INC_PORTAL_CLIENTLESS_VPN_AUTH_ TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_ALL_PA_LOCATIONS
Focus
Focus
Prisma Access

INC_PORTAL_CLIENTLESS_VPN_AUTH_ TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_ALL_PA_LOCATIONS

Table of Contents

INC_PORTAL_CLIENTLESS_VPN_AUTH_ TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_ALL_PA_LOCATIONS

Learn about the INC_PORTAL_CLIENTLESS_VPN_AUTH_TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_ALL_PA_LOCATIONS incident.

Synopsis

Portal authentication timeout failures are higher than twice the baseline for all
Prisma Access
locations.
Incident Codeā€”INC_PORTAL_CLIENTLESS_VPN_AUTH_TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_ALL_PA_LOCATIONS

Required License

AI-Powered ADEM

Details

Description
Raise condition
The incident is raised at the tenant, when the average authentication timeouts are more than twice the baseline for 45 minutes.
Clear condition
The incident is cleared at the tenant, when the average authentication timeouts are less than twice the baseline for 45 minutes.

Correlated Alerts

  • AL_PORTAL_CLIENTLESS_VPN_AUTH_SUCCESS_COUNT_DROPPED_BELOW_BASELINE_ALL_ PA_LOCATIONS
  • AL_PORTAL_CLIENTLESS_VPN_AUTH_SUCCESS_COUNT_DROPPED_BELOW_BASELINE_ PER_PA_LOCATION
  • AL_PORTAL_CLIENTLESS_VPN_AUTH_TIMEOUT_FAILURES_COUNT_EXCEEDED_ABOVE_ BASELINE_ALL_PA_LOCATIONS
  • AL_PORTAL_CLIENTLESS_VPN_AUTH_TIMEOUT_FAILURES_COUNT_EXCEEDED_ABOVE_ BASELINE_PER_PA_LOCATION

Remediation

Check your authentication service availability on those services.
  • For on-premise authentication services (such as LDAP, Radius, or Kerberos), you can review audit logs for incoming user requests or login errors. If there is a lapse in incoming requests, take packet captures on the relevant network path.
  • For public authentication services (such as SAML or cloud LDAP or Radius services), review audit logs provided by your authentication service. If there is a lapse in incoming requests, check with your authentication provider for any ongoing outages.

Recommended For You