After you configure User-ID mapping in Prisma Access, you need to be able to retrieve the current IP address-to-username and username-to-user group information for mobile users and users at remote networks. To allow the Panorama that manages your deployment to retrieve group mapping information, you must add one or more next-generation firewalls to your deployment and then designate the firewall as a Master Device . You then create policies in Panorama and enforce the policies using the list of user groups that Panorama retrieved from the Master Device.
Panorama cannot retrieve group mapping information in Prisma Access deployments without next-generation firewalls, because Prisma Access does not have any devices in its device groups that you can specify as a Master Device . If you have a standalone Prisma Access deployment, you can still implement User-ID mapping in policies by using long-form Distinguished Name (DN) entries.
To allow Panorama to collect group mappings, you need to add a device group, then designate one or more next-generation firewalls as a Master Device . You can configure either an on-premises firewall or a VM-series firewall as a master device.
flowchart TD subgraph Corporate_Network ["Corporate Network"] LDAP["LDAP Server
Global Catalog"] UIDAgent["User-ID Agent
(Optional)"] end subgraph OnPrem_or_VM_Firewall ["On-Prem/VM-Series Firewall"] MasterFW[(Master Device Firewall)] end subgraph Panorama_Mgmt ["Panorama Management"] Pano["Panorama"] MasterDG["Master Device Group
(References MasterFW)"] ChildDG["Prisma Access Device Group
(e.g., Mobile_Users,
Child of MasterDG)"] end LDAP -- Group Info --> MasterFW UIDAgent -- User Mappings --> MasterFW MasterFW -- "1 Pushes Group Mappings
to its Device Group" --> MasterDG Pano -- "2 Retrieves Group Info
from Master DG" --> MasterDG Pano -- "3 Uses Group Info for Policies
(Applied to Child DGs like Prisma Access)" --> ChildDG style MasterFW fill:#cde,stroke:#333,stroke-width:2px style Pano fill:#ffc,stroke:#333
Auto-population of users and groups is only applicable to the parent device group that is associated with the master device. Auto-Population of users/groups is not applicable to the child device groups (the Mobile_User_Device_Group , Remote_Network_Device_Group , or Service_Conn_Device_Group , device groups). See Configure an on-premises or VM-Series Firewall as a Master Device for details.
The Master Devices can serve as the termination point of a remote network connection or service connection, but this connection method is not required for the process to work, as shown in the following example. The following figure shows a User-ID deployment where the administrator has configured an on-premises device as a Master Device . Callouts in the figure show the process.
We recommend using a Group Include List in the LDAP server profile, so that you can specify which groups you want to retrieve, instead of retrieving all group information.
Use the following procedure to configure an on-premises or VM-series firewall as a Master Device.
flowchart TD A[Start: Configure Master Device] --> B[Navigate to Panorama > Managed Devices > Device Groups] B --> C["Add/Edit Parent Device Group e.g. Master-DG-Service"] C --> D[Add On-Prem/VM Firewall to 'Devices' list] D --> E[Select the Firewall as Master Device] E --> F[Check 'Store user and groups' option] F --> G[Save Parent Device Group] G --> H["Navigate to Cloud Services > Config > Mobile Users, Remote Networks, Service Setup"] H --> I[Edit Settings - Gear Icon] I --> J["Select the created Parent Device Group in Parent Device Group dropdown"] J --> K[Save Prisma Access Settings] K --> L[Commit Changes to Panorama & Master Device] L --> M[End: Configuration Complete] style F fill:#ccf,stroke:#333 style J fill:#ccf,stroke:#333
This option allows Panorama to locally store usernames, user group names, and group mapping information that it receives from the Master Device.
The following screenshot creates a Master Device to be used for the service connection.
In a standalone Prisma Access deployment without a Master Device, you can use group-based policy using long-form DN entries in Panorama. Prisma Access uses the DN entries to evaluate the User-ID-based policies you have configured in Panorama.
For example, given a User named
Bob Alice
who works in
IT
for Organization
Hooli
in the United States, a matching security policy may have
ou=IT Staff,O=Hooli,C=US
if the policy is to be applied to all IT staff, or
CN=Bob Alice,ou=IT Staff,O=Hooli,C=US
if the policy is only to be applied to Bob Alice.
After you configure User-ID, you consistently enforce user-based policy for all mobile users and users at remote network locations by configuring User-ID redistribution to redistribute the User-ID mapping from Prisma Access to all next-generation firewalls that secure access to network resources.
Use one the following methods to redistribute User-ID mapping to mobile users and users in remote networks from an on-premises next-generation firewall and vice versa, depending on the direction in which you want to redistribute the User-IDs:
In cases where mobile users need to access a resource on a remote network location or HQ/data center and the resource is secured by an on-premises next-generation firewall with user-based policies, you must redistribute User-ID mappings from the Prisma Access mobile users and users at remote networks to the on-premises firewall. When the user connects to Prisma Access, it collects this user-to-IP address mapping and stores it.
The following figure shows two mobile users that have an existing IP address-to-username mapping in Prisma Access. Prisma Access then redistributes this mapping by way of a service connection to the on-premises firewall that secures the HQ/data center.
sequenceDiagram participant MU as Mobile User participant PA as Prisma Access (Service Connection) participant OnPremFW as On-Prem Firewall (HQ/Data Center) participant Resource as Protected Resource MU ->> PA: Connects & Authenticates PA ->> PA: Collects/Stores IP-User Mapping for MU Note over PA OnPremFW: Prisma Access acts as Redistribution Agent PA ->> OnPremFW: Redistribute IP-User Mapping (via Service Conn) OnPremFW -->> PA: Ack OnPremFW ->> OnPremFW: Stores received mapping Note over MU PA OnPremFW: Later, Mobile User accesses resource MU ->> PA: Traffic to Resource PA ->> OnPremFW: Forwards Traffic (via Service Conn) OnPremFW ->> OnPremFW: Lookup mapping for MU's IP OnPremFW ->> Resource: Allow traffic based on User Policy Resource -->> OnPremFW: Response OnPremFW -->> PA: Response PA -->> MU: Response
To redistribute User-ID mappings from Prisma Access to an on-premises firewall, complete the following steps.
Before you start this task, find the User-ID Agent Address in Prisma Access by selecting Panorama > Cloud Services > Status > Network Details , selecting the Service Connection radio button, and viewing the information in the User-ID Agent Address field.
Make sure that you have selected the Service_Conn_Template in the Templates drop-down at the top of the page. The User-ID agent in Prisma Access receives its User-ID mapping from the domain controller in the data center by way of the service connection.
In cases where users are at a branch location or HQ that is secured by an on-premises next-generation firewall with user-based policies, and they need to access resources at another branch location that you have secured with Prisma Access, you must redistribute User-ID mappings from the on-premises firewall to Prisma Access.
The following figure shows an HQ/Data center with an on-premises next-generation firewall with existing IP address-to-username mapping. Prisma Access connects to the firewall with a service connection, and the on-premises firewall redistributes the mapping to Prisma Access.
sequenceDiagram participant HQUser as HQ/Branch User participant OnPremFW as On-Prem Firewall (HQ/Branch) participant PA as Prisma Access (Service Connection) participant CloudResource as Protected Cloud/Branch Resource HQUser ->> OnPremFW: Connects & Authenticates (or traffic hits) OnPremFW ->> OnPremFW: Collects/Stores IP-User Mapping for HQUser Note over OnPremFW PA: On-Prem Firewall acts as Redistribution Agent OnPremFW ->> PA: Redistribute IP-User Mapping (via Service Conn) PA -->> OnPremFW: Ack PA ->> PA: Stores received mapping Note over HQUser OnPremFW PA: Later, HQ User accesses cloud/branch resource HQUser ->> OnPremFW: Traffic to Cloud Resource OnPremFW ->> PA: Forwards Traffic (via Service Conn) PA ->> PA: Lookup mapping for HQUser's IP PA ->> CloudResource: Allow traffic based on User Policy CloudResource -->> PA: Response PA -->> OnPremFW: Response OnPremFW -->> HQUser: Response
To redistribute User-ID mappings from an on-premises firewall to Prisma Access, complete the following steps.
Make sure that you have selected the Remote_Network_Template or Service_Conn_Template (depending on how Prisma Access connects) in the Templates drop-down at the top of the page.
For the MGT interface, you can enter a hostname instead of the IP address.
Imagine you have two main goals:
Here's a simplified explanation of the document, including how these concepts scale:
Master-Firewall-DG
). It's
not
placed directly into the Prisma Access Device Groups.
Master-Firewall-DG
, you mark the firewall as the "Master Device" and tell Panorama to store the groups learned from it.
flowchart TD LDAP[("LDAP/AD
Source of Groups")] -- "1. Reads Groups" --> MasterFW[(Master Device
Firewall)] subgraph PanoMgmt ["Panorama"] MasterDG["Master Device Group
(Contains MasterFW)"] PanoApp[Panorama Application] ChildDG["Prisma Access DG
(Parent = MasterDG)"] PolicyEditor["Policy Editor"] end MasterFW -- "2. Populates DG" --> MasterDG PanoApp -- "3. Retrieves
Group List" --> MasterDG PanoApp -- "4. Stores List" --> PanoDB[(Panorama
Group Cache)] PolicyEditor -- "5. Uses Cached
Group List" --> PanoDB PolicyEditor -- "6. Creates Policy
for Child DG" --> ChildDG style MasterFW fill:#cde,stroke:#333,stroke-width:2px style PanoApp fill:#ffc,stroke:#333
Mobile_User_Device_Group
).
