At the heart of Palo Alto Networks' Next-Generation Firewalls (NGFWs) is the User-ID technology. User-ID allows the firewall to integrate with a wide range of enterprise directories and terminal services to associate IP addresses with specific users. This user-to-IP mapping is crucial for enabling granular security policies based on user identity rather than just IP addresses, enhancing visibility, and simplifying reporting. Both Captive Portal and GlobalProtect are powerful mechanisms within PAN-OS that contribute to populating these User-ID mappings, albeit through different approaches and for distinct use cases.
Captive Portal, also referred to as Authentication Portal in PAN-OS, is a method to identify and authenticate users who are attempting to access network resources through the Palo Alto Networks NGFW. When a user's traffic matches an Authentication Policy rule, the firewall can prompt them for credentials before allowing or denying access. This is particularly effective for scenarios where other User-ID methods (like AD domain controller monitoring or syslog parsing) are not feasible or for specific groups of users like guests.
The process typically involves:
admin@PA-VM> show user ip-user-mapping all IP Vsys User From IdleTimeout(s) MaxTimeout(s) --------------- ------ ---------------------------------- ------- -------------- ------------ 192.168.1.100 vsys1 example\jsmith CP 27000 27000
Device > Response Pages
.
How the firewall presents the authentication challenge is determined by the Captive Portal mode, configured within the Captive Portal settings (
Device > User Identification > Captive Portal Settings
).
Device > Authentication Profile
) Defines the authentication method (LDAP, RADIUS, SAML, Kerberos, Local), server profiles, and advanced settings like allow lists.
Device > Server Profiles > LDAP
) Contains connection details for the backend authentication server.
Device > User Identification > Captive Portal Settings
) Configures the mode (Transparent/Redirect), redirect host (for Redirect Mode), session timers (Idle Timer, Timer), and certificate for the portal.
Policies > Authentication
) Triggers the Captive Portal. Rules define source/destination zones, addresses, users (typically 'unknown' to trigger for unauthenticated users), and the Authentication Profile to use. The action is typically "Authentication Enforcement."
Device > Certificate Management > Certificate Profile
) Defines CA certificates for validating client certs.
Device > Certificate Management > SSL/TLS Service Profile
) Assigns the server certificate that the firewall will present for its HTTPS-based authentication portal.
Device > User Identification > Captive Portal Settings > Authentication Timers
. When enabled, the firewall adds a unique, randomly generated key (nonce) to the Captive Portal redirect URL. This helps prevent credential replay attacks by ensuring that each login attempt is unique. It is a recommended security practice to enable nonces.
GlobalProtect extends the protection of the Palo Alto Networks NGFW to users wherever they are located – on the local network, at home, or on the road. It provides secure access to enterprise resources by establishing a VPN connection (typically SSL VPN or IPSec) to a GlobalProtect Gateway on the firewall. A key function of GlobalProtect is to provide consistent user identification and security policy enforcement for these remote and mobile users.
High-level interaction between GlobalProtect components: Client, Portal, and Gateway, leading to secure access to internal resources.
GlobalProtect is a highly reliable source for User-ID information. When a user successfully authenticates to a GlobalProtect Gateway:
admin@PA-VM> show user ip-user-mapping all IP Vsys User From IdleTimeout(s) MaxTimeout(s) --------------- ------ ---------------------------------- ------- -------------- ------------ 10.5.5.10 vsys1 example\ruser GP 27000 27000
This ensures that all traffic originating from the GlobalProtect user (through the VPN tunnel) is accurately associated with their username, allowing for consistent user-based policy enforcement regardless of their physical location.
A significant advantage of GlobalProtect is its ability to collect Host Information Profile (HIP) data from endpoints.
Simplified flow of GlobalProtect HIP check process. The client sends a HIP report, the gateway uses this information in conjunction with the policy engine to determine access rights based on endpoint compliance.
GlobalProtect Gateways can be configured for split tunneling, which determines what traffic is sent through the VPN tunnel versus what traffic goes directly to the internet from the client's local connection.
