When a single Palo Alto Networks firewall is configured with multiple virtual systems (vsys), each vsys typically operates with its own independent configuration context, including its own User-ID mappings. Without a sharing mechanism, this means:
PAN-OS provides a mechanism to centralize User-ID mapping collection and distribution within a multi-vsys firewall. This involves designating one specific virtual system as the User-ID Hub .
You can choose to share one or both types of mappings from the Hub:
You must select at least one mapping type to enable the Hub functionality.
If a spoke vsys needs mapping information for a user/IP:
Conclusion: Local mappings learned directly by a spoke vsys always take precedence over mappings shared from the Hub.
Select one existing vsys to act as the central User-ID Hub. This vsys should ideally have reliable network connectivity to your User-ID sources (DCs, LDAP servers, User-ID Agents).
Device > Virtual Systems
Edit
.
IP User Mapping
User Group Mapping
Device > User Identification > User Mapping > Server Monitoring
)
Device > User Identification > Group Mapping Settings
&
Device > Server Profiles > LDAP
)
Device > User Identification > User-ID Agents
)
Commit the configuration on the firewall.
Ensure firewall rules and potentially Service Routes allow the necessary communication between the Hub vsys's management interface (or specified service route interface) and the directory servers/User-ID agents.
Use CLI commands to verify the hub configuration and mapping distribution:
show user user-id-agent statistics
: Shows which vsys is configured as the hub.
show user ip-user-mapping all virtual-system
: Shows IP-to-User mappings available on a specific spoke vsys (will include mappings learned from the hub if local mapping doesn't exist).
show user group list virtual-system
: Shows groups available for policy on a spoke vsys (sourced from the hub if configured).
show user group name "
" virtual-system
: Shows members of a specific group as known by the spoke vsys (retrieved from hub).
show user group-mapping state all virtual-system
: Checks the group mapping connection status *on the hub*.
For the PCNSE exam, regarding sharing User-ID across vsys:
1. What is the primary benefit of configuring a User-ID Hub in a multi-vsys environment?
2. Where is a virtual system designated as a User-ID Hub in the PAN-OS GUI?
3. Which two types of User-ID mappings can be shared from a User-ID Hub vsys? (Select two)
4. After enabling a vsys as a User-ID Hub, what critical configuration step MUST be performed for the hub to function correctly?
5. A spoke vsys (vsys2) needs user information for IP 10.1.1.100. It has a local mapping for this IP learned via Captive Portal. The User-ID Hub (vsys1) also has a mapping for 10.1.1.100 learned via Server Monitoring. Which mapping will vsys2 use for policy enforcement?
6. Which type of User-ID mapping source is explicitly NOT shared via the User-ID Hub mechanism?
7. What is a primary benefit of consolidating Group Mapping configuration onto a User-ID Hub vsys?
8. Which CLI command helps verify which vsys is acting as the User-ID Hub?
9. When configuring a User-ID Hub, why is it important to remove redundant User-ID source configurations (like Server Monitoring) from the spoke virtual systems?
10. A firewall has vsys1 (Hub) and vsys2 (Spoke). Group Mapping is configured only on vsys1 and shared. A Security Policy on vsys2 uses the AD group 'Engineers'. How does vsys2 identify members of the 'Engineers' group?