Find External Dynamic Lists That Failed Authentication
View authentication failures related to external dynamic lists so you can take
resolve them.
Where Can I Use
This?
What Do I Need?
NGFW (Cloud Managed)
NGFW (PAN-OS & Panorama Managed)
Prisma Access (Managed by Strata Cloud Manager)
Prisma Access (Managed by Panorama)
Check for any license or role requirements for the products you're using.
An External Dynamic List (EDL) used for policy enforcement can be hosted either
internally or externally. Your configuration checks your EDLs at your configured
intervals to enable dynamic policy enforcement.
EDLs play a vital role in enriching the threat intelligence of your
configuration by keeping threat data up to date. However, authentication failures
with these lists can disrupt this critical process and potentially impact your
configuration's ability to stay updated with the latest threat intelligence.
Identifying and addressing external dynamic lists (EDLs) that have failed
authentication is necessary for maintaining a reliable and secure network
infrastructure.
Once you’ve identified the EDLs with authentication failures using the
steps below, you’ll be able to take appropriate action to rectify the situation.
This might involve updating the authentication credentials, verifying connectivity
to the authentication server, or addressing any changes in the authentication
mechanism.
Regularly reviewing and addressing authentication failures for EDLs is
crucial for maintaining an effective threat intelligence update mechanism. By
ensuring that the authentication process for EDLs functions smoothly, you can
maximize the potential of your configuration to detect and mitigate emerging
cyberthreats in a timely and proactive manner.
Follow these steps to find external dynamic lists that have failed
authentication.
Find External Dynamic Lists That Failed Authentication (Strata Cloud Manager)
View authentication failures related to external dynamic lists.
When an external dynamic list that requires SSL fails client or server
authentication, you'll see the authentication failure in the EDL Distribution
Status. Typically, if your environment is unable to connect or otherwise fetch the
most current EDL from the server, your configuration retains the last successfully
retrieved list and continues operating with the most recent EDL information until
the connection is restored with the web server hosting the EDL. However, in cases
where authentication to the EDL fails, the Security policy stops enforcing the EDL.
Use the following process to view authentication failures related to external
dynamic lists. Troubleshoot EDLs
Get the status and latest details for the External Dynamic Lists (EDLs) that
you’re using with Prisma Access, and:
Search across EDLs to see if they include a specific IP address, subnet,
or URL
Force an EDL to refresh
To get started, go to ManageConfigurationNGFW and Prisma AccessObjectsExternal Dynamic Lists, set the scope to Remote Networks or
Mobile Users - GlobalProtect, and check the
EDL Status.
Troubleshooting is available only for custom EDLs and not for predefined,
built-in EDLs.
Troubleshoot Site Connections
For troubleshooting purposes, you can now view the routing table for a remote
network site or service connection site. Find the Routing
Information button on the remote networks or service connection
dashboard.
Go to WorkflowsPrisma Access Setup, select either Remote Networks or
Service Connections, and then select Routing InformationShow.
Find External Dynamic Lists That Failed Authentication (PAN-OS & Panorama)
View authentication failures related to external dynamic lists.
When an external dynamic list that requires SSL fails client or server
authentication, the firewall generates a system log of critical severity. The log is
critical because the firewall continues to enforce policy based on the last
successful external dynamic list after it fails authentication, instead of using the
latest version. Use the following process to view critical system log messages
notifying you of authentication failure related to external dynamic lists.
The following warning is displayed when your environment is unable to connect or
otherwise fetch the most current EDL information from the server.
Unable to fetch external list. Using old copy for refresh.
Select MonitorLogsSystem.
Construct the following filters to view all messages related to authentication
failure, and apply the filters. For more information, review the complete
workflow to Filter Logs.
Server authentication failure—(eventid eq
tls-edl-auth-failure)
Review the system log messages. The message description includes the name of
the external dynamic list, the source URL for the list, and the reason for the
authentication failure.
The server that hosts the external dynamic list fails authentication if the
certificate is expired. If you have configured the certificate profile to
check certificate revocation status via Certificate Revocation List (CRL) or
Online Certificate Status Protocol (OCSP), the server may also fail
authentication if:
The certificate is revoked.
The revocation status of the certificate is unknown.
The connection times out as the firewall is attempting to connect to
the CRL/OCSP service.
Verify that you added the root CA and intermediate CA of the server to
the certificate profile configured with the external dynamic list.
Otherwise, the firewall will not authenticate the list properly.
Client authentication fails if you have entered the incorrect username and
password combination for the external dynamic list.