Palo Alto
  Download PDF

How To Enable OpenOTP Authentication in Palo Alto SSL VPN

This document explains how to enable OpenOTP authentication in Palo Alto SSL VPN.

1. Register your Palo Alto VPN in RadiusBridge

On your OpenOTP RadiusBridge server, edit the /opt/radiusd/conf/clients.conf and add a RADIUS client (with IP address and RADIUS secret) for your Palo Alto VPN server.

Example:

client <VPN Server IP> {
	secret = testing123
	shortname = PaloAlto-VPN
	}

2. On Palo Alto Admin Interface, Set up a RADIUS Server Profile

Enter the Palo Alto administration interface.

Go to DeviceServer ProfilesRADIUS.

Click the Add button, to add a new RADIUS server profile.

Configure the profile settings with:

  • Name: OpenOTP RADIUS
  • Timeout: 20
  • Retries: 0

Under Servers click the Add button to add a RADIUS server.

Configure server settings with:

  • Server: OpenOTP
  • IP Address: Your RadiusBridge IP address.
  • Secret: The secret you have defined in RB clients.conf file.
  • Port: 1812

Save the RADIUS server profile.

3. Create an Authentication Profile

Go to Device->Authentication Profile.

Client the New button to add a new authentication profile.

Configure settings with:

  • Profile Name: OpenOTP
  • Authentication: RADIUS
  • Server Profile: OpenOTP RADIUS

Save the authentication profile.

4. Configure your SSL VPN with OpenOTP

Go to NetworkSSL-VPN.

Edit your VPN profile or create a new one.

Set the Authentication Profile to “OpenOTP”.

Save the SSL-VPN profile.

Click the Commit button at the top-right to apply new configurations.

Note

Don’t forget to authorize the communication on 1812 UDP port (default RADIUS port for the authentication) from your Palo-Alto system to your WebADM instance at the firewall level.