User-ID™ is a cornerstone technology in Palo Alto Networks Next-Generation Firewalls (NGFWs) that enables organizations to integrate user identity information into their security policies. By identifying users rather than just IP addresses, administrators can create more granular and effective security rules, gain better visibility into network activity, and simplify incident response. In environments utilizing multi-virtual systems (multi-vsys) on a single Palo Alto Networks firewall, managing User-ID information across these isolated logical firewalls can become complex.
To address this, PAN-OS® allows for the designation of one virtual system as a User-ID Hub . This hub vsys acts as a centralized repository and distribution point for IP-address-to-username mappings and user-to-group mappings. Other vsys (spoke vsys) on the same physical firewall can then leverage these mappings from the hub, ensuring consistent user identification and policy enforcement across the entire multi-vsys deployment without requiring redundant User-ID configurations on each vsys.
Palo Alto Networks designed the User-ID Hub feature to address specific challenges in multi-vsys environments:
Understanding these Palo Alto Networks-specific concepts is essential for deploying and managing a User-ID Hub:
Configuring a User-ID Hub involves steps on the designated hub vsys and on the spoke vsys that will consume the mappings.
This vsys will collect and distribute User-ID information.
Using the PAN-OS Web Interface:
Device > Virtual Systems
.
Device > User Identification
.
Device > User Identification > Group Mapping Settings
on the hub vsys. Add your LDAP server profiles and define group include lists.
Using the PAN-OS CLI:
admin@PA-VM> configure Entering configuration mode [edit] admin@PA-VM# set vsys <hub_vsys_name> system user-id-hub yes admin@PA-VM# set vsys <hub_vsys_name> user-id-agent <agent_name> server <server_ip_or_name> admin@PA-VM# set vsys <hub_vsys_name> user-id-agent <agent_name> type "active-directory" admin@PA-VM# set vsys <hub_vsys_name> group-mapping <group_mapping_profile_name> group-include-list <list_name> admin@PA-VM# commit
Spoke vsys are configured to receive mappings from the hub. They should not be configured as User-ID hubs themselves, and generally should not have overlapping User-ID source configurations unless specific local overrides are intended.
Using the PAN-OS Web Interface:
Device > Virtual Systems
.
Using the PAN-OS CLI:
Ensure the spoke vsys is not a hub:
admin@PA-VM> configure Entering configuration mode [edit] admin@PA-VM# set vsys <spoke_vsys_name> system user-id-hub no admin@PA-VM# commit
After configuration, verify that mappings are being shared:
show user ip-user-mapping all
show user ip-user-mapping allLook for mappings where the source indicates they came from the hub (e.g., "Hub").
show user group listGroups learned by the hub should be visible here.
show user ip-user-mapping ip <IP_ADDRESS>
on the spoke vsys and check the 'Source' or 'Vsys' field for the mapping's origin.
This diagram illustrates a Palo Alto Networks firewall in multi-vsys mode. The VSYS Hub is designated as the User-ID Hub. It collects IP-to-user mappings from various sources like Active Directory (via direct server monitoring or a Windows User-ID Agent), GlobalProtect VPN users, Syslog sources, and XML API feeds. The User-ID Hub then distributes these consolidated mappings to all spoke vsys (VSYS Spoke 1, 2, N) within the same firewall chassis.
This sequence diagram shows how the User-ID Hub VSYS on a Palo Alto Networks firewall aggregates mappings from different sources. A Windows User-ID Agent forwards a mapping from an AD DC. A GlobalProtect user connection provides another mapping directly. The Hub VSYS itself might also use Server Monitoring to learn mappings. All these collected mappings are then distributed to spoke vsys.
This diagram illustrates the traffic flow when a user initiates traffic through a spoke vsys (VSYS2) in an environment with a User-ID Hub. 1. VSYS2 first checks its local User-ID cache for a mapping associated with the source IP address. 2. If a local mapping exists (e.g., learned via a Captive Portal directly on VSYS2), it takes precedence. 3. If no local mapping is found, VSYS2 queries the User-ID Hub VSYS for the mapping. The hub provides the mapping if available. 4. VSYS2 then uses the identified user in its security policy evaluation before forwarding traffic to the resource.
Effective monitoring and troubleshooting are key to maintaining a healthy User-ID Hub deployment.
Monitor > User-ID
: Shows current IP-to-user mappings, group mappings, and server monitoring status.
Monitor > Logs > User-ID
: Displays User-ID related events, such as users logging in/out, agent connections, and errors.
Device > User Identification > User Mapping > Palo Alto Networks User-ID Agent Setup (gear icon)
: Check connectivity status for Server Monitoring and connected User-ID Agents.
Monitor > User-ID
: View mappings. Pay attention to the "Source" or "Vsys" column to distinguish hub-provided mappings from local ones.
Monitor > Logs > User-ID
: Can show events related to receiving mappings or local User-ID activities.
These commands are invaluable for troubleshooting. Remember to execute them in the correct vsys context (
set system session vsys <vsys_name>
if not in the global context or using a vsys-specific CLI prompt).
On the User-ID Hub VSYS:
show user ip-user-mapping all
: Displays all learned IP-to-user mappings.
show user ip-user-mapping ip <ip_address>
: Shows mapping for a specific IP.
show user group list
: Lists all known groups.
show user group name <group_name>
: Shows users in a specific group.
show user server-monitor statistics
: Status of AD server monitoring.
show user user-id-agent statistics
: Status of connected User-ID agents.
show system setting user-id-agent user-id-hub
: Verifies if the vsys is configured as a hub.
debug user-id dump {ip-user-map | group-map | server-monitor-state | user-id-agent-state}
: Dumps detailed internal User-ID information. Use with caution.
less mp-log useridd.log
: View the User-ID daemon logs for detailed troubleshooting.
less mp-log gpsrv.log
: View GlobalProtect service logs if GP is a mapping source.
show user ...
commands for verifying User-ID operations. Knowing where to find logs (
useridd.log
) is also important for deeper troubleshooting.
On a Spoke VSYS:
show user ip-user-mapping all
: View mappings. Check source to ensure hub mappings are present.
show user ip-user-mapping ip <ip_address>
: Check a specific mapping and its source.
show user group list
: Verify groups from the hub are available.
show user ip-user-mapping ip <ip_address>
on the spoke.
useridd.log
on the hub for errors related to that source.
For the PCNSE certification, a thorough understanding of the User-ID Hub is essential. Key areas include:
show user ip-user-mapping
,
show user group list
,
show user server-monitor statistics
, etc.) on both hub and spoke vsys.
Expect scenario-based questions where you need to identify the correct configuration, troubleshoot a User-ID problem involving a hub, or explain the flow of User-ID information.