Dynamic User Groups (DUGs) in PAN-OS allow for powerful, context-aware policy enforcement by grouping users based on dynamic tags rather than static directory membership. However, for DUGs to function correctly, several underlying components and configurations must be in place. Understanding these requirements is crucial for successful implementation.
The "dynamic" aspect of DUGs comes from the tags applied to user mappings. You need a mechanism to generate and assign these tags:
GlobalProtect Host Information Profile (HIP) Checks:
Objects > GlobalProtect
), and HIP data collection enabled in the GP Agent configurations.
User-ID XML API / REST API:
VM Information Sources (Panorama/VMware Integration):
Panorama > Cloud Services > Configuration
).
Cloud Identity Engine (CIE):
Objects > Dynamic User Groups
Policies > Security
(or QoS, Decryption, Authentication)
Component/Feature | Requirement Summary | Primary Configuration Area |
---|---|---|
Base User-ID | Functional IP-to-User mapping from any standard source (Server Mon, GP, CP, API, Syslog etc.). |
Device > User Identification
|
Tag Source (Choose at least one) | A mechanism to associate tags with IP/User mappings. |
-
Objects > GlobalProtect
(HIP)
- API Configuration (External System) -
Panorama > Cloud Services
(VM Info)
- Cloud Identity Engine Config |
Dynamic User Group Object | Definition of the group based on matching specific tags. |
Objects > Dynamic User Groups
|
Policy Utilising DUG | Security, QoS, Decryption, or Authentication rules referencing the DUG name. |
Policies > [Policy Type]
(Source User field)
|
Network Connectivity | Allow communication between tag sources, firewall/Panorama, and clients as needed. | Firewall Rules, Routing, Interface Config |
(Optional) Group Mapping | Needed if combining DUG context with static group membership in policies. |
Device > User Identification > Group Mapping Settings
|
For the PCNSE exam, understand these requirements for DUGs: