<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Fine tuning on tacacs+ authentication in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fine-tuning-on-tacacs-authentication/m-p/197196#M36829</link>
    <description>&lt;P&gt;Hi CheckMates,&lt;/P&gt;&lt;P&gt;I've configured tacacs+ on my gateways and it's working properly.&lt;/P&gt;&lt;P&gt;However, when the user type a bad password, the account is locked instantly on AD.&lt;/P&gt;&lt;P&gt;The gateway is retrying the same authentication with bad credentials, until the user got blocked.&lt;/P&gt;&lt;P&gt;I would like to know, if is there any fine tuning on tacacs configuration in the gateways to avoid this problem.&lt;/P&gt;&lt;P&gt;I'm using 2 tacacs servers with 60s of timeout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Nov 2023 14:48:35 GMT</pubDate>
    <dc:creator>cassiomaciel</dc:creator>
    <dc:date>2023-11-06T14:48:35Z</dc:date>
    <item>
      <title>Fine tuning on tacacs+ authentication</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fine-tuning-on-tacacs-authentication/m-p/197196#M36829</link>
      <description>&lt;P&gt;Hi CheckMates,&lt;/P&gt;&lt;P&gt;I've configured tacacs+ on my gateways and it's working properly.&lt;/P&gt;&lt;P&gt;However, when the user type a bad password, the account is locked instantly on AD.&lt;/P&gt;&lt;P&gt;The gateway is retrying the same authentication with bad credentials, until the user got blocked.&lt;/P&gt;&lt;P&gt;I would like to know, if is there any fine tuning on tacacs configuration in the gateways to avoid this problem.&lt;/P&gt;&lt;P&gt;I'm using 2 tacacs servers with 60s of timeout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2023 14:48:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fine-tuning-on-tacacs-authentication/m-p/197196#M36829</guid>
      <dc:creator>cassiomaciel</dc:creator>
      <dc:date>2023-11-06T14:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Fine tuning on tacacs+ authentication</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fine-tuning-on-tacacs-authentication/m-p/197250#M36830</link>
      <description>&lt;P&gt;What version/JHF?&lt;BR /&gt;What functionality is TACACS+ configured to provide authentication for?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2023 23:12:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fine-tuning-on-tacacs-authentication/m-p/197250#M36830</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-11-06T23:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: Fine tuning on tacacs+ authentication</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fine-tuning-on-tacacs-authentication/m-p/197347#M36871</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;All gateways are in R81.10 with JHF 95 or JHF 110, also I've a mix of maestro and traditional clusters.&lt;/P&gt;&lt;P&gt;We're using TACACS+ to authenticate users by console via ssh and gaia via https.&lt;/P&gt;&lt;P&gt;We configured the roles TACP-0 with a few features in read-only and some custom commands and TACP-15 with all features in read-write.&lt;/P&gt;&lt;P&gt;On my TACACS+ server, I noticed 2 attempts in a row, coming from the gateway with a difference of 6s or less, the gateway is trying to authenticate on both servers, that result in 4 failed authentications.&lt;/P&gt;&lt;P&gt;Our password policy on AD, block the user with 3 failed attemtps.&lt;/P&gt;&lt;P&gt;is it expected to gateway try authenticate the user twice?&amp;nbsp;Is there any configuration that I can do or is better to open a case with TAC?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 19:25:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fine-tuning-on-tacacs-authentication/m-p/197347#M36871</guid>
      <dc:creator>cassiomaciel</dc:creator>
      <dc:date>2023-11-07T19:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: Fine tuning on tacacs+ authentication</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fine-tuning-on-tacacs-authentication/m-p/197361#M36872</link>
      <description>&lt;P&gt;Not sure if it should be trying to authenticate on both TACACS+ servers.&lt;BR /&gt;A TAC case is probably warranted here: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 20:36:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fine-tuning-on-tacacs-authentication/m-p/197361#M36872</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-11-07T20:36:21Z</dc:date>
    </item>
  </channel>
</rss>

