tech note Palo Alto Networks Next- Generation Firewall and



Similar documents
Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i

GlobalProtect Configuration for IPsec Client on Apple ios Devices

solution guide DLNA, AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS

Palo Alto Networks User-ID Services. Unified Visitor Management

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright Palo Alto Networks

Configuring User Identification via Active Directory

ARUBA NETWORKS DESIGNS AND DELIVERS MOBILITY-DEFINED NETWORKS THAT EMPOWER A NEW GENERATION OF TECH-SAVVY USERS

QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i

About the VM-Series Firewall

User-ID Best Practices

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Qualys API Limits. July 10, Overview. API Control Settings. Implementation

User-ID. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

Setting Up Scan to SMB on TaskALFA series MFP s.

User-ID Configuration

Device Management. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Aruba-Certified Design Expert (ACDX) Study Guide

Configuring SSL VPN on the Cisco ISA500 Security Appliance

WildFire Cloud File Analysis

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Help Desk Guide. Enterprise Troubleshooting WLAN Issues with AirWave Wireless Management Suite

GlobalProtect Features

Installation Steps for PAN User-ID Agent

NEFSIS DEDICATED SERVER

CLEARPASS ONGUARD CONFIGURATION GUIDE

Configuring PA Firewalls for a Layer 3 Deployment

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Sonian Getting Started Guide October 2008

WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B

White paper. Tunneled Internet Gateway

Sample Configuration: Cisco UCS, LDAP and Active Directory

The ArubaOS Spectrum Analyzer Module

Deployment Guide for Citrix XenDesktop

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

User Identification (User-ID) Tips and Best Practices

CloudOYE CDN USER MANUAL

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

THE ARUBA ADAPTIVE TRUST DEFENSE FOR SECURE ENTERPRISE MOBILITY

ClearPass Policy Manager 6.x

Finding Your MAC (Ethernet) Address All Device Types

WI-FI PERFORMANCE BENCHMARK TESTING: Aruba Networks AP-225 and Cisco Aironet 3702i

Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

CLEARPASS EXCHANGE: SHARE RICH, CONTEXTUAL DATA TO BUILD A COORDINATED AND ADAPTIVE MOBILITY DEFENSE

Configuring GlobalProtect Tech Note PAN-OS 4.1

Introduction to Mobile Access Gateway Installation

Getting Started Guide

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

F-Secure Messaging Security Gateway. Deployment Guide

Installing and Configuring vcenter Support Assistant

Driving Operational Efficiency: A Guide to Using AirWave Wireless Management Suite for Service Desk Troubleshooting

Defender Token Deployment System Quick Start Guide

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

IT Quick Reference Guides How to Find Your MAC Address

GlobalProtect Overview

BlackBerry Enterprise Service 10. Version: Configuration Guide

2X SecureRemoteDesktop. Version 1.1

10/ English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

Citrix Receiver for Mobile Devices Troubleshooting Guide

Using Logon Agent for Transparent User Identification


Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

HTTP 1.1 Web Server and Client

Sophos Mobile Control Administrator guide. Product version: 3.6

Managing Qualys Scanners

Request Manager Installation and Configuration Guide

SSL-VPN 200 Getting Started Guide

WildFire Cloud File Analysis

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

XStream Remote Control: Configuring DCOM Connectivity

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

How to Access Coast Wi-Fi

Phone Inventory 1.0 (1000) Installation and Administration Guide

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Manage Licenses and Updates

How to Configure Captive Portal

Web Application Firewall

Mobile Device Management Version 8. Last updated:

Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment

NSi Mobile Installation Guide. Version 6.2

CA Spectrum and CA Service Desk

Architecting User Identification (User-ID) Deployments

Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page

Installing and Configuring vcloud Connector

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

About the VM-Series Firewall

Configuring Global Protect SSL VPN with a user-defined port

CA Nimsoft Monitor. Probe Guide for Apache HTTP Server Monitoring. apache v1.5 series

solution guide Deploying Aruba Wireless Controllers with

The data between TC Monitor and remote devices is exchanged using HTTP protocol. Monitored devices operate either as server or client mode.

