Users Guide

Table Of Contents
Dell Networking W-Series ArubaOS 6.5.x | User Guide Palo Alto Networks Firewall Integration | 672
Chapter 30
Palo Alto Networks Firewall Integration
User-Identification (User-ID) feature of the Palo Alto Networks (PAN) firewall allows network administrators to
configure and enforce firewall policies based on user and user groups. The User-ID identifies the user on the
network based on the IP address of the device which the user is logged into. Additionally, a firewall policy can
be applied based on the type of device the user is using to connect to the network. Since the Dell controller
maintains the network and user information of the clients on the network, it is the best source to provide the
information for the User-ID feature on the PAN firewall.
The procedures in this chapter describe the steps to integrate a Palo Alto Networks firewall with a master or local
controller. For details on configuring PAN firewall integration with a branch office controller, see Branch
Integration with a Palo Alto Networks (PAN) Portal on page 218
This feature introduces the following interactions with PAN firewall servers running PAN-OS 5.0 or later::
l Send logon events to the PAN firewall for the client with its IP address user name, device type, when
classified.
l Send logout events to PANfirewalls for the client with its IPaddress.
The following must be configured on the PAN Firewall:
l An Admin account must be created on the PAN firewall to allow the controller to send data to the PAN
firewall. This account must match the account added in the PAN profile on the controller. The built-in Admin
account can be used for this purpose, but that is not recommended. It is better to create a new Admin
account used solely for the purpose of communications between the controller and PANfirewall.
l Preconfiguration of PAN Host Information Profile (HIP) objects and HIP-profiles on the PAN Firewall to
support a device-type based policy.
To enable these features, the following must be configured on the controller:
l The system-wide PAN profile must be properly configured and made active on the controller.
l The pan-integration parameter in the AAA profile which the client is associated with must be enabled.
l For VPN clients, enable the pan-integration parameter in the VPN authentication profile which the client is
associated.
l For VIA clients, enable the pan-integration parameter in the VIA authentication profile to which the client
is associated.
Limitation
Keep the following limitation in mind when configuring PANFirewall Integration. PANFirewall Integration does
not support bridge forwarding mode.
Preconfiguration on the PANFirewall
Before PANFirewall configuration is completed on the controller, some configuration must be completed on
the PANFirewall.