SlideShare une entreprise Scribd logo
1  sur  13
Palo Alto Networks PANOS 6.1,
Cisco WLC 5500, Kiwi Syslogd
integration guide
Alberto Rivai
Systems Engineer – Major Accounts
Palo Alto Networks
Melbourne, Australia
Summary
 PAN-OS 6.0 introduced the ability to use the Palo Alto Networks firewall and
the User-ID Agent as a syslog listener for collecting syslogs from different
systems in the network, and to map users to IP addresses. The user to IP
mappings could be used in security rules and policies.
 The problem with Cisco Wireless LAN Controller, it does not send successful
user authentication message through syslog. Cisco WLC generates SNMP
traps which we can utilize to get the user to IP mapping.
 This document shows a quick configuration guide on how to configure Cisco
WLC to send SNMP traps to Kiwi Syslogd, which then converts and forwards
the messages through syslog protocol to Palo Alto Networks syslog receiver.
2 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Cisco WLC configuration
 Create SNMP receiver by going to Management tab and Trap Receivers
3 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Kiwi Syslogd configuration - 1
 Open Kiwi Syslog server console, go to File -> Setup
 Right click on Actions and create a new action
4 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Kiwi Syslogd configuration - 2
 Select Forward to another host
 Enter the IP address of the Palo Alto Networks syslog receiver
5 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Palo Alto Networks configuration - 1
 Login to the WebUI
 Go to Device -> User Identification
 Click on the gear icon on the Palo Alto Networks User ID Agent setup window
6 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Palo Alto Networks configuration - 2
 Go to Syslog Filters tab and click Add
 Select Field Identifier
7 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Palo Alto Networks configuration - 3
 Use the below identifier to identify the syslog message
 Event String : enterprise=1.3.6.1.4.1.9.9.599.0.4
 Username Prefix : 1.3.6.1.4.1.9.9.599.1.3.1.1.27.0=
 Username Delimiter : ,
 Address Prefix : cldcClientIPAddress.0=
 Address Delimiter : ,
8 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Palo Alto Networks configuration - 4
 Add Server Monitoring, go to Device – User Identification and click Add under
Server Monitoring window
 Select type : Syslog Sender and enter the IP address of Kiwi Syslogd server
9 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Palo Alto Networks configuration - 5
 Verify that the Syslog receiver is enabled
 Go to Device – Setup – Management – Management Interface Setting
10 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Verify syslog receiver
 Execute the below command
 admin@PA-200-arivai> show user server-monitor <syslog
receiver name>
 You will see the number of log messages increasing
11 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Verify syslog receiver
 To identify if the syslog receiver successfully parsed the message and identify
users, execute the below command
 admin@PA-200-arivai> show user ip-user-mapping all type
SYSLOG
12 | ©2014, Palo Alto Networks. Confidential and Proprietary.
13 | ©2014, Palo Alto Networks. Confidential and Proprietary.

Contenu connexe

Tendances

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloud
xKinAnx
 
Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
Jimmy Saigon
 

Tendances (20)

Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Aruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPassAruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPass
 
Differences of the Cisco Operating Systems
Differences of the Cisco Operating SystemsDifferences of the Cisco Operating Systems
Differences of the Cisco Operating Systems
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Introduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management SolutionIntroduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management Solution
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloud
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building Blocks
 
Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1Barry Hesk: Cisco Unified Communications Manager training deck 1
Barry Hesk: Cisco Unified Communications Manager training deck 1
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Sensu Monitoring
Sensu MonitoringSensu Monitoring
Sensu Monitoring
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 

En vedette

F5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer TrainingF5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer Training
F5 Networks
 

En vedette (20)

Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configuration
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
 
Unified Access Update - 11AC and Switching Platform
Unified Access Update - 11AC and Switching PlatformUnified Access Update - 11AC and Switching Platform
Unified Access Update - 11AC and Switching Platform
 
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design session
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wireless
 
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using YubikeyPalo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
 
Datasheet Cisco AP1600series, AP2600series, AP Controller 2500 series
Datasheet Cisco AP1600series, AP2600series, AP Controller 2500 seriesDatasheet Cisco AP1600series, AP2600series, AP Controller 2500 series
Datasheet Cisco AP1600series, AP2600series, AP Controller 2500 series
 
BACIK CISCO SKILLS
BACIK CISCO SKILLSBACIK CISCO SKILLS
BACIK CISCO SKILLS
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager Ds
 