User Guide. Cloud Gateway Software Device

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA USA. August v1.0

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Transcription:

Palo Alto Networks Next- Generation Firewall and Aruba WLAN Integration

Table of Contents Overview Why is this Integration Important? Aruba Controller and Palo Alto Networks Firewall Integration Details Aruba Instant and Palo Alto Networks Firewall Integration Details Appendix A Sample Configurations Appendix B Verification Commands About Aruba Networks, Inc. 3 3 4 7 9 16 22

Overview This document is intended to help field engineering, customers, and channel partners integrate Aruba Networks Mobility Controllers and Aruba Instant Wi-Fi Access Points with the Palo Alto Networks next-generation firewall and its central management system, Panorama. The document details the configurations required on the Aruba controllers and Instant Access Points to integrate with Palo Alto Networks firewalls. This document assumes that the reader has a working knowledge of the Aruba platforms. Why is this Integration Important? Palo Alto Networks next-generation firewall offers a wide variety of contextual security for all users including the safe enablement of applications. By looking beyond simple IP address or TCP port firewall rules to actual application payload, and taking into account who the user of the application is, Palo Alto Networks is able make intelligent, policy-driven decisions that adapt to today s evolving network security needs. As an example of safe application enablement, it s no longer acceptable to just deny Twitter or deny Facebook access. Many organizations use social networking Web sites to advertise their products, solutions, and activities. Social networking has become an accepted marketing tool and many companies now opt to use this as a mainstream part of their marketing efforts. Today, enterprises need to make decisions based upon users and associated permissions. For this to happen, the firewall needs to correlate the user with their assigned IP address. The challenge is finding meaningful sources of user information covering the full spectrum of network activity, including known users, guests and other non-enterprise classified users. The Aruba Palo Alto Networks integration aims to solve this problem. Through the integration with the Aruba Controllers and Aruba Instant Wi-Fi Access Points, Aruba provides mobile user context (usernames, IP addresses, and device types) to the Palo Alto Network next generation firewall for all authenticated users and guest as well as their devices including information gathered about shared resource devices like printers and scanners. The Palo Alto Networks User-Id feature can now leverage this integration to resolve the username to IP address mapping for all wireless users from an Aruba WLAN solution (controllers and Instant Access Points), thus simplifying the deployment significantly by reducing the number of integration sources the firewall would ordinarily require to obtain the same set of information. This integration also helps identify and secure guest users, devices like printers, projectors, scanners, and BYOD devices which would otherwise be undistinguishable from one another because of their transient nature and the lack of user information associated to them. Exposing this information to the Palo Alto Networks firewall allows security administrators to use more granular controls when securing today s mobile enterprise networks. This is further compounded when considering enterprise mobility trends like bring your own device (BYOD), guest network access and the use of shared networked resources like Wi-Fi enabled printers, projectors, Apple TVs, lights and alarms. In most cases, security for these devices is handled differently than that of enterprise-owned devices making it even more difficult to get meaningful data. 3

Aruba Controller and Palo Alto Networks Next-Generation Firewall Integration Details Sample Network Topology Figure 1: Aruba Networks Controller and Palo Alto Networks Integration Overview Software and Hardware Requirements The minimum software version required on Aruba Mobility Controller is AOS v6.4.the recommended minimum software version on the Palo Alto Networks next-generation firewall is PAN-OS 5.0.0, released in November 2012. However, it is recommended that you regularly review software updates to utilize the benefits from the latest fixes and feature updates. Note: The integration is not currently supported under the following conditions: On APs deployed in bridged forwarding mode On 600 series controllers or the model 3200 controller Update Messages from the Aruba Controller to the Firewall Using the PAN-OS XML API, the Aruba Controller sends the following update messages to the Palo Alto Network next generation firewall for every client that connects to the WLAN Logon event when a client connects to the wireless network with the client username, IP address and device type if available. Login update event with client username, IP address and device type, if the controller determines a device type Keep alive event if the user is active on the controller for more than 45 minutes. The age out time on the firewall is 45 minutes and the keep-alive messages are required to maintain the client entries on the firewall. Logout event with the client name and IP address when the client disconnects from the wireless network 4

