User-ID™ technology is a cornerstone of Palo Alto Networks' Next-Generation Firewalls (NGFWs), enabling policies based on user and group identities rather than just IP addresses. In distributed network environments, ensuring that all firewalls have consistent and up-to-date user-to-IP address mappings is critical for uniform security policy enforcement and visibility. User-ID redistribution is the Palo Alto Networks mechanism designed to achieve this by allowing User-ID information, along with other identity-related data, to be shared efficiently across multiple PAN-OS devices (firewalls and Panorama) and User-ID agents.
Without redistribution, each firewall would need to independently learn all user mappings, leading to redundant configurations, increased load on authentication sources (like Active Directory domain controllers), and potential inconsistencies. Redistribution centralizes or distributes the collection of User-ID information and then disseminates it to other firewalls that require it for policy enforcement.
Palo Alto Networks User-ID redistribution is not limited to just IP-to-username mappings. The "Data Redistribution" framework in PAN-OS supports sharing various types of security-related information:
Choosing the right redistribution architecture is crucial for scalability, performance, and manageability. Palo Alto Networks supports several models:
In this model, one or more central PAN-OS devices (firewalls or Panorama) or Windows-based User-ID agents act as "hubs" (collectors/redistribution points). These hubs gather User-ID information from various sources (e.g., domain controllers, Syslog, GlobalProtect Gateways) and then redistribute it to multiple "spoke" firewalls (clients/subscribers).
Palo Alto Networks Hub-and-Spoke User-ID Redistribution: A central Hub Firewall collects User-ID and HIP data from various sources and redistributes it to Spoke Firewalls.
Advantages:
Considerations:
For larger, geographically dispersed organizations, a multi-hub model can be implemented. Regional hubs (PAN-OS firewalls, Panorama, or Windows User-ID agents) collect User-ID information for their respective regions. These regional hubs can then redistribute information to local spoke firewalls. Optionally, regional hubs can also redistribute information among themselves, creating a more resilient and scalable architecture.
Palo Alto Networks Multi-Hub User-ID Redistribution: Regional Hubs collect local User-ID data and redistribute to local spokes. Hubs can also exchange information for broader visibility.
Advantages:
Considerations:
In a hierarchical model, User-ID information flows upwards through layers of firewalls. For example, branch firewalls might collect local User-ID information and redistribute it to a regional firewall. The regional firewall aggregates this information and may redistribute it further up to a central/data center firewall or Panorama.
Palo Alto Networks Hierarchical User-ID Redistribution: Branch firewalls send User-ID data to regional firewalls, which then aggregate and send to a central firewall or Panorama.
Advantages:
Considerations:
Panorama can act as a dedicated, centralized User-ID hub, collecting mappings from various sources including Windows User-ID agents, PAN-OS integrated agents on firewalls, and directly from Syslog sources. Panorama then redistributes these mappings to its managed firewalls. This is a highly recommended approach for large-scale deployments.
Palo Alto Networks Panorama as a Central User-ID Hub: Panorama collects User-ID information from diverse sources and redistributes it to all managed firewalls, simplifying large-scale User-ID deployments.
Advantages using Panorama:
Prisma Access, Palo Alto Networks' SASE solution, also relies on User-ID for policy enforcement for remote users and branch offices. User-ID information can be redistributed between on-premises Palo Alto Networks firewalls/Panorama and Prisma Access. This ensures consistent policy application regardless of where the user is connecting from.
This is typically configured using Panorama to manage the redistribution settings for Prisma Access and the on-premises environment.
The configuration involves setting up the "Collector" (the device sending User-ID information) and the "Agent" or "Client" (the device receiving the information). The newer "Data Redistribution" framework is generally preferred for its broader capabilities, but traditional User-ID agent redistribution is also common.
This device collects User-ID information and redistributes it. This can be a PAN-OS firewall, Panorama, or a Windows-based User-ID agent.
On a PAN-OS Firewall acting as a Collector:
Device > User Identification
. In the
Palo Alto Networks User-ID Agent Setup
section, click the gear icon for
Redistribution
.
Device > Data Redistribution > Collector Settings
.
Example: Include 192.168.1.0/24, Exclude 10.0.0.0/8
Redistribution
tab.
This PAN-OS firewall receives User-ID information from a collector.
Device > User Identification
. In the
User-ID Agents
tab, click
Add
. (This path is typically used when connecting to a Windows User-ID Agent or another PAN-OS firewall configured for User-ID agent redistribution).
Device > Data Redistribution > Agents
and click
Add
.
For User-ID redistribution traffic to be correctly sourced from the firewall and routed, especially if the redistribution collector/client communication uses a data plane interface instead of the management interface, a service route might be necessary.
Device > Setup > Services > Service Route Configuration
.
Network > Network Profiles > Interface Mgmt
).
On the PAN-OS CLI:
show user user-id-agent state all show user ip-user-mapping all type UIA // Shows mappings learned via User-ID Agent show user ip-tag-mapping all // Shows IP-to-tag mappings show user user-tag-mapping all // Shows user-to-tag mappings show high-availability data-forwarding statistics // If HA Data Link is used for redistribution sync
show user user-id-agent statistics // Shows connected clients and mapping counts show data-redistribution collector statistics // For Data Redistribution framework
tcpdump
or via GUI
Monitor > Packet Capture
) can be used to verify traffic flow on port 5007.
Monitor > Logs > System
) will show events related to User-ID agent connections and disconnections. Filter for `( subtype eq user-id )`.
In an HA pair, User-ID mappings and other redistributed data are synchronized between the active and passive firewalls.
Ensure HA link health and sufficient bandwidth for synchronization.
Filtering (Include/Exclude lists) is crucial for performance. Redistributing unnecessary mappings consumes bandwidth, CPU, and memory on both collector and client firewalls.
The number of user mappings a firewall can store depends on the model. Exceeding these limits can lead to performance degradation or loss of older mappings.
ping
,
traceroute
, and packet captures.
less mp-log useridd.log
. On collector:
less mp-log useridmc.log
(for User-ID Main Collector process).
show system resources
.
// Example debug commands (use with caution and under guidance of Palo Alto Networks support) debug user-id set tracecuts on debug user-id dump entry ip <IP_address> debug user-id on demand-poll server <server_name> ip <ip_address>