Step-by-Step Palo Alto Windows User-ID Agent Setup Guide [2024]

Поделиться
HTML-код
  • Опубликовано: 4 ноя 2024

Комментарии • 31

  • @netsums
    @netsums  11 месяцев назад

    FREE Palo Alto Cheat Sheet in different formats and further FREE resources: netsums.com/resources

  • @maozkaufmann5255
    @maozkaufmann5255 Месяц назад

    You are amazing.
    Funny to think nobody in this world has provided updated videos on how to do things with Palo Alto.

    • @netsums
      @netsums  14 дней назад

      Thank you for the comment, I'm glad you like the videos!

  • @RishiRap
    @RishiRap 11 месяцев назад

    As usual, Great content! Always looking forward to your new meaningful and informational videos.

    • @netsums
      @netsums  11 месяцев назад

      Thank you for the comment, I'm glad you liked the video!

  • @diwakarkumar3216
    @diwakarkumar3216 11 месяцев назад

    Love from India. ❤ Your are doing great contribution for upcoming generation. Please make full course video. It will be helpful if you help me in enabling Google authenticator in GP-VPN❤❤❤

    • @netsums
      @netsums  10 месяцев назад

      Thank you for the lovely comnent, I will try!

  • @smakersify
    @smakersify 9 месяцев назад

    Excellent buddy, subbed

    • @netsums
      @netsums  9 месяцев назад

      Thank you! I'm glad you liked it!

  • @normannueno2872
    @normannueno2872 3 месяца назад

    Awesome!!!

    • @netsums
      @netsums  3 месяца назад

      Thank you, I'm glad you liked the video. 😊

  • @blackknight985
    @blackknight985 5 месяцев назад

    Excellent video! just a quick question, how did you get rid of the warning message about API Key after committing the changes?

    • @netsums
      @netsums  5 месяцев назад

      Can you post here the warning message you're getting?

  • @RishiRap
    @RishiRap 11 месяцев назад +1

    You configured a security policy with zone "lab2" for both src and dst close to 9.50 timeline. Isn't Intra-zone policy is default and allows "all"? Please clarify. Thanks.

    • @netsums
      @netsums  11 месяцев назад +1

      You're 100% correct, this rule wouldn't be necessary with standard default rules. But I personally am not a big fan of intra-zone allow as default, so I have in my lab an override with a deny for my intra-zone default rule. So I had to add this rule. But nice caught! :-)

  • @diwakarkumar3216
    @diwakarkumar3216 11 месяцев назад

    Please keep making videos on all topics

    • @netsums
      @netsums  10 месяцев назад

      I will try my best!

  • @juliaperez9958
    @juliaperez9958 3 месяца назад

    Thank you, this is very helpful. With this setup, user mapping is working, but server monitoring under User-Identification-user mapping isn't. Do you have any suggestions to get server monitoring to work

    • @netsums
      @netsums  3 месяца назад +1

      Thank you for the comment. You don't need to configure anything in the server monitoring if you have a windows based User-ID agent. If you are trying to configure the PAN-OS User-ID agent, I would suggest you to think about the windows based agent, in my experience it's a lot less problematic to setup.

    • @juliaperez9958
      @juliaperez9958 3 месяца назад

      @@netsums Thank you very much for the advice. I will give that a try.

  • @fisa6835
    @fisa6835 3 месяца назад

    Hallo, I'd like to ask, can I use this way to allow users that already join domain (AD users) to bypass captive portal and non ad users has to go to captive portal?

  • @潘群崴
    @潘群崴 Месяц назад

    Sorry to bother you, but I have a question. I have completed the User ID Agent configuration, and I can see the user information under MONITOR > User ID. However, only the user information is currently displayed. How can I configure it to display the group information as well?

    • @netsums
      @netsums  Месяц назад +1

      Hi. You probably need gouo mapping. Take a look at this video, there is a session there that I show how it can be configured:
      ruclips.net/video/PUF1hAF60AY/видео.htmlsi=sKaytILFlLi2klYD
      Let me know later if the video could help you solve the problem. :-)

  • @brianleb
    @brianleb 2 месяца назад

    How would I setup multiple firewalls to use the CA generated on one firewall?

    • @brianleb
      @brianleb 2 месяца назад

      Answer is to export the CA cert from the originating firewall and then import it on each additional PA and setup the in a Cert Profile and attach that to the UserID Connection Security

  • @ADempsey
    @ADempsey 2 месяца назад

    If we use a public cert from globalsign will it be generated on the UserID server or from the Palo?

    • @netsums
      @netsums  2 месяца назад

      You need to install the certificate on the User-ID server.

  • @Domesteron1998
    @Domesteron1998 9 месяцев назад

    Idk what is wrong, for me not working redestribute status is "No"..

    • @netsums
      @netsums  8 месяцев назад

      Sorry for the late reply.
      Hard to say, many reasons:
      - Port 5007 not being allowed
      - Certificate not bein able to validate (does it work without certificate validation?). Use Packet Capture to debug it
      - Pre-shared Key not matching...
      What error messages are you receiving?

    • @KyleLilleyBPS
      @KyleLilleyBPS 6 месяцев назад +1

      @@netsums **excellent** video, worked perfectly. only extra thing related to this fellas question is we needed to add a windows firewall rule to allow the 5007 traffic before it would allow the communication

    • @netsums
      @netsums  6 месяцев назад

      Thank you for the reply!