The Palo Alto Networks next-generation firewall uses this information to associate the particular user and device with firewall policy. User-ID associates the user at a particular IP address and determines which applications the user may access. The device characteristics are mapped to a Host Information Profile (HIP) which is also used as part of the firewall policy criteria. Pre-configurations on the Palo Alto Networks Firewall Before the Palo Alto Networks integration is completed on the controller, the following configurations must be completed on the Palo Alto Networks firewall Admin Account An Admin account must be created on the Palo Alto Networks firewall to allow the controller to send data to it. The built-in Admin account can be used for this purpose but that is not recommended. It is better to create a new Admin account used solely for the purpose of communications between the controller and Palo Alto Networks firewall. User-ID Support To utilize the full potential of the integration, the firewall policies on the Palo Alto Networks firewall should be configured to accommodate user-names and/or user-groups. Device-Type Based Policy Support Pre-configuration of the Palo Alto Networks Host Information Profile (HIP) objects and HIP-profiles on the Palo Alto Networks Firewall are required to support device-type based policies on the firewall. The controller can identify a limited set of device types. The identified device type associated with each IP user will be sent to the Palo Alto Networks firewall in the clientversion field with the host-info category of the HIP-report. In order to leverage the device type information on the firewall, it is necessary to create HIP objects, which filter the HIP-reports sent from the controller. The following table lists the HIP objects with specific Is Value in the Client Version field, which must be preconfigured on the Palo Alto Networks firewall for device-type based policies to work. HIP Objects Client Version Is Value Android webos Apple TV Win 2000 BlackBerry Win 7 Chrome OS Win 8 ipad Win 95 iphone Win 98 ipod Win CE Kindle Windows Linux Windows Mobile Nintendo 3DS Windows Phone 7 Nintendo Wii Win ME Nook Win NT OS X Win Server PS3 Win Vista PSP Win XP PS Vita Apple RIM Tablet PlayStation Roku Nintendo Symbian NOTE: Please refer to the Palo Alto Networks next generation firewall configuration guides for additional information on how to configure the firewall. 5

Controller Configuration on AOS 6.4 Creating the Server Profile for Palo Alto Network on the Controller The first step in configuring the Palo Alto Networks firewall integration is to create a server profile for Palo Alto Networks on the controller. This profile provides the controller with the information required for connecting to and interacting with the specified Pal Alto Networks firewall. Parameter Host (IP or hostname) Post (1-65535) Username Description The hostname or IP address of Palo Alto Networks Firewall The port used by the firewall (default value is 443) The username matching the Admin Account on the Palo Alto Networks firewall (1-255 bytes in length) The Palo Alto Networks Servers profile has to be created on the Master controller. Multiple profiles can simultaneously exist on the master controller but only one profile can be active per controller at any given time. The profiles are activated locally on each controller. Using Web UI: To configure a new Palo Alto Networks profile, 1. Navigate to Configuration > Advanced Services > All Profiles > Other Profiles > Palo Alto Networks Servers 2. Type the name of the profile and click Add 3. Click on the name of the profile created to open the Profile Details window 4. Enter the Host (IP address or hostname) of the Palo Alto Networks firewall 5. Enter the Port (1 65535) of the Palo Alto Networks Firewall Note: The port used by default is 443 6. Enter the Username of the Palo Alto Networks firewall. The user name is between 1 and 255 bytes in length and must match the Admin Account previously created on the Palo Alto Networks firewall. Note: Refer to section 3.3 7. Enter the Password of the username in Palo Alto Networks Firewall. The password is between 6 and 100 bytes in length and must match the password of the Admin account previously created on the Palo Alto Networks firewall. 8. Re-enter the Password entered in the previous step 9. Click Add 10. Click Apply In 6.4, each Palo Alto Network Server profile can support up to 20 Palo Alto firewall configurations Password Using CLI: (host)(config) #pan profile <profile-name> firewall host <host> port <port> username <username> passwd <password> Activating the Palo Alto Networks profile Once a Palo Alto Networks Server profile has been created, the profile must be activated. Select profile you want to activate from the list of configured profiles. Although multiple profiles can be created, only one profile can be active at one time. Note: This configuration must be completed on each local controller. Using the Web UI To apply a Palo Alto Networks Server profile on the local controller, complete the following steps: 1. Navigate to Configuration > Advanced Services > All Profiles > Other Profiles > Palo Alto Networks Active. 2. Select Active Palo Alto Networks. To the right of this link, the name of the active profile is displayed. 3. Other configured profile can be selected from the Active Palo Alto Networks Profile > drop-down menu. To configure a new profile, select NEW from the drop down menu and complete the configuration details. 4. Once a profile is selected from the drop-down menu or a new profile is created, click Apply. Using the CLI Password match the password used for the Admin account on the Palo Alto Networks firewall (host)(config) #pan active-profile profile <profile- name> 6

Enabling the Palo Alto Networks Firewall Integration Once the Palo Alto Networks Server profile is configured, it needs to be enabled on the AAA profile being used for the client authentication Using Web UI: To enable a Palo Alto Netwokrs firewall integration in the AAA profile: 1. Navigate to Configuration > Security > Authentication > AAA Profiles page 2. In the AAA Profiles Summary, select the desired profile 3. Check the PAN firewalls Integration check box 4. Click Apply Using CLI: (host)(config) #aaa profile <aaa profile-name> pan-integration Enabling a Palo Alto Networks Profile Integration for VIA Clients For VIA clients, the Palo Alto Networks firewall integration must be enabled on the VIA authentication profile that the client is associated with. Using WebUI: To enable Palo Alto Networks firewall integration for VIA clients: 1. Navigate to Configuration > Security > Authentication > L3 Authentication page 2. In the profiles list on the left, click VIA Authentication and select the desired profile. 3. Check the PAN firewalls Integration check box 4. Click Apply Using CLI: (host)(config) #aaa authentication via auth-profile <profile-name> pan-integration Enabling Palo Alto Networks Profile Integration for VPN Clients For VPN clients, the Palo Alto Networks firewall integration must be enabled on the VPN authentication profile that the client is associated with. Using WebUI: To enable Palo Alto Networks firewall integration for VPN clients: 1. Navigate to Configuration > Security > Authentication > L3 Authentication page 2. In the profiles list on the left, click VPN Authentication and select the desired profile. 3. Check the PAN firewalls Integration check box 4. Click Apply Using CLI: (host)(config) #aaa authentication vpn default pan-integration Aruba Instant and Palo Alto Networks Firewall Integration Details Sample Network Topology Figure 2: Aruba Networks Instant AP and Palo Alto Networks Integration Overview 7

Software and Hardware Requirements The minimum software version required on Aruba Instant AP is 6.3.1.1-4.0. The recommended minimum software version on the Palo Alto Networks next-generation firewall is PAN-OS 5.0.0, released in November 2012. However, it is recommended that you regularly review software updates to utilize the benefits from the latest fixes and feature updates. Update Messages from the Aruba Instant to the Firewall In a single AP environment, the Aruba Instant access point directly communicates with the Palo Alto Networks nextgeneration firewall using the PAN-OS XML API. However, in a multi-ap environment with more than one AP in a cluster, the virtual controller communicates with the Palo Alto Networks firewall using the API. B. Enter the Port (1 65535) of the Palo Alto Networks Firewall Note: The port used by default is 443 C. Enter the Username of the Palo Alto Networks firewall. The user name is between 1 and 255 bytes in length and must match the Admin Account previously created on the Palo Alto firewall. Note: Refer to section 3.3 D. Enter the Password of the username in the Palo Alto Networks Firewall. The password is between 6 and 100 bytes in length and must match the password of the Admin account previously created on the Palo Alto Networks firewall. 4. Click OK The following update messages to the Palo Alto Networks next-generation firewall for every client that connects to the WLAN Logon event when a client connects to the wireless network with the client username and IP address Login update event with client username and IP address Keep alive event if the user is active on the controller for more than 45 minutes. The age out time on the firewall is 45 mins and the keep alive message is required to maintain the client entry on the firewall. Logout event with the client name and IP address when the client disconnects from the wireless network Parameter Host (IP or hostname) Post (1-65535) Username Password Description The hostname or IP address of Palo Alto Networks Firewall The port used by the firewall (default value is 443) The username matching the Admin Account on the Palo Alto Networks firewall (1-255 bytes in length) Password match the password used for the Admin account on the Palo Alto Networks Firewall Pre-configurations on the Palo Alto Networks Next- GenerationFirewall Please refer to section 3.4 on the pre-configurations required on the Palo Alto Networks firewall. Instant AP Configuration on 6.3.1.1-4.0 To enable the API communication between the Aruba Instant AP and the Palo Alto Networks next-generation firewall, the following need to be configured on the Aruba Instant AP. Using Web UI: 1. Navigate to More > Services. The Services window is displayed 2. Click on the Network Integration tab. The Palo Alto firewall configuration options are displayed. 3. Select the Enable checkbox to enable the Palo Alto Networks firewall A. Enter the Host (IP address or hostname) of the Palo Alto Networks firewall Using CLI: (Instant Access Point)(config)# firewallexternal-enforcement pan (Instant Access Point)(firewall-externalenforcement pan)# enable (Instant Access Point)(firewall-externalenforcement pan)# ip <ip-address> (Instant Access Point)(firewall-externalenforcement pan)# port <port> (Instant Access Point)(firewall-externalenforcement pan)# user <name> <password> (Instant Access Point)(firewall-externalenforcement pan)# end (Instant Access Point)# commit apply 8

Appendix A Sample Configurations Network Topologies Test topology used to validate the Aruba controller and Palo Alto Networks firewall integration Figure 3: Controller Setup Clients and devices used in testing the setup User Name IP Address Device Type Auth Used iphone-user 10.68.105.24 iphone 802.1x-EAP-PEAP ipad-user 10.68.105.26 ipad 802.1x-EAP-PEAP 9

Test Topology used to validate the Aruba Instant and Palo Alto Networks firewall integration Figure 4 Aruba Instant Setup User Name IP Address Device Type Auth Used iphone-user 172.31.99.107 iphone 802.1x-EAP-PEAP ipad-user 172.31.98.58 ipad 802.1x-EAP-PEAP 10

Configurations the Palo Alto Networks firewall to support the integration Sample Setup Step 1. Configuring the Admin Account on the Palo Alto Networks firewall (PAN-500, 10.2.100.10) A. Logon to the Palo Alto Networks firewall WebUI using the root admin account B. Navigate to Devices tab C. From the menu on the right, select Administrators D. Click Add and enter the Account information (name, password, role). In this example the username used was pan-test-user and the role selected was Device administrator E. Commit the changes and logout Step 2. Create the HIP Object entry on the Palo Alto Networks next-generation firewall Manually create a HIP Object Entry for every Client Version listed in Table 1, Section 3.3 Figure 5: Adding an Admin Account to Palo Alto next-generation firewall 11

Figure 6: Adding HIP Objects in a Palo Alto Networks next-generation firewall HIP objects can also be created using the CLI on the Palo Alto Networks firewall. pan-test-user@pa-500> configure terminal Entering configuration mode [edit] pan-test-user@pa-500# set profiles hip-objects iphone host-info criteria client-version is iphone Step 3. Ensure that User-Id support is enabled on the Palo Alto Networks firewall Please refer to the Palo Alto Networks support site or configuration guides for User-Id support NOTE: The first three steps are samples of the Palo Alto Networks configurations. Please refer to the Palo Alto Networks support site or the Palo Alto Networks firewall configurations guides for information on configuring the firewall. pan-test-user@pa-500# set profiles hip-objects ipad host-info criteria client-version is ipad 12

Configuring the Aruba Mobility Controller Sample Setup Refer to Network Topology Diagram in Section 5.1.1 For the purpose of this example, only one controller was used. This controller serves the role of the master and local controller. Step 1. Create a Palo Alto Networks Server profile on the controller for the Palo Alto Networks firewall PAN-500 A. Navigate to Configuration > Advanced Services > All Profiles > Other Profiles > Palo Alto Networks Servers B. Type the name of the profile, PAN-500, and click Add C. Click on PAN-500 to open the Profile Details window D. Enter the Admin Account information created in Step 1, Section 4.2 Host: 10.2.100.10 Port: 443 (default) User Name: pan-test-user Password: ********** Retype Password: ********** Figure 7 Step 2. Activate the Palo Alto Networks Server profile on the controller. In this example, the master and the local controller are the same, so the PAN-500 profile is activated on the Controller- PAN-Test Controller A. Navigate to Configuration > Advanced Services > All Profiles > Other Profiles > Palo Alto Networks Active B. Select Active Palo Alto Networks C. Click on the drop down menu corresponding to Active Palo Alto Networks Profile D. Select the PAN-500 profile that was created in Step 1 Section 4.3 Figure 8 13

