It's important to remember that while Panorama primarily manages your firewalls, using it for User-ID redistribution ties it more closely into your network's operations. Typically, you wouldn't need to worry about Panorama going down because the firewalls can function without Panorama. However, when you start using Panorama for User-ID redistribution, it becomes a crucial part of your network. Fortunately, most setups include a backup Panorama, so downtime shouldn't be a concern. Let’s get started and see how this works in practice.
Please note that this setup doesn't require dedicated 'User-ID Agents' running on separate servers if the firewalls themselves can collect the necessary information (e.g., via DC monitoring or GP).
In this example, let's consider a scenario where we have a main headquarters firewall (HQ-FW) that collects User-ID mappings in various ways (e.g., reading directly from the Domain Controller, receiving Syslog messages, or Global Protect VPN connections). We also have users working from branch offices connecting via Global Protect VPN to their respective branch firewalls (Branch-FW).
If we want to allow access to resources regardless of where the user is located, creating rules based on User-ID (username/group) is much more flexible than using just IP addresses.
Here's the challenge: if a user connects to a Branch-FW and tries to access a resource at HQ, how will the HQ-FW recognize this user and apply the correct policies? This is where User-ID redistribution becomes essential.
We can configure our firewalls so that all of them send their learned User-ID mappings TO Panorama. Additionally, the firewalls can also be configured to receive User-ID mappings FROM Panorama. This creates a hub-and-spoke topology with Panorama as the central hub, rather than a complex full mesh where every firewall would need direct connections to every other firewall.
This hub-and-spoke approach simplifies the architecture by centralizing the distribution of User-ID information through Panorama.
In summary, the goal is for every firewall to send its learned user-id mappings to Panorama, and also for every firewall to receive the complete set of mappings from Panorama.
To set up the redistribution of User-ID mappings to Panorama, you’ll need to configure both the individual firewalls and Panorama itself.
Please note that the configuration steps might differ slightly if you are using PanOS version 9.x . This example is based on PanOS 10.x , so keep that in mind when following these instructions. (In 10.x, the relevant menu is generally under "Data Redistribution" instead of "User Identification > User Mapping" for redistribution settings).
After you have configured all firewalls to send their User-ID mappings, you will need to configure Panorama to receive these mappings.
Now that we’ve set up the firewalls to send their User-ID mappings to Panorama, let’s configure Panorama to receive these mappings.
Navigate to Panorama > Data Redistribution > Agents . Here, Add a new agent entry for each firewall that will be sending mappings.
Once Panorama is configured to receive the mappings from all firewalls, the next step is to configure the firewalls to receive the aggregated User-ID mappings *back* from Panorama. This completes the information sharing loop.
For the final step in setting up User-ID redistribution, go to each firewall (HQ-FW, Branch-FWs...) and navigate to Device > Data Redistribution > Agents .
That wraps up configuring User-ID redistribution with Panorama as a central hub across multiple firewalls. Now, when a user connects to Global Protect VPN through a branch firewall, their User-IP mapping is sent to Panorama. Panorama then redistributes this mapping (along with mappings from HQ and other branches) back to all connected firewalls. All firewalls will eventually have a consistent view of User-IP mappings across the network. This same process applies to mappings learned via Active Directory monitoring or Syslog.