A large-scale network can have hundreds of information sources that firewalls query to map IP address - to - username mappings and to map username - to - group mappings. You can simplify User-ID administration for such a network by aggregating the user mapping and group mapping information before the User-ID agents collect it, thereby reducing the number of required agents.
A large-scale network can also have numerous firewalls that use the mapping information to enforce policies. You can reduce the resources that the firewalls and information sources use in the querying process by configuring some firewalls to acquire mapping information through redistribution instead of direct querying. Redistribution also enables the firewalls to enforce user-based policies when users rely on local sources for authentication (such as regional directory services) but need access to remote services and applications (such as global data center applications).
If you Configure Authentication Policy, your firewalls also redistribute the Authentication Timestamps associated with user responses to authentication challenges. Firewalls use the timestamps to evaluate the timeouts for Authentication policy rules. The timeouts allow a user who successfully authenticates to later request services and applications without authenticating again within the timeout periods. Redistributing timestamps enables you to enforce consistent timeouts for each user even if the firewall that initially grants a user access is not the same firewall that later controls access for that user.
If you have configured multiple virtual systems on a single firewall, you can share IP address - to - username mapping information across virtual systems by selecting a virtual system as a User-ID hub .
You can use Windows Log Forwarding and Global Catalog servers to simplify user mapping and group mapping in a large-scale network of Microsoft Active Directory (AD) domain controllers or Exchange servers. These methods simplify User-ID administration by aggregating the mapping information before the User-ID agents collect it, thereby reducing the number of required agents.
Because each User-ID agent can monitor up to 100 servers, the firewall needs multiple User-ID agents to monitor a network with hundreds of AD domain controllers or Exchange servers. Creating and managing numerous User-ID agents involves considerable administrative overhead, especially in expanding networks where tracking new domain controllers is difficult. Windows Log Forwarding enables you to minimize the administrative overhead by reducing the number of servers to monitor and thereby reducing the number of User-ID agents to manage. When you configure Windows Log Forwarding, multiple domain controllers export their login events to a single domain member (the Windows Event Collector ) from which a User-ID agent collects the user mapping information.
You can configure Windows Log Forwarding for Windows Server versions 2012 and 2012 R2. Windows Log Forwarding is not available for non-Microsoft servers.
To collect group mapping information in a large-scale network, you can configure the firewall to query a Global Catalog server that receives account information from the domain controllers.
The above figure illustrates user mapping and group mapping for a large-scale network in which the firewall uses a Windows-based User-ID agent. See Plan a Large-Scale User-ID Deployment to determine if this deployment suits your network.
What is the primary benefit of using Windows Log Forwarding in a large-scale User-ID deployment?
When deciding whether to use Windows Log Forwarding and Global Catalog servers for your User-ID implementation, consult your system administrator to determine:
Domain controllers won't forward their entire security logs, they forward only the events that the user mapping process requires per login: four events for Windows Server 2012 and MS Exchange (Event IDs:
4768
,
4769
,
4770
,
4624
).
To configure Windows Log Forwarding, you need administrative privileges for configuring group policies on Windows servers. Configure Windows Log Forwarding on all the Windows Event Collectors the member servers that collect login events from domain controllers. The following is an overview of the tasks; consult your Windows Server documentation for the specific steps.
4768
(Authentication Ticket Granted),
4769
(Service Ticket Granted),
4770
(Ticket Granted Renewed), and
4624
(Logon Success).
To forward events as quickly as possible, select Minimize Latency when configuring the subscription.
User-ID agents monitor the Security log on Windows Event Collectors, not the default Forwarded Events location . To change the event logging path to the Security log, perform the following steps on each Windows Event Collector.
%SystemRoot%\System32\Winevt\Logs\security.evtx
) and click
OK
.
%SystemRoot%\System32\Winevt\Logs\ForwardedEvents.evtx
) by pasting the value from the
Security
log, and then click
OK
.
Configure Windows Log Forwarding. This step requires administrative privileges for configuring group policies on Windows servers.