Step 3. Enabling the Palo Alto Networks firewall Integration on the active AAA profiles. To ensure that the client information (username, IP address and device type) is passed on from the controller to the firewall, it is required to enable the PAN firewall Integration checkbox on all active AAA profiles used on the controller to authenticate the clients. B. In the AAA Profiles Summary, select the PAN-Test-Employee-aaa_prof profile. C. Check the PAN Firewalls Integration check box. In this example the VIA clients and VPN client support were not configured on this controller. In this example, PAN-Test-Employee-aaa_prof is a preconfigured AAA profile used for user authentication on the Controller- PAN-Test Controller. A. Navigate to the Configuration > Security > Authentication > AAA Profiles page. Figure 8 14

Configuring the Aruba Instant AP Sample Setup Refer to Network Topology Diagram in Section 5.1.2 For the purpose of this example, only one Instant AP was used. Step 1. Create a Palo Alto Networks global profile on the Instant AP Virtual Controller (PAN-Test-Controller) for the Palo Alto Networks firewall A. Navigate to More > Services C. Enter the Admin Account information created in Step 1, Section 2.2 Host: 10.2.100.10 Port: 443 (default) User Name: pan-test-user Password: ********** Retype Password: ********** B. The Services window will appear, select Network Integration tab to enable the Palo Alto Networks integration and enter the Palo Alto Networks Profile information, as shown in figure 9 and 10 below Figure 9: Instant WebUI Figure 10: Services Window Network Integration Tab 15

Appendix B Verification Commands Controller Verification Commands show pan profile The show pan profile CLI command lists all the Palo Alto Networks Server Profiles created along with the references to the profiles. (Controller-PAN-Test) #show pan profile Palo Alto Networks Servers Profile List --------------------------------------- Name References Profile Status --------- ---------- -------------- default 0 PAN-500 1.0PAN-VM 0 Total: 3 The output shows that there are three Palo Alto Networks Server Profiles created (default, PAN-500, PAN-VM) and PAN-500 has been referenced in another profile once. The show pan profile command also takes a Palo Alto Networks profile name as input to provide additional information on the profile. Ex: (Controller-PAN-Test) #show pan profile PAN-500 Palo Alto Networks Servers Profile PAN-500 -------------------------------------------- Parameter Value --------- ----- Palo Alto Networks Firewall 10.2.100.10:443 pan-test-user/******** show pan active-profile The show pan active-profile CLI command lists the Palo Alto Networks Active Profiles that have been activated on the controller. In 6.4, only one active profile can exist per controller (Controller-PAN-Test) #show pan active-profile Palo Alto Networks Active Profile --------------------------------- Parameter Value ---------------- -------- Active Palo Alto Networks profile PAN-500 The output shows PAN-500 has been activated on the controller 16

show pan state The show pan state command is used to verify the connectivity with the Palo Alto Networks firewall. The connection state in the output needs to be set to UP and Established for the communication between the firewall and the controller to be operational. (Controller-PAN-Test) #show pan state Palo Alto Networks Servers Connection State[PAN-500] ---------------------------------------------------- Firewall State -------- ----- 10.2.100.10:443 UP[01/23/14 09:56:01] Established show pan statistics The show pan statistics command lists the server communication statistics summary. The command output displays the total quantity of user messages logins, logouts, and connection refreshes that have been sent by the controller, along with stats for each configured PAN-OS receiver. (Controller-PAN-Test) #show pan statistics Palo Alto Networks Interface Statistics Summary ----------------------------------------------- Login Reqts Logout Reqts Refresh Reqts ----------- ------------ ------------- 5 2 4 Per-PAN server Statistics Summary --------------------------------- PAN Server User-ID Reqts Sent Skipped Success Failure Last Error ---------- ------------- ---- ------- ------- ------- ---------- 10.2.100.10:443 3 3 0 3 0 show pan debug (Controller-PAN-Test) #show pan debug Palo Alto Networks Interface Debug Information ---------------------------------------------- User Changed User Deleted Refresh Login Reqts Logout Reqts Refresh Reqts No UserName No Change No Deletion ------------ ------------ ------- ----------- ------------ ------------- ----------- --------- ----------- 9 2 594 5 2 4 0 4 0 Per-PAN server Debug Information -------------------------------- PAN Server State User-ID Reqts Sent Skipped Success Failure Last Error ---------- ----- ------------- ---- ------- ------- ------- ---------- 10.2.100.10:443 UP[01/23/14 09:56:01]Established 3 3 0 3 0 Work Factory Debug Information ------------------------------ Mgmt Queue Reqt Queue ---------- ---------- 0 0(8192) PAN Local UID-Table - total:2(2) cur:2 ref:3 ================================================================ 2 0 0 0 0 0 0 0 17