Nat
NatNat
Nat
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
NAT Traversal
NAT TraversalNAT Traversal
NAT Traversal
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
 
F5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer TrainingF5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer Training
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
 

Similaire à Cisco Wireless LAN Controller Palo Alto Networks Config Guide

25.3.11 packet tracer logging from multiple sources
25.3.11 packet tracer   logging from multiple sources25.3.11 packet tracer   logging from multiple sources
25.3.11 packet tracer logging from multiple sources
Freddy Buenaño
 
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docxCopyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
bobbywlane695641
 
CaseStudy_4_Master
CaseStudy_4_MasterCaseStudy_4_Master
CaseStudy_4_Master
Brian Lawson
 
Ccnp iscw lab guide
Ccnp iscw lab guideCcnp iscw lab guide
Ccnp iscw lab guide
VNG
 

Similaire à Cisco Wireless LAN Controller Palo Alto Networks Config Guide (20)

CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
CCNA_RSE_Chp10.pptx
CCNA_RSE_Chp10.pptxCCNA_RSE_Chp10.pptx
CCNA_RSE_Chp10.pptx
 
25.3.11 packet tracer logging from multiple sources
25.3.11 packet tracer   logging from multiple sources25.3.11 packet tracer   logging from multiple sources
25.3.11 packet tracer logging from multiple sources
 
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docxCopyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
 
Cisco acs configuration guide
Cisco acs configuration guideCisco acs configuration guide
Cisco acs configuration guide
 
Clearswift f5 implementation_technical guide
Clearswift f5 implementation_technical guideClearswift f5 implementation_technical guide
Clearswift f5 implementation_technical guide
 
Ap config
Ap configAp config
Ap config
 
IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
 
LTRSEC-2017-LG
LTRSEC-2017-LGLTRSEC-2017-LG
LTRSEC-2017-LG
 
CaseStudy_4_Master
CaseStudy_4_MasterCaseStudy_4_Master
CaseStudy_4_Master
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
 
Network topology by essay corp uk
Network topology by essay corp ukNetwork topology by essay corp uk
Network topology by essay corp uk
 
Prévention et détection des mouvements latéraux
Prévention et détection des mouvements latérauxPrévention et détection des mouvements latéraux
Prévention et détection des mouvements latéraux
 
Ccnp iscw lab guide
Ccnp iscw lab guideCcnp iscw lab guide
Ccnp iscw lab guide
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Cisco Wireless LAN Controller Palo Alto Networks Config Guide

  • 1. Palo Alto Networks PANOS 6.1, Cisco WLC 5500, Kiwi Syslogd integration guide Alberto Rivai Systems Engineer – Major Accounts Palo Alto Networks Melbourne, Australia
  • 2. Summary  PAN-OS 6.0 introduced the ability to use the Palo Alto Networks firewall and the User-ID Agent as a syslog listener for collecting syslogs from different systems in the network, and to map users to IP addresses. The user to IP mappings could be used in security rules and policies.  The problem with Cisco Wireless LAN Controller, it does not send successful user authentication message through syslog. Cisco WLC generates SNMP traps which we can utilize to get the user to IP mapping.  This document shows a quick configuration guide on how to configure Cisco WLC to send SNMP traps to Kiwi Syslogd, which then converts and forwards the messages through syslog protocol to Palo Alto Networks syslog receiver. 2 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 3. Cisco WLC configuration  Create SNMP receiver by going to Management tab and Trap Receivers 3 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 4. Kiwi Syslogd configuration - 1  Open Kiwi Syslog server console, go to File -> Setup  Right click on Actions and create a new action 4 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 5. Kiwi Syslogd configuration - 2  Select Forward to another host  Enter the IP address of the Palo Alto Networks syslog receiver 5 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 6. Palo Alto Networks configuration - 1  Login to the WebUI  Go to Device -> User Identification  Click on the gear icon on the Palo Alto Networks User ID Agent setup window 6 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 7. Palo Alto Networks configuration - 2  Go to Syslog Filters tab and click Add  Select Field Identifier 7 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 8. Palo Alto Networks configuration - 3  Use the below identifier to identify the syslog message  Event String : enterprise=1.3.6.1.4.1.9.9.599.0.4  Username Prefix : 1.3.6.1.4.1.9.9.599.1.3.1.1.27.0=  Username Delimiter : ,  Address Prefix : cