GlobalProtect
Enable Authentication Using Two-Factor Authentication
Table of Contents
Expand All
|
Collapse All
GlobalProtect Docs
-
9.1 (EoL)
- 10.1 & Later
- 9.1 (EoL)
-
-
-
- Deploy App Settings in the Windows Registry
- Deploy App Settings from Msiexec
- Deploy Scripts Using the Windows Registry
- Deploy Scripts Using Msiexec
- SSO Wrapping for Third-Party Credential Providers on Windows Endpoints
- Enable SSO Wrapping for Third-Party Credentials with the Windows Registry
- Enable SSO Wrapping for Third-Party Credentials with the Windows Installer
-
- Mobile Device Management Overview
- Set Up the MDM Integration With GlobalProtect
- Qualified MDM Vendors
-
- Remote Access VPN (Authentication Profile)
- Remote Access VPN (Certificate Profile)
- Remote Access VPN with Two-Factor Authentication
- Always On VPN Configuration
- Remote Access VPN with Pre-Logon
- GlobalProtect Multiple Gateway Configuration
- GlobalProtect for Internal HIP Checking and User-Based Access
- Mixed Internal and External Gateway Configuration
- Captive Portal and Enforce GlobalProtect for Network Access
-
-
- End User Experience
- Management and Logging in Panorama
-
- View a Graphical Display of GlobalProtect User Activity in PAN-OS
- View All GlobalProtect Logs on a Dedicated Page in PAN-OS
- Event Descriptions for the GlobalProtect Logs in PAN-OS
- Filter GlobalProtect Logs for Gateway Latency in PAN-OS
- Restrict Access to GlobalProtect Logs in PAN-OS
- Forward GlobalProtect Logs to an External Service in PAN-OS
- Configure Custom Reports for GlobalProtect in PAN-OS
- Monitoring and High Availability
-
- About GlobalProtect Cipher Selection
- Cipher Exchange Between the GlobalProtect App and Gateway
-
- Reference: GlobalProtect App Cryptographic Functions
-
- Reference: TLS Ciphers Supported by GlobalProtect Apps on macOS Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Windows 10 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Windows 7 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Android 6.0.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on iOS 10.2.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Chromebooks
- Ciphers Used to Set Up IPsec Tunnels
- SSL APIs
-
6.3
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
-
- Download and Install the GlobalProtect App for Windows
- Use Connect Before Logon
- Use Single Sign-On for Smart Card Authentication
- Use the GlobalProtect App for Windows
- Report an Issue From the GlobalProtect App for Windows
- Disconnect the GlobalProtect App for Windows
- Uninstall the GlobalProtect App for Windows
- Fix a Microsoft Installer Conflict
-
- Download and Install the GlobalProtect App for macOS
- Use the GlobalProtect App for macOS
- Report an Issue From the GlobalProtect App for macOS
- Disconnect the GlobalProtect App for macOS
- Uninstall the GlobalProtect App for macOS
- Remove the GlobalProtect Enforcer Kernel Extension
- Enable the GlobalProtect App for macOS to Use Client Certificates for Authentication
-
6.1
- 6.1
- 6.0
- 5.1
-
6.3
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
End-of-Life (EoL)
Enable Authentication Using Two-Factor Authentication
With two-factor authentication, the strongSwan
client needs to successfully authenticate using both a certificate
profile and an authentication profile to connect to the GlobalProtect
gateway. The following workflow shows how to enable authentication
for strongSwan clients using two-factor authentication.
- Set up the IPsec tunnel that the GlobalProtect
gateway will use for communicating with a strongSwan client.
- Select NetworkGlobalProtectGateways.
- Select an existing gateway or Add a new one.
- On the Authentication tab of the GlobalProtect Gateway Configuration dialog, select the Certificate Profile and Authentication Profile that you want to use.
- Select AgentTunnel Settings to enable Tunnel Mode and
specify the following settings to set up the tunnel:
- Select the check box to Enable X-Auth Support.
- If a Group Name and Group Password are already configured, remove them.
- Click OK to save these tunnel settings.
- Verify that the default connection settings in the conn
%default section of the IPsec tunnel configuration file (ipsec.conf)
are correctly defined for the strongSwan client.The ipsec.conf file usually resides in the /etc folder.The configurations in this procedure are tested and verified for the following releases:
- Ubuntu 14.0.4 with strongSwan 5.1.2 and CentOS 6.5 with strongSwan 5.1.3 for PAN-OS 6.1.
- Ubuntu 14.0.4 with strongSwan 5.2.1 for PAN-OS 7.0.
Use the configurations in this procedure as a reference if you are using a different version of strongSwan. Refer to the strongSwan wiki for more information.Configure the following recommended settings in the ipsec.conf file:ikelifetime=20m reauth=yes rekey=yes keylife=10m rekeymargin=3m rekeyfuzz=0% keyingtries=1 type=tunnel
- Modify the strongSwan client’s IPsec configuration file
(ipsec.conf) and the IPsec password file (ipsec.secrets) to
use recommended settings.The ipsec.secrets file is usually found in the /etc folder.Use the strongSwan client username as the certificate’s common name.Configure the following recommended settings in the ipsec.conf file:
conn <connection name> keyexchange=ikev1 authby=xauthrsasig ike=aes-sha1-modp1024 esp=aes-sha1 xauth=client left=<strongSwan/Linux-client-IP-address> leftcert=<client-certificate-without-password> leftsourceip=%config right=<GlobalProtect-gateway-IP-address> rightid=%anyCN=<Subject-name-of-gateway-cert>” rightsubnet=0.0.0.0/0 leftauth2=xauth xauth_identity=<LDAP username> auto=add
Configure the following recommended settings in the ipsec.secrets file:<username> :XAUTH “<user password>” ::RSA <private key file> “<passphrase if used>”
- Start strongSwan IPsec services and connect to the IPsec
tunnel that you want the strongSwan client to use when authenticating
to the GlobalProtect gateway.
- Ubuntu:
ipsec start ipsec up <name>
- CentOS:
strongSwan start strongswan up <name>
- Verify that the tunnel is set up correctly and the VPN
connection is established to both the strongSwan client and the
GlobalProtect gateway.
- Verify the detailed status information on
a specific connection (by naming the connection) or verify the status
information for all connections from the strongSwan client:
- Ubuntu:
ipsec statusall [<connection name>]
- CentOS:
strongswan statusall [<connection name>]
- Select NetworkGlobalProtectGateways. In the Info column, select Remote Users for the gateway configured for the connection to the strongSwan client. The strongSwan client should be listed under Current Users.
- Verify the detailed status information on
a specific connection (by naming the connection) or verify the status
information for all connections from the strongSwan client: