIP Access Push: If you have enabled VIP Access Push authentication in the VIP Enterprise Gateway validation
server, in VIP Manager, and in the GlobalProtect Portal, VIP sends a VIP Push notification message to the registered
VIP Access credential on your users mobile devices. The user enters a user name and password, and then taps Allow
on the device to perform second-factor authentication and access protected resources.
See VIP Access Push authentication.
You must have enabled and provisioned these authentication methods in VIP Manager to test them.
17
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
After successful authentication, you can access the protected network resource.
18
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Issues Solution
The log file contains the error message, Authentication Use one of the following solutions:
failed with incorrect LDAP static password. • Password may be locked or it may have expired. Reset the
password.
• Make sure that the RADIUS shared secret set in the VIP
Enterprise Gateway Validation server and the application are
the same.
Authentication fails even before you get the SMS or Voice security Make sure that you set the Timeout field to 20 seconds and the
code or the Push notification on the registered mobile device. Retries field to 3 when configuring the RADIUS Server in the
application. If the Retries field is unavailable, set the Timeout
field to a minimum of 60 seconds.
For additional troubleshooting help, review the log entries in the System tab on the Palo Alto Networks GlobalProtect
Gateway portal dashboard. Optionally, review the authd.log file generated by the GlobalProtect Gateway.
See the Palo Alto Networks GlobalProtect Gateway documentation for more details on these logs.
19
Symantec VIP Integration Guide for Palo Alto Networks GlobalProtect VPN
Copyright Statement
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom.
Copyright ©2020 Broadcom. All Rights Reserved.
The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit
www.broadcom.com.
Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability,
function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does
not assume any liability arising out of the application or use of this information, nor the application or use of any product or
circuit described herein, neither does it convey any license under its patent rights nor the rights of others.
20