Mobile_User_Device_Group
), you configure the
"Parent Device Group"
option.
Mobile_User_Device_Group
to be
Master-Firewall-DG
).
Master-Firewall-DG
)."
Master-Firewall-DG
in Panorama, not directly under the Prisma Access child groups. But the *Parent/Child link* is what makes those groups available and usable when you build policies targeting the Prisma Access child groups.
ou=Engineers,...
) directly in policies. Less convenient.
Master-DG-EMEA
,
Master-DG-APAC
).
graph TD subgraph Panorama_Mgmt ["Panorama"] MasterDG_A["Master DG A
(Master FW A)"] MasterDG_B["Master DG B
(Master FW B)"] PanoApp[Panorama Application] PrismaDG_A["Prisma Access DG A
(Parent=MasterDG_A)"] PrismaDG_B["Prisma Access DG B
(Parent=MasterDG_B)"] end LDAP_A[LDAP Region A] --> MasterDG_A LDAP_B[LDAP Region B] --> MasterDG_B PanoApp --> MasterDG_A PanoApp --> MasterDG_B PanoApp --> PrismaDG_A PanoApp --> PrismaDG_B style PanoApp fill:#ffc,stroke:#333 style PrismaDG_A fill:#eef,stroke:#333 style PrismaDG_B fill:#efe,stroke:#333
sequenceDiagram participant PA as Prisma Access participant OPFW1 as On-Prem FW 1 participant OPFW2 as On-Prem FW 2 participant PanoHub as Panorama / Log Collector Hub participant UserA participant UserB UserA ->> PA: Logs In (Mobile User) PA ->> PA: Learns Mapping (IP_A = UserA) PA ->> PanoHub: Send Mapping (IP_A = UserA) UserB ->> OPFW1: Logs In (Office User) OPFW1 ->> OPFW1: Learns Mapping (IP_B = UserB) OPFW1 ->> PanoHub: Send Mapping (IP_B = UserB) Note over PA OPFW2 PanoHub: Later, traffic requires mapping lookup PA ->> PanoHub: Query Mapping for IP_B? PanoHub -->> PA: Provide Mapping (IP_B = UserB) OPFW2 ->> PanoHub: Query Mapping for IP_A? PanoHub -->> OPFW2: Provide Mapping (IP_A = UserA)
mobile_user
connects via GlobalProtect, gets IP
10.100.1.5
.
10.100.1.5 = mobile_user
.
mobile_user
tries to access office server
192.168.1.50
.
10.100.1.5
is to apply user-based rules.
10.100.1.5
arrives, the On-Prem Firewall knows it's
mobile_user
and applies the correct policies.
192.168.1.100 = jdoe
and sends it TO Panorama/Log Collector.
192.168.1.100
reaches Prisma Access, it queries Panorama/Log Collector for the mapping.
192.168.1.100 = jdoe
from the hub, looks up groups (via Master Device link), and applies policy.
What is required in a Prisma Access deployment to allow Panorama to retrieve user group mappings for policy creation?
In a standalone Prisma Access deployment (without an on-prem/VM firewall), how can you implement User-ID based policies using group information?
When configuring a Master Device, where does the auto-population of users and groups occur?
To enable group mapping retrieval for mobile users via a Master Device, the Master Device Group should be configured as the Parent Device Group for which specific Prisma Access device group?
What is the primary purpose of redistributing User-ID information between Prisma Access and on-premises firewalls?
In the scenario where a mobile user connected to Prisma Access needs to access a resource behind an on-premises firewall, which direction should User-ID redistribution be configured?
When configuring redistribution FROM Prisma Access TO an on-premises firewall, where do you configure Prisma Access to act as the redistribution agent (collector)?
When configuring an on-premises firewall to receive redistributed mappings FROM Prisma Access, what information from Prisma Access do you need to enter on the on-premises firewall?
In the scenario where an HQ user behind an on-premises firewall needs to access a resource protected by Prisma Access, which direction should User-ID redistribution be configured?
When configuring Prisma Access (via Panorama) to receive redistributed mappings FROM an on-premises firewall, where do you typically add the on-premises firewall as a User-ID Agent/Source?