Install the Windows-Based User-ID Agent on a Windows server that can access the member servers. Make sure the system that will host the User-ID agent is a member of the same domain as the servers it will monitor.
The primary username is the username that identifies the user on the firewall and represents the user in reports and logs, regardless of the format that the User-ID source provides.
To improve availability, use at least two Global Catalog servers for redundancy.
You can collect group mapping information only for universal groups , not local domain groups (subdomains).
3268
. For an LDAP over SSL connection, use
Port
3269
. If the connection will use Start TLS or LDAP over SSL, select the
Require SSL/TLS secured connection
check box.
DC=acbdomain,DC=com
).
User-ID uses this information to map DNS domain names to NetBIOS domain names. This mapping ensures consistent domain/username references in policy rules.
To improve availability, use at least two servers for redundancy.
The steps are the same as for the LDAP server profile you created for Global Catalogs in the previous step, except for the following fields:
389
. For an LDAP over SSL connection, use
Port
636
. If the connection will use Start TLS or LDAP over SSL, select the
Require SSL/TLS secured connection
check box.
cn=partitions,cn=configuration
(for example,
cn=partitions,cn=configuration,DC=acbdomain,DC=com
).
If the Global Catalog and domain mapping servers reference more groups than your security rules require, configure the Group Include List and/or Custom Group list to limit the groups for which User-ID performs mapping .
When configuring an LDAP Server Profile on the firewall to query a Global Catalog for group mapping, which port should typically be used for an LDAP over SSL connection?
3268
is used for standard LDAP queries to the GC, while port
3269
is used for LDAP over SSL (LDAPS) queries to the GC. Ports
389
(LDAP) and
636
(LDAPS) are used for standard domain controller queries.
When you configure a secondary enforcement appliance with your Palo Alto Networks firewall to enforce user-based policy, the secondary appliance may not have the IP address - to - username mapping from the firewall. Transmitting user information to downstream appliances may require deployment of additional appliances such as proxies or negatively impact the user's experience (for example, users having to log in multiple times). By sharing the user's identity in the HTTP headers , you can enforce user-based policy without negatively impacting the user's experience or deploying additional infrastructure.
When you configure this feature, apply the URL Filtering profile to a Security policy rule, and commit your changes, the firewall:
If you want to include the username and domain only when the user accesses specific domains, configure a domain list and the firewall inserts the header only when a domain in the list matches the Host header of the HTTP request.
To share user information with downstream appliances, you - first enable User-ID and configure group mapping.
To include the username and domain in the header, the firewall requires the
IP address - to - username
mapping for the user. If the user isn't mapped, the firewall inserts
unknown
in Base64 encoding for both the domain and username in the header.
To include the username and domain in headers for HTTPS traffic, you - first create a Decryption profile to decrypt HTTPS traffic.
This feature supports forward-proxy decryption traffic.
The firewall does not insert headers if the action for the URL Filtering profile is block for the domain.
You can define up to five headers for each profile.
($domain)\($user)
or
WinNT://($domain)/($user)
) or enter your own format using the
($domain)
and
($user)
dynamic tokens (for example,
($user)@($domain)
for UserPrincipalName).
Do not use the same dynamic token (either
($user)
or
($domain)
) more than once per value.
Each value can be up to 512 characters. The firewall populates the
($user)
and
($domain)
dynamic tokens using the primary username in the group mapping profile. For example:
($user)
is the sAMAccountName and the value for
($domain)
is the NetBIOS domain name.
($user)
the user account name (prefix) and the
($domain)
is the Domain Name System (DNS) name.
show user user-ids all
command to verify the group mapping is correct.
show counter global name ctd_header_insert
command to view the number of HTTP headers inserted by the firewall.
corpexample\testuser
would appear in the logs as
Y29ycGV4YW1wbGVcdGVzdHVzZXI=
).
In a large-scale network, instead of configuring all your firewalls to directly query the mapping information sources, you can streamline resource usage by configuring some firewalls to collect mapping information through redistribution .
You can redistribute user mapping information collected through any method except Terminal Server (TS) agents . You cannot redistribute Group Mapping or HIP match information.
If you use Panorama to manage firewalls and aggregate firewall logs, you can use Panorama to manage User-ID redistribution. Leveraging Panorama is a simpler solution than creating extra connections between firewalls to redistribute User-ID information.
If you Configure Authentication Policy, your firewalls - also redistribute the Authentication Timestamps that are generated when users authenticate to access applications and services. Firewalls use the timestamps to evaluate the timeouts for Authentication policy rules. The timeouts allow a user who successfully authenticates to later request services and applications without authenticating again within the timeout periods. Redistributing timestamps enables you to enforce consistent timeouts across all the firewalls in your network.
Firewalls share data and authentication timestamps as part of the same redistribution flow ; you don't have to configure redistribution for each information type separately.
In a large-scale network, instead of configuring all your firewalls to directly query the data sources, you can streamline resource usage by configuring some firewalls to collect data through redistribution. Data redistribution also provides granularity, allowing you to redistribute only the types of information you specify to only the devices you select. You can also filter the IP user mappings or IP address - to - tag mappings using subnets and ranges to ensure the firewalls collect only the mappings they need to enforce policy.
Data redistribution can be unidirectional (the agent provides data to the client) or bidirectional , where both the agent and the client can simultaneously send and receive data.
To redistribute the data, you can use the following architecture types:
To redistribute data between firewalls, use a hub and spoke architecture as a best practice . In this configuration, a hub firewall collects the data from sources such as Windows User-ID agents, Syslog Servers, Domain Controllers, or other firewalls. Configure the redistribution client firewalls to collect the data from the hub firewall.
For example, a hub (consisting of a pair of VM-50s for resiliency) could connect to the User-ID sources for the user mappings. The hub would then be able to redistribute the user mappings when the client firewalls that use the user mappings to enforce policy connect to the hub to receive data.
If you have firewalls deployed in multiple regions and want to distribute the data to the firewalls in all of these regions so that you can enforce policy consistently regardless of where the user logs in, you can use a multi-hub and spoke architecture for multiple regions.
Start by configuring a firewall in each region to collect data from the sources. This firewall acts as a local hub for redistribution. This firewall collects the data from all sources in that region so that it can redistribute it to the client firewalls. Next, configure the client firewalls to connect to the redistribution hubs for their region and all other regions so that the client firewalls have all data from all hubs.
As a best practice, enable bidirectional redistribution within a region if the firewalls need to both send and receive data. For example, if a firewall is acting as a GlobalProtect gateway for remote users and as a branch firewall for local users, the firewall - send the user mappings it collects for remote users to the hub firewall as well as receive the user mappings of the local users from the hub firewall.
To redistribute data, you can also use a hierarchical architecture. For example, to redistribute data such as User-ID information, organize the redistribution sequence in layers, where each layer has one or more firewalls. In the bottom layer, PAN-OS integrated User-ID agents running on firewalls and Windows-based User-ID agents running on Windows servers map IP addresses to usernames. Each higher layer has firewalls that receive the mapping information and authentication timestamps from up to 100 redistribution points in the layer beneath it. The top-layer firewalls aggregate the mappings and timestamps from all layers. This deployment provides the option to configure policies for all users in top-layer firewalls and region- or function-specific policies for a subset of users in the corresponding domains served by lower-layer firewalls.
In this scenario, three layers of firewalls redistribute mappings and timestamps from local offices to regional offices and then to a global data center. The data center firewall that aggregates all the information shares it with other data center firewalls so that they can all enforce policy and generate reports for users across your entire network. Only the bottom layer firewalls use User-ID agents to query the directory servers.
The information sources that the User-ID agents query do not count towards the maximum of ten hops in the sequence. However, Windows-based User-ID agents that forward mapping information to firewalls do count. Also in this example, the top layer has two hops: the first to aggregate information in one data center firewall and the second to share the information with other data center firewalls.
In a large-scale network, instead of configuring all your firewalls to directly query the data sources, you can streamline resource usage by configuring some firewalls to collect data through redistribution . Data redistribution also provides granularity, allowing you to redistribute only the types of information you specify to only the devices you select. You can also filter the IP user mappings or IP address - to - tag mappings using subnets and ranges to ensure the firewalls collect only the mappings they need to enforce policy.
Data redistribution can be unidirectional (the agent provides data to the client) or bidirectional , where both the agent and the client can simultaneously send and receive data.
To redistribute the data, you can use the following architecture types:
To redistribute data between firewalls, use a hub and spoke architecture as a best practice . In this configuration, a hub firewall collects the data from sources such as Windows User-ID agents, Syslog Servers, Domain Controllers, or other firewalls. Configure the redistribution client firewalls (spokes) to collect the data from the hub firewall.
For example, a hub (consisting of a pair of VM-50s for resiliency) could connect to the User-ID sources for the user mappings. The hub would then be able to redistribute the user mappings when the client firewalls that use the user mappings to enforce policy connect to the hub to receive data.
If you have firewalls deployed in multiple regions and want to distribute the data to the firewalls in all of these regions so that you can enforce policy consistently regardless of where the user logs in, you can use a multi-hub and spoke architecture for multiple regions.
Start by configuring a firewall in each region to collect data from the sources. This firewall acts as a local hub for redistribution. This firewall collects the data from all sources in that region so that it can redistribute it to the client firewalls. Next, configure the client firewalls to connect to the redistribution hubs for their region and all other regions so that the client firewalls have all data from all hubs.
As a best practice, enable bidirectional redistribution within a region if the firewalls need to both send and receive data. For example, if a firewall is acting as a GlobalProtect gateway for remote users and as a branch firewall for local users, the firewall must send the user mappings it collects for remote users to the hub firewall as well as receive the user mappings of the local users from the hub firewall.
To redistribute data, you can also use a hierarchical architecture. For example, to redistribute data such as User-ID information, organize the redistribution sequence in layers , where each layer has one or more firewalls. In the bottom layer, PAN-OS integrated User-ID agents running on firewalls and Windows-based User-ID agents running on Windows servers map IP addresses to usernames. Each higher layer has firewalls that receive the mapping information and authentication timestamps from up to 100 redistribution points in the layer beneath it. The top-layer firewalls aggregate the mappings and timestamps from all layers. This deployment provides the option to configure policies for all users in top-layer firewalls and region- or function-specific policies for a subset of users in the corresponding domains served by lower-layer firewalls.
In this scenario, three layers of firewalls redistribute mappings and timestamps from local offices to regional offices and then to a global data center. The data center firewall that aggregates all the information shares it with other data center firewalls so that they can all enforce policy and generate reports for users across your entire network. Only the bottom layer firewalls use User-ID agents to query the directory servers.
The information sources that the User-ID agents query do not count towards the maximum of ten hops in the sequence. However, Windows-based User-ID agents that forward mapping information to firewalls do count. Also in this example, the top layer has two hops: the first to aggregate information in one data center firewall and the second to share the information with other data center firewalls.
Before you configure data redistribution:
Data redistribution consists of:
Perform the following steps on the firewalls in the data redistribution sequence.
5007
, range is 1—65535).
Skip this step if the firewall receives but does not redistribute data.
You can redistribute information among virtual systems on different firewalls or on the same firewall. In both cases, each virtual system counts as one hop in the redistribution sequence.
You can include or exclude networks and subnetworks when redistributing either IP address - to - tag mappings or IP address - to - username mappings.
As a best practice, always specify which networks to include and exclude to ensure that the agent is only communicating with internal resources.
Skip this step if the firewall only receives user mapping information from Windows-based User-ID agents or directly from the information sources (such as directory servers) instead of from other firewalls.
Skip this step if the firewall receives but does not redistribute data.
Configure an Interface Management Profile with the User-ID service enabled and assign the profile to a firewall interface.
show redistribution agent state
(where
is the name of the redistribution agent or User-ID agent.
show redistribution service status
.
show redistribution service status
.
show redistribution service client all
.
show redistribution service client all
.
show user ip-user-mapping all
.
When you enable the traceroute option, the firewall that receives the data appends its IP address to the
field, which is a list of all firewall IP addresses that the data has traversed. This option requires that all PAN-OS devices in the redistribution route use PAN-OS version 10.0. If a PAN-OS device in the redistribution route uses PAN-OS 9.1.x or earlier versions, the traceroute information terminates at that device.
debug user-id test cp-login traceroute yes ip-address
user
(where
is the IP address of the
IP address - to - username
mapping you want to verify and
is the username of the
IP address - to - username
mapping you want to verify.
show user ip-user-mapping all
.
The firewall displays the timestamp for the creation of the mapping ( SeqNumber ) and whether the user has GlobalProtect ( GP User ).
admin > show user ip-user-mapping-mp ip 192.0.2.0 IP address: 192.0.2.0 (vsys1) User: jimdoe From: REDIST Timeout: 889s Created: 11s ago Origin: 198.51.100.0 SeqNumber: 15895329682-67831262 GP User: No Local HIP: No Route Node 0: 198.51.100.0 (vsys1) Route Node 1: 198.51.100.1 (vsys1)
Which type of User-ID information CANNOT be redistributed between firewalls?
To simplify User-ID™ source configuration when you have multiple virtual systems, configure the User-ID sources on a single virtual system to share IP address - to - username mappings and username - to - group mappings with all other virtual systems on the firewall.
Configuring a single virtual system as a User-ID hub simplifies user mapping by eliminating the need to configure the sources on multiple virtual systems, especially if traffic will pass through multiple virtual systems based on the resources the user is trying to access (for example, in an academic networking environment where a student will be accessing different departments whose traffic is managed by different virtual systems).
To map the user or group, the firewall uses the mapping table on the local virtual system and applies the policy for that user or group. If the firewall does not find the mapping for a user or group on the virtual system where that user's traffic originated, the firewall queries the hub to fetch the IP address - to - username information for that user or group mapping information for that group. If the firewall locates the mapping on both the User-ID hub and the local virtual system, the firewall uses the mapping it learns locally. If the mapping on the local firewall differs from the mapping on the virtual system hub, the firewall uses the local mapping.
After you configure the User-ID hub, the virtual system can use the mapping table on the User-ID hub when it needs to identify a user for user-based policy enforcement or to display the username in a log or report but the source is not available locally. When you select a hub, the firewall retains the mappings on other virtual systems so we recommend consolidating the User-ID sources on the hub. However, if you don't want to share mappings from a specific source, you can configure an individual virtual system to perform user or group mapping.
You - select at least one mapping type.
This consolidates the User-ID configuration for operational simplicity. By configuring the hub to monitor servers and connect to agents that were previously monitored by other virtual systems, the hub collects the user mapping information instead of having each virtual system collect it independently. If you don't want to share mappings from specific virtual systems, configure those mappings on a virtual system that will not be used as the hub.
Use the same format for the Primary Username across virtual systems and firewalls.
On the hub, you can configure any User-ID source that is currently configured on a virtual system. However, IP address-and-port-to-username mapping information from Terminal Server agents are not shared between the User-ID hub and the connected virtual systems.
show user ip-user-mapping all
command to show the
IP address - to - username
mappings and which virtual system provides the mappings.
show user user-id-agent statistics
command to show which virtual system is serving as the User-ID hub.
show user group-mapping statistics
show user group-mapping state all
show user group list
show user group name
If a firewall has multiple virtual systems and one is configured as a User-ID Hub, what happens if a specific user mapping exists both locally on a spoke vsys and on the hub vsys?