Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.

Similar documents
Configuring User Identification via Active Directory

Integrating LANGuardian with Active Directory

Configure your firewall for administrative access via RADIUS authentication

PineApp Surf-SeCure Quick

LDaemon. This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients.

GlobalProtect Configuration for IPsec Client on Apple ios Devices

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Installation Steps for PAN User-ID Agent

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Video Administration Backup and Restore Procedures

NSi Mobile Installation Guide. Version 6.2

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

SharePoint AD Information Sync Installation Instruction

Configuring the Palo Alto Firewall for use with Juniper Steel-Belted RADIUS.

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

AeroLab Wireless Network Code of Conduct. Connecting to the AeroLab Wireless Network

How to Logon with Domain Credentials to a Server in a Workgroup

OneLogin Integration User Guide

How To - Implement Single Sign On Authentication with Active Directory

Nexio Insight LDAP Synchronization Service

Avatier Identity Management Suite

Configuring Sponsor Authentication

Configuring Global Protect SSL VPN with a user-defined port

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.

Deployment Guide for Citrix XenDesktop

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

FTP, IIS, and Firewall Reference and Troubleshooting

Managing Identities and Admin Access

Windows 2000 Active Directory Configuration Guide

Using LDAP Authentication in a PowerCenter Domain

External Authentication with Citrix Access Gateway Advanced Edition

Getting Started with Clearlogin A Guide for Administrators V1.01

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Flexible Identity. LDAP Synchronization Agent guide. Bronze. version 1.2

Security Assertion Markup Language (SAML) Site Manager Setup

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

Summary. How-To: Active Directory Integration. April, 2006

User-ID Best Practices

XStream Remote Control: Configuring DCOM Connectivity

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS

User-ID. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Instructions for Microsoft Outlook 2003

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Professional Mailbox Software Setup Guide

Using LDAP for User Authentication

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Using LifeSize systems with Microsoft Office Communications Server Server Setup

Introduction to Directory Services

How to set up Outlook Anywhere on your home system

User Identification (User-ID) Tips and Best Practices

Sample Configuration: Cisco UCS, LDAP and Active Directory

Update Instructions

Set Up Setup with Microsoft Outlook 2007 using POP3

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

MailEnable Quick Start Guide

Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory

Skyward LDAP Launch Kit Table of Contents

Creating a User Profile for Outlook 2013

Integration with Active Directory

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Microsoft Exchange Mailbox Software Setup Guide

Installing and Configuring vcloud Connector

Configuring Thunderbird with UEA Exchange 2007:

Managing User Accounts

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

For paid computer support call

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information

Installing and Configuring vcloud Connector

XenDesktop Implementation Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Migrating MSDE to Microsoft SQL 2008 R2 Express

PriveonLabs Research. Cisco Security Agent Protection Series:

Basic Exchange Setup Guide

Microsoft Entourage 2008 / Microsoft Exchange Server Installation and Configuration Instructions

Upgrade Guide BES12. Version 12.1

escan SBS 2008 Installation Guide

BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services

FaxCore Ev5 -To-Fax Setup Guide

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Reference and Troubleshooting: FTP, IIS, and Firewall Information

support HP MFP Scan Setup Wizard 1.1

Microsoft IAS Configuration for RADIUS Authorization

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Configuring WPA2 for Windows XP

Connecting to Delta College Exchange services off-campus

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

Moving the TRITON Reporting Databases

Using RADIUS Agent for Transparent User Identification

Step by step guide for connecting PC to wired LAN at dormitories of University of Pardubice

Quick Scan Features Setup Guide

Creating Home Directories for Windows and Macintosh Computers

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Update Instructions

Using LifeSize Systems with Microsoft Office Communications Server 2007

Installing and configuring Microsoft Reporting Services

Transcription:

Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc.

Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories, Active Directory Global Catalog and multi domain setups. As part of this new feature set, some functionality of User-ID that has been part of the User-ID Agent has now been moved into the firewall itself. With this change, certain manual steps are required to fully migrate and upgrade to the new User-ID feature set introduced in PANOS 4.1. This document describes the steps a customer needs to go through to successfully upgrade to take full advantage of these improvements. PAN-OS 4.1 still remains backwards compatible with PAN-OS release 3.1 of the User-ID Agent without limitation. Meaning, if you only want to migrate your firewall to the latest PAN-OS version, but do not want to take advantage of the new User-ID features, you can leave the already installed User-ID Agent untouched and just upgrade your firewall without any functionality loss. Users and Groups Retrieval of user group information in PAN-OS 4.1 is done on the firewall entirely. For this purpose, the firewall connects to your directory service and servers through LDAP and retrieves the necessary user and group object information. This section covers the configuration of PAN-OS for this feature. LDAP Server Profiles As the first step, you need to configure one or more directory servers that the firewall will use to retrieve the user and group information. This is done in the Device > Server Profiles > LDAP section of the management user interface. 1. Name your configuration and leave the Administrator use only checkbox unchecked. 2. List the directory servers that you want the firewall to use in the server list. You need to provide at least one server; two or more are recommended for failover purposes. The standard LDAP port for this configuration is 389. 3. Leave the Domain field empty, unless you want to configure multiple independent directories. 4. Select a directory Type. Based on the selected directory type, the firewall can populate default values for attributes and objectclasses used for user and group objects in the directory server. 5. Enter the base of the LDAP directory in the Base field. For example, if your Active Directory Domain is acme.local, your base would be dc=acme,dc=local, unless you want to leverage an Active Directory Global Catalog. 2011, Palo Alto Networks, Inc. [2]

6. In the Bind DN field, enter a user name for a user with sufficient permission to read the LDAP tree. In an Active Directory environment, a valid username for this entry could be the User Principal Name, e.g. administrator@acme.local but also the users distinguished name, e.g. cn=administrator,cn=users,dc=acme,dc=local. 7. Enter and confirm the authentication password for the user account that you entered above. Identifying the Directory Base LDAP Server profile configuration In case you have difficulties identifying your directory base DN, you can simply follow these steps: 1. Open the Active Directory Users and Groups management console on your domain controller. 2. Select Advanced features in the View menu of the management console. 3. Select the top of your domain object and select Properties. 4. Navigate to the Attribute Editor in the properties window and scroll to the distinguishedname attribute. 5. Copy the content of this attribute into the LDAP Server configuration Base field in the firewall management UI. 2011, Palo Alto Networks, Inc. [3]

Group Mapping Settings Active Directory Advanced Property View After the LDAP server has been configured, you need to configure how groups and users are retrieved from the directory and which users groups are to be included in policies. In order to create a new group mapping entry, navigate to the Device > User Identification menu and create a new entry under the Group Mapping Settings tab. Server Profile In this configuration, you specify which LDAP server profile is going to be used to identify users and groups. Select the LDAP Server Profile you configured earlier in the LDAP Server Profile section in the drop-down list under Server Profile. All LDAP Attributes and ObjectClasses will be pre-populated based on the directory server type you selected in the LDAP Server Profile. Under normal circumstances, you should not have to modify any of these attributes. Please refer to the Palo Alto Networks Administrator s Guide for customizations of these attributes. 2011, Palo Alto Networks, Inc. [4]

The default update interval for changes in user groups is 3600 seconds (1 hour). You can customize this value to a shorter period if needed. Group Include List In order to optimize LDAP queries and policy configuration, you can specify a list of user groups you would like to include in policies in the Group Mapping Settings. PAN-OS will restrict its queries to the groups listed in order to track changes in the group members. 1. Select the groups you would like to add in the tree view on the right hand side, which represents the directory structure and shows all user groups. You can search for available groups using the search field. Pattern matching is performed by adding asterisks to the beginning or end of the string. 2. Add groups you want to include in policy by selecting them in the right tree view and clicking the + button. 3. Click ok to save the group mappings. 2011, Palo Alto Networks, Inc. [5]

Users and IP Addresses The new User-ID Agent adds a variety of new features, such as monitoring of Microsoft Exchange Server logon events. All settings of the previous 3.1 User-ID Agent are automatically migrated into the new User Identification Agent. All configured User-ID Agents settings in PANOS are automatically migrated to the User-ID Agent list in PANOS 4.1. 2011, Palo Alto Networks, Inc. [6]