Feature | Captive Portal (Authentication Portal) | GlobalProtect |
---|---|---|
Primary Purpose | User identification and authentication for network access, typically for unauthenticated users on the local network or specific services. | Secure remote access VPN for users anywhere, providing consistent user identification and security policy enforcement. |
Authentication Trigger | Traffic matches an Authentication Policy rule (e.g., source user 'unknown'). | User initiates VPN connection to Portal/Gateway; connection attempt. |
Client Software | No dedicated client software required (uses web browser). | Requires GlobalProtect client/app installed on endpoints. Clientless VPN option available for web applications via Portal. |
User Experience | Interactive (user sees a login page). Potential for certificate warnings in Transparent Mode. Smoother in Redirect Mode. | Can be seamless (Always-On, SSO) or manual (On-Demand). Generally transparent once connected. |
Typical Use Cases | Guest networks, BYOD, non-domain users, authenticating access to specific applications for local users. | Remote employees, mobile workforce, secure access for managed corporate devices, pre-logon access, extending corporate security policies to endpoints. |
User-ID Mapping Source | "Auth Portal" or "CP". Mappings can time out based on activity or session limits. | "GP" or "GlobalProtect". Mappings are generally persistent as long as the VPN tunnel is active. More reliable for mobile users. |
HIP Checks (Endpoint Posture) | No direct HIP check capability. | Yes, robust HIP collection and policy enforcement (requires GlobalProtect subscription). |
Encryption of Data in Transit | Only encrypts the authentication exchange if HTTPS is used for the portal. User's subsequent traffic is not encrypted by Captive Portal itself (relies on Security Policies for threat prevention). | Encrypts all tunneled traffic between client and Gateway (SSL/TLS or IPSec). |
Deployment Complexity | Relatively simpler: configure Authentication Profile, Server Profile, Captive Portal settings, Authentication Policy. | More involved: configure Portal, Gateway(s), Agent settings, client deployment, potentially PKI for certificates. |
MFA Integration | Yes (via RADIUS, SAML). | Yes (via RADIUS, SAML, PAN-OS MFA Server Profile). |
Transparent Mode / Redirect Mode | Offers both modes for presenting authentication. Redirect mode is preferred. | N/A (conceptually different, client explicitly connects). |
Licensing | Base feature, no specific license. | Base VPN is free. GlobalProtect subscription needed for advanced features like HIP checks, certain MFA, Clientless VPN. |
Both Captive Portal and GlobalProtect contribute to the User-ID mapping table on the PAN-OS firewall, which is essential for user-based policy enforcement. However, their mechanisms and reliability differ.
User-ID mapping process using Captive Portal (Redirect Mode). Successful authentication results in an IP-to-User mapping stored by the User-ID agent on the firewall.
show user ip-user-mapping
will show "CP" or "Auth Portal".
User-ID mapping process with GlobalProtect. Successful authentication at the Gateway results in an IP-to-User mapping for the VPN-assigned IP address.
Familiarity with PAN-OS CLI commands is essential for verification and troubleshooting.
show user ip-user-mapping all // Displays all current IP-to-user mappings show user ip-user-mapping ip <ip_address> // Shows mapping for a specific IP show user ip-user-mapping user <domain\user> // Shows mapping for a specific user show user user-id-agent statistics // Shows statistics for User-ID agents, including mappings
show user captive-portal statistics // Shows Captive Portal statistics show user captive-portal captive-portal-sessions // Displays active Captive Portal sessions (older PAN-OS) show user auth-portal-sessions all // Displays active Authentication Portal sessions (newer PAN-OS) show running logging configured service authd // Check authd daemon logging level (debug for troubleshooting) less mp-log authd.log // View Authentication Daemon logs (for detailed troubleshooting) debug authentication-portal reset ip <ip_address> // Clears an active Authentication Portal session for a specific IP
show global-protect-portal current-user // Shows users currently connected to the Portal show global-protect-gateway current-user gateway <gateway_name> // Shows users connected to a specific Gateway show global-protect-gateway flow gateway <gateway_name> // Shows traffic flow statistics for a Gateway show global-protect-gateway tunnel gateway <gateway_name> // Shows active tunnels on a Gateway show global-protect-gateway hip-report gateway <gateway_name> user <username> // Shows last HIP report for a user less mp-log gpsrv.log // View GlobalProtect service logs less mp-log PanGPS.log // View older GlobalProtect service logs