PAN-OS: User-ID Data Redistribution

What is User-ID Data Redistribution?

User-ID Data Redistribution refers to the mechanisms within PAN-OS for sharing IP address-to-username mappings learned by one component (like a User-ID Agent or Panorama) with other PAN-OS devices (firewalls or other agents). The goal is to ensure that multiple enforcement points have consistent and up-to-date User-ID information without requiring each device to independently query all the original mapping sources.

This is essential in environments with multiple firewalls, geographically distributed locations, or centralized management scenarios, where user identity is critical for enforcing user-based security policies .

Why Use User-ID Redistribution?

Basic User-ID Flow (Without Redistribution)

Each firewall independently collects mappings.

Redistribution Mechanism: Panorama Distribution

How Panorama Acts as a Redistributor

Using Panorama as the central User-ID redistributor is the most common and recommended best practice for environments managed by Panorama. It provides a single point for collecting, consolidating, and distributing user-mapping information.

In this model, Panorama is configured to gather IP-to-user mappings from various sources such as:

Panorama consolidates all this information into its central mapping table. Managed firewalls are then configured to receive their User-ID mappings directly from Panorama , rather than connecting to the original sources (like agents or DCs) themselves.

In-depth Explanation: Panorama Workflow

  1. Mapping Collection: Panorama's Collector Groups (or Panorama acting as an agent) connect to configured identity sources (Agents, DCs via Server Monitoring, CIE, etc.) and pull/receive mapping updates (IP-User, IP-User-Group).
  2. Consolidation: Panorama maintains a comprehensive and up-to-date mapping table based on data received from all its configured sources. It handles potential conflicts or overlapping data.
  3. Redistribution: Via the Panorama management connection, the consolidated mapping table is pushed down to the managed firewalls. The firewalls are configured to accept these mappings from Panorama.
  4. Policy Enforcement: Managed firewalls use the mapping table received from Panorama to identify users by their IP addresses and apply user-based security policies.

Configuration Steps (Conceptual)

While exact steps vary slightly by version, the general flow is:

  1. On Panorama:
    • Configure Collector Groups under Panorama > Collector Groups .
    • Add Agents ( Agent tab) or Server Monitoring ( Server Monitoring tab) to the Collector Group.
    • Configure Group Mapping on Panorama if needed ( Panorama > User Identification > Group Mapping Settings ).
    • Ensure redistribution is enabled (often under Panorama > User Identification > Setup or within Collector Group settings).
  2. On Managed Firewalls:
    • Configure User-ID setup under Device > User Identification > Setup .
    • Crucially, configure the firewall to Retrieve User Mapping from Panorama . This is typically a checkbox or option.
    • Remove/Disable any direct connections configured under Device > User Identification > User-ID Agents if those agents are already being monitored by Panorama.
  3. Commit changes on Panorama and Push configuration to the managed firewalls.

Panorama Redistribution Flow

Panorama collects from multiple sources and pushes consolidated mappings to managed firewalls.

Understanding the Panorama redistribution model is critical for the PCNSE exam. Know that Panorama centralizes collection and pushes to firewalls, and firewalls should NOT connect directly to agents if Panorama is the redistributor.

Redistribution Mechanism: User-ID Agent Push

How Agents Push Mappings Directly

In environments where Panorama is not used, or for specific network segments, a Windows User-ID Agent or a firewall running the PAN-OS Integrated User-ID Agent can be configured to directly push mappings to one or more specified firewalls . This allows a single agent collecting data to feed multiple enforcement points.

This differs from the Panorama model where the firewall primarily receives mappings from Panorama. Here, the firewalls are configured to explicitly trust and receive mappings from the Agent's IP address.

Configuration Steps (Conceptual)

  1. On the User-ID Agent (Windows software or Integrated Agent configuration on a firewall):
    • Configure the agent to collect mappings from identity sources (DCs, etc.).
    • Define the list of destination firewalls (by management IP address) that this agent should send mappings to. This is typically done within the Agent's configuration interface.
  2. On the receiving Firewalls:
    • Configure User-ID setup under Device > User Identification > Setup .
    • Under Device > User Identification > User-ID Agents , add the IP address(es) of the User-ID Agent(s) that will be pushing mappings to this firewall.
      Firewalls listen on TCP/5007 by default to receive pushes from Agents. Ensure a security rule or service route allows this traffic to the firewall's management interface or a dedicated data interface configured for User-ID.
  3. Commit changes on the firewall(s).

Agent Push Redistribution Flow

A single User-ID Agent pushes mappings directly to multiple firewalls.

Know the direct Agent-to-Firewall push model as an alternative to Panorama, especially for smaller deployments or specific use cases. Remember the default port TCP/5007 and the firewall configuration location ( Device > User Identification > User-ID Agents ).

Redistribution Mechanism: High Availability (HA) Synchronization

Automatic Sync in HA Pairs

Within a High Availability (HA) pair of Palo Alto Networks firewalls (Active/Passive or Active/Active), User-ID mappings, along with session state, configuration, and other runtime information, are automatically synchronized between the peers over the dedicated HA links.

This synchronization ensures that if a failover occurs, the new active firewall already has the vast majority of the necessary user-mapping information to continue enforcing policies for existing and new sessions without significant interruption or the need to re-collect all mappings.

How it Works (Conceptual)

HA Synchronization Flow (User-ID Mappings)

User-ID mappings are automatically synced between HA peers.

Remember that HA synchronization is the built-in mechanism for sharing mappings between HA peers. You don't configure Agent push or Panorama redistribution *between* the peers; they receive mappings from upstream sources and sync them automatically.

Redistribution Mechanism: Cloud Identity Engine (CIE)

Role of CIE in User-ID Redistribution

The Palo Alto Networks Cloud Identity Engine (CIE) is a modern, cloud-based service designed to centralize identity information from various sources, especially SaaS applications and cloud directories like Azure AD and Okta. CIE significantly enhances User-ID capabilities, particularly in cloud-centric and hybrid environments.

CIE can act as a primary source for user and group information, including IP-to-user mappings. It integrates with your identity providers and provides a consolidated view that PAN-OS devices (Panorama and firewalls) can consume.

How CIE Integrates with User-ID

There are typically two main ways PAN-OS devices leverage CIE for User-ID:

  1. CIE as a Source for Panorama: Panorama can be configured to connect to CIE to retrieve user and group information. Panorama then includes this information in the consolidated mapping table it redistributes to its managed firewalls. This is the most common approach in Panorama-managed environments.
  2. CIE as a Direct Source for Firewalls: Firewalls (especially those not managed by Panorama or in specific deployments) can potentially connect directly to CIE to obtain identity information.

CIE provides APIs that firewalls and Panorama use to query or subscribe to identity updates.

Benefits of Using CIE for Redistribution

CIE Integration Flow

CIE integrates various sources and provides identity data to Panorama/Firewalls.

CIE represents a shift towards cloud-delivered identity. Understand its role as a centralized source for user/group mapping and how Panorama/Firewalls connect to it. It's increasingly relevant for hybrid/cloud deployments.

Configuration & Practice: Panorama Configuration Recap

Recap: Configuring Panorama as the Central Source

As highlighted earlier, configuring Panorama to collect and redistribute User-ID mappings is the recommended approach for managed devices.

Key configuration areas on Panorama include:

Once configured on Panorama, these settings, including the collected mapping tables, are pushed down to the managed firewalls via Device Group and Template/Template Stack configurations. The firewalls receive the complete mapping table from Panorama and use it locally.

Be familiar with the different places you configure User-ID sources and settings on Panorama. Know that Group Mapping is a separate, but often necessary, part of the User-ID setup for policy enforcement using user groups.

Configuration & Practice: General Best Practices

Implementing User-ID data redistribution effectively requires following several best practices:

These best practices, especially avoiding conflicting sources and understanding necessary ports, are frequently tested on the PCNSE. Pay close attention to the connectivity requirements and the recommendation to centralize with Panorama.

Configuration & Practice: Caveats and Gotchas

While powerful, User-ID redistribution has potential pitfalls:

"Gotcha" scenarios related to conflicting configurations, network connectivity/ports, and troubleshooting steps are prime candidates for exam questions.

Configuration & Practice: Troubleshooting User-ID

Troubleshooting User-ID issues, especially involving redistribution, requires a systematic approach:

  1. Verify Connectivity: Use ping, traceroute, and telnet/test-port to ensure network paths are open between:
    • Identity Source (DC, WLC, etc.) <--> Collector (Agent, Integrated Agent, Panorama, CIE Connector)
    • Collector (Agent, Panorama, CIE) <--> Firewall(s) (specifically on TCP/5007 for pushes, or relevant API ports for CIE)
    • Firewall <--> DNS Servers
    • Firewall/Panorama <--> LDAP Servers (for Group Mapping)
    Check Service Routes if non-management interfaces are used for User-ID traffic.
  2. Check Service/Agent Status:
    • Windows Agent: Check the Windows service status and the agent's logs.
    • Integrated Agent: Check the User-ID process status on the firewall CLI ( show system process list | match useridd ).
    • Panorama: Check Collector Group and Agent status on the Panorama GUI and CLI.
    • Firewall: Check User-ID status ( show user user-id-agent state , show user user-id-service status ).
    • CIE: Check connection status on Panorama/Firewall and the CIE cloud portal health.
  3. Inspect Logs:
    • Firewall: User-ID logs ( show user log read ), System logs.
    • Panorama: User-ID logs, System logs.
    • Windows Agent: Application event logs on the Windows server.
    • DCs: Security event logs (4624/4625 for logon/logoff).
  4. Verify Mappings:
    • Firewall CLI: show user ip-user-mapping all , show user ip-user-mapping state all . Filter by IP or user.
    • Panorama CLI: show user panorama ip-user-mapping all (if Panorama is the source).
    • Windows Agent GUI: Check the live user list.
    Look for missing mappings, stale entries, or flapping mappings for a specific IP.
  5. Check Configuration: Double-check firewall and Panorama User-ID configuration, especially the source of mappings (direct agent vs. Panorama), agent IP addresses, and port settings. Ensure no conflicting mapping sources are configured on the firewall.
  6. Policy Check: Ensure the security policies are configured to use User/Group objects and that the User-ID feature is enabled in the relevant security zones.
Troubleshooting command-line utilities are essential for the PCNSE. Practice using commands like show user ip-user-mapping all and checking service status. Understand the logical flow of data from source to enforcement point to diagnose where mappings are breaking.

User-Based Automation: Automated Quarantine

How User-ID Enables Automated Quarantine

User-ID mappings are fundamental to implementing automated quarantine policies based on user behavior. Since policies can identify traffic by the user accessing a resource, this allows the firewall to log security events (threats, URL filtering blocks, WildFire verdicts) against that specific user identity.

Automated quarantine leverages these user-associated security logs as triggers to automatically restrict or block traffic for the user responsible for the suspicious activity, regardless of their IP address changing (within the mapping's validity).

Mechanism for Automated Quarantine

Common approaches involve using User-ID in conjunction with Dynamic Address Groups (DAGs) and automation:

  1. Security Policy & Logging: Configure security policies that use User-ID and apply security profiles (Antivirus, Anti-Spyware, Vulnerability Protection, URL Filtering, WildFire). Ensure logging is enabled for relevant threat/traffic events. Logs will contain the User and Source IP information thanks to User-ID.
  2. Log Forwarding / SNMP Traps: Forward relevant logs (e.g., Critical Severity Threats, High Severity URL blocks, WildFire Malware verdicts) from the firewall (or Panorama) to an external system or generate SNMP traps.
  3. Automation Engine: An external system (e.g., scripts, SOAR platform, logging server with alerting) or built-in firewall automation responds to these specific log events.
  4. Identify User and IP: The automation extracts the User and the associated IP address from the log event.
  5. Update Dynamic Address Group: The automation engine uses the firewall's/Panorama's XML API to add the user's current IP address to a predefined Dynamic Address Group (DAG).
    The DAG is defined on the firewall/Panorama using a matching criterion like type dynamic match "suspect_user_tag" .
  6. Apply Quarantine Policy: A dedicated security policy is configured higher in the rulebase, matching the User (or Any) and the Quarantine DAG (Destination/Source). This policy is configured to block all traffic, limit bandwidth, or redirect traffic for IPs contained within the DAG.
  7. Expiration: Configure the DAG entries or the automation logic to automatically remove the IP from the DAG after a set time.

User-ID is the critical component that links the suspicious IP seen in the log to the specific user, allowing the automation to update the DAG effectively and quarantine the user regardless of them potentially getting a new IP address later (as long as User-ID learns the new mapping).

Automated Quarantine Flow

Automated Quarantine workflow leveraging User-ID and DAGs.

Automated quarantine is an application of User-ID. Understand that it requires associating logs with users (User-ID), triggering automation, and using DAGs via API to enforce policies dynamically.

Exam & Quiz: PCNSE Exam Focus

For the PCNSE exam (and practical administration), a strong understanding of User-ID redistribution is essential. Key areas to focus on include:

Focus on the interaction points between components (Agent->FW/Pano, Pano->FW, Source->Agent/Pano/CIE) and the associated ports and configuration locations. Pay extra attention to scenarios involving Panorama managing firewalls and how that impacts the firewall's local User-ID config.

Exam & Quiz: User-ID Redistribution Quiz

Test your knowledge on User-ID data redistribution and related concepts.

1. What is the primary benefit of using Panorama for User-ID data redistribution in a large network?

Correct Answer: b) Panorama centralization is key for scale and consistency. Options a, c, and d are incorrect statements about Panorama redistribution.

2. A managed firewall receives User-ID mappings from Panorama. If the Windows User-ID Agent (Agent-1) feeding Panorama directly pushes mappings to this same firewall, what is a likely outcome?

Correct Answer: c) Configuring a firewall to receive mappings from multiple sources for the same users is a common "gotcha" that leads to conflicts and unstable mappings.

3. What is the default TCP port used by a Windows User-ID Agent to push IP-to-User mappings to a firewall or Panorama?

Correct Answer: a) TCP/5007 is the default port for agent push communication. 443 is for HTTPS, 135 is WMI, and 389 is LDAP.

4. Where on a firewall managed by Panorama would you configure it to receive User-ID mappings from Panorama?

Correct Answer: d) The general User-ID setup section is where you configure how the firewall obtains mappings, including retrieving them from Panorama. Option a is for receiving directly from an agent.

5. How are User-ID mappings typically synchronized between two firewalls in an Active/Passive HA configuration?

Correct Answer: b) HA synchronization is an automatic feature that includes sharing User-ID mappings for seamless failover.

6. What is a key advantage of deploying the PAN-OS Integrated User-ID Agent compared to the Windows User-ID Agent?

Correct Answer: d) The Integrated Agent runs directly on the firewall, saving a dedicated Windows server OS license and hardware/VM overhead.

7. Which component is responsible for resolving IP addresses to user group memberships (e.g., "Domain Admins") for use in security policies?

Correct Answer: a) Group Mapping is the specific function within User-ID responsible for querying directory services (like LDAP) to determine which groups a mapped user belongs to.

8. In the context of automated quarantine, how does User-ID facilitate identifying the user responsible for suspicious activity?

Correct Answer: b) User-ID's core function is creating the IP-to-User mapping. When a log is generated, this mapping is included, allowing automation to identify the user associated with the suspicious IP.

9. Which Palo Alto Networks component is a cloud-based service that can consolidate identity information from various sources (AD, Azure AD, Okta, etc.) and serve as a User-ID source for firewalls and Panorama?

Correct Answer: c) The Cloud Identity Engine (CIE) is the cloud service specifically designed for this centralized identity collection and distribution role.

10. What CLI command on a firewall is used to view the currently active IP-to-User mappings?

Correct Answer: a) `show user ip-user-mapping all` displays the entire IP-to-User mapping table on the firewall. Option b checks the process, c is not a valid command, and d tests policy matching.

11. When Panorama is configured to collect mappings from a Windows User-ID Agent, what is the communication path between the agent and Panorama?

Correct Answer: c) Windows User-ID Agents are configured to push collected mappings to configured listening devices, which can be firewalls or Panorama.

12. Which of the following is NOT a typical method for a User-ID Agent to collect mappings from a Domain Controller?

Correct Answer: d) Agents use WMI/RPC, event log monitoring, and NetBIOS probes to learn mappings from DCs. ICMP is for network reachability, not mapping collection.

13. If a firewall is configured for Agentless User-ID (Server Monitoring), which protocol is typically used by the firewall to query Domain Controllers for logon/logoff events?

Correct Answer: b) Agentless User-ID typically uses WMI/RPC to query the security event logs on Domain Controllers.

14. A network segment cannot directly route to the corporate Domain Controllers. Which User-ID strategy is best suited to provide mappings to a firewall in this segment?

Correct Answer: a) Redistribution is designed for scenarios where the enforcement point (firewall) cannot directly reach the identity source. A central collector acts as an intermediary. Options b requires direct DC access, c is user-disruptive, and d is less reliable for comprehensive mapping.

15. You are troubleshooting why a firewall managed by Panorama isn't seeing current user mappings. You've verified the Agent is sending mappings to Panorama. What is a likely next step on the firewall CLI?

Correct Answer: c) Checking the User-ID service status (`show user user-id-service status`) on the firewall itself is a crucial step to ensure the process receiving mappings from Panorama is running and connected. Option a tests policy, b is not a standard command, and d clears mappings which you don't want to do yet.

16. When using automated quarantine with Dynamic Address Groups (DAGs), what typically adds or removes IP addresses from the DAG?

Correct Answer: d) DAGs used for automated quarantine are typically populated and de-populated via external automation interacting with the firewall/Panorama API.

17. What information from a security log event is correlated with the User-ID mapping to identify the user for automated quarantine?

Correct Answer: a) User-ID mappings are IP-to-User. The source IP address in the security log is used to look up the user associated with that IP at the time of the event.

18. A firewall is using Agentless User-ID to monitor Domain Controllers. What kind of network issue would MOST likely prevent the firewall from collecting new mappings?

Correct Answer: b) Agentless User-ID needs WMI/RPC access to query DC event logs. A firewall rule blocking this specific traffic would stop mapping collection. Option a affects web browsing, c is a performance issue, and d is relevant for Agent-based, not Agentless.

19. Where on Panorama do you configure connections to Windows User-ID Agents?

Correct Answer: a) Agents are configured within Collector Groups on Panorama. Option b is for general setup, c is not the correct path, and d is the firewall's local config which should be empty when Panorama is used.

20. What is the primary purpose of User-ID data redistribution in enabling user-based security policies?

Correct Answer: c) Policies use user identity (user/group objects). Redistribution ensures the firewall knows which user corresponds to which IP address seen in traffic, allowing those user-based policies to be enforced correctly.