Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x-enabled wireless network device that has no native integration with PAN-OS® software?
A global corporate office has a large-scale network with only one User-ID agent, which creates a bottleneck near the User-ID agent server. Which solution in PAN-OS® software would help in this case?
Which User-ID method should be configured to map IP addresses to usernames for users connected through a terminal server?
Which data flow describes redistribution of user mappings?
A company manages Prisma Access using Panorama and uses on-premises Active Directory (AD) for user groups. How can policies based on AD group mapping be learned and enforced in Prisma Access?
A company has 10 Active Directory domain controllers spread across multiple WAN links with substantial bandwidth. The firewall's management plane is highly utilized. Given this scenario, which type of User-ID agent deployment is considered a best practice by Palo Alto Networks?
A company is using wireless controllers to authenticate users. Which source should be used for User-ID mappings?
What are three valid methods of collecting User-ID information in a network? (Choose three.)
An engineer needs to collect User-ID mappings from the company’s existing proxies. What two methods can be used to pull this data from third party proxies? (Choose two.)
Which feature can provide NGFWs with User-ID mapping information when users connect remotely?
Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)
An administrator needs to build Security rules in a Device Group that allow traffic to specific users and groups defined in Active Directory. What must be configured in order to select users and groups for those rules from Panorama?
A network security administrator has an environment with multiple forms of authentication (wireless NAC, Windows DCs, MDM). All devices log authentication events. What is the best choice for deploying User-ID to ensure maximum coverage?
Your company occupies one floor in a single building with two AD domain controllers. The firewall’s management-plane resources are lightly utilized. Given this environment, which User-ID collection method is sufficient?
After some firewall configuration changes, application identification fails, and sessions show as unknown-tcp. A high number of sessions are going to a discard state. What change could cause this?
An administrator configures a Windows User-ID agent. The company uses four AD servers (192.168.28.32/28) and two Exchange servers (192.168.28.48/28), all within 192.168.28.32/27. What info is needed in the User Identification > Discovery section?
Which source is the most reliable for collecting User-ID user mapping?
Which two profiles should be configured when sharing tags from threat logs with a remote User-ID agent? (Choose two.)
A customer wants to deploy User-ID on an NGFW with multiple vsys. One vsys will support a GlobalProtect portal and gateway. The customer uses Windows AD. What is the most operationally efficient way to redistribute the most accurate IP addresses to username mappings?
Which User-ID method maps IP addresses to usernames for users connecting through a web proxy that has already authenticated the user?
A company wants to use their Active Directory groups to simplify their Security policy creation from Panorama. Which configuration is necessary to retrieve groups from Panorama?
An engineer creates a set of rules in a Device Group (Panorama) to permit traffic to various services for a specific LDAP user group. What needs to be configured to ensure Panorama can retrieve user and group information for use in these rules?
An engineer needs to redistribute User-ID mappings from multiple data centers. Which data flow best describes redistribution of user mappings?