Aruba Instant verification commands show summary The show summary command summarizes all the settings on the instant and include the Palo Alto Networks setting PAN-Test-AP# show summary --- omitted ---- PAN Firewall IP Address :10.2.100.10 PAN Firewall Port :443 PAN Firewall User :pan-test-user PAN Firewall Password :9b5545de650165121bea755e9fcfa73a PAN Firewall Status :Enabled show ap debug pan-key This lists the Palo Alto firewall key that is configured on the instant to enable communications with the Palo Alto Networks firewall PAN-Test-AP# show ap debug pan-key pan _ firewall _ key : LUFRPT0vN1lxelhBdFVWc09jVTk2emRDcG9CS29GQjA9aEoyQjZPVGpWQ2RtbGRPMU9t UHVHN3ZsdHJEbWdURzFYSnFzQ0xzOX1wST0 show log ap-debug The show log ap-debug CLI command can be used to check the statistics of the Palo Alto Networks global profile traffic exchange between IAP and Palo Alto Networks firewall. PAN-Test-AP# show log ap-debug Apr 8 10:39:18 awc[1546]: Message over SSL from 10.2.100.10, SSL _ read() returned 534, Message is HTTP/1.0 200 OK^M Date: Tue, 08 Apr 2014 18:36:51 GMT^M Server: PanWeb Server/ - ^M ETag: c7bf-110-52aa2378 ^M Connection: close^m Pragma: no-cache^m Cache-Control: no-store, nocache, must-revalidate, post-check=0, pre-check=0^m Content-Type: application/xml; charset=utf-8^m Expires: Thu, 19 Nov 1981 08:52:00 GMT^M Set-Cookie: PHPSESSID=3ff675616b2abe7d58280041fda1c4ab; path=/; HttpOnly^M Set-Cookie: PHPSE SSID=3ff675616b2abe7d58280041fda1c4ab; path=/; HttpOnly^M Set-Cookie: PHPSESSID=3ff675616b2abe7d58280041fda1c4ab; path=/; HttpOnly^M ^M, AWC response: (null) Apr 8 10:39:18 awc[1546]: Message over SSL from 10.2.100.10, SSL _ read() returned 69, Message is <response status= success ><result>< ]]></result></response>, AWC response: HTTP/1.0 200 OK^M Date: Tue, 08 Apr 2014 18:36:51 GMT^M Server: PanWeb Server/ - ^M ETag: c7bf-110-52aa2378 ^M Connection: close^m Pragma: no-cache^m Cache-Control: no-store, no-cache, mustrevalidate, post-check=0, pre-check=0^m Content-Type: application/xml; charset=utf-8^m Expires: Thu, 19 Nov 1981 08:52:00 GMT^M Set-Coo kie: PHPSESSID=3ff675616b2abe7d58280041fda1c4ab; path=/; HttpOnly^M Set-Cookie: PHPSESSID=3ff675616b2abe7d58280041fda1c4ab; path=/; HttpOnly^M Set-Cookie: PHPSESSID=3ff675616b2abe7d58280041fda1c4ab; path=/; HttpOnly^M ^M 18

Apr 8 10:39:18 awc[1546]: Message over SSL from 10.2.100.10, SSL _ read() returned 0, Message is, AWC response: HTTP/1.0 200 OK^M Date: Tue, 08 Apr 2014 18:36:51 GMT^M Server: PanWeb Server/ - ^M ETag: c7bf-110-52aa2378 ^M Connection: close^m Pragma: no-cache^m Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0^m Content-Type: application/ xml; charset=utf-8^m Expires: Thu, 19 Nov 1981 08:52:00 GMT^M Set-Cookie: PHPSESSID=3ff675616b2abe7d58280041fda1c4ab; path=/; HttpOnly^M Se t-cookie: PHPSESSID=3ff675616b2abe7d58280041fda1c4ab; path=/; HttpOnly^M Set-Cookie: PHPSESSID=3ff675616b2abe7d58280041fda1c4ab; path=/; HttpOnly^M ^M <response status= success ><result>< ]]></result></response> Apr 8 10:39:18 awc[1546]: parse _ awc _ header: 613: ssl _ read from 10.2.100.10 failure 0 error _ count 1... Palo Alto Networks firewall verification commands show user ip-user-mapping ip <ip address> This command displays the username to IP address mapping for the client on the Palo Alto Networks firewall. This information is displayed only after the controller has updated the firewall with the username, IP address information pan-test-user@pa-500> show user ip-user-mapping ip 10.68.105.24 IP address: 10.68.105.24 (vsys1) User: iphone-user From: XMLAPI Idle Timeout: 1559s Max. TTL: 1559s Groups that the user belongs to (used in policy) pan-test-user@pa-500> show user ip-user-mapping ip 10.68.105.26 IP address: 10.68.105.26 (vsys1) User: ipad-user From: XMLAPI Idle Timeout: 1554s Max. TTL: 1554s Groups that the user belongs to (used in policy) 19

WebUI support on the Palo Alto Networks firewall The device type mapping to the IP address and User ID can be viewed on the Palo Alto Networks firewall WebUI. Device listings on the Application Command Center (ACC) tab The device type to IP address mapping is listed in the HIP Matches section under the ACC tab For each HIP object listed in the above page, the details of the HIP object and the HIP report can be obtained by clicking on the object type. In this case, clicking on iphone or ipad 20

Information on the device type, username mapping, IP address and the receive time of the information can be see in the HIP Match section under the Monitor tab. 21

About Aruba Networks, Inc. Aruba Networks is a leading provider of next-generation network access solutions for the mobile enterprise. The company designs and delivers Mobility-Defined Networks that empower IT departments and #GenMobile, a new generation of techsavvy users who rely on their mobile devices for every aspect of work and personal communication. To create a mobility experience that #GenMobile and IT can rely upon, Aruba Mobility-Defined Networks automate infrastructure-wide performance optimization and trigger security actions that used to require manual IT intervention. The results are dramatically improved productivity and lower operational costs. Listed on the NASDAQ and Russell 2000 Index, Aruba is based in Sunnyvale, California, and has operations throughout the Americas, Europe, Middle East, Africa and Asia Pacific regions. To learn more, visit Aruba at www.arubanetworks.com. For real-time news updates follow Aruba on Twitter and Facebook, and for the latest technical discussions on mobility and Aruba products visit Airheads Social at http://community.arubanetworks.com. 1344 Crossman Ave Sunnyvale, CA 94089 1.866.55.ARUBA T: 1.408.227.4500 FAX: 1.408.227.4550 info@arubanetworks.com www.arubanetworks.com 2014 Aruba Networks, Inc. Aruba Networks, Aruba The Mobile Edge Company (stylized), Aruba Mobilty Management System, People Move. Networks Must Follow., Mobile Edge Architecture, RFProtect, Green Island, ETIPS, ClientMatch, Bluescanner and The All Wireless Workspace Is Open For Business are all Marks of Aruba Networks, Inc. in the United States and certain other countries. The preceding list may not necessarily be complete and the absence of any mark from this list does not mean that it is not an Aruba Networks, Inc. mark. All rights reserved. Aruba Networks, Inc. reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice. While Aruba Networks, Inc. uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, Aruba Networks, Inc. will assume no responsibility for any errors or omissions. SG_PaloAltoNetworks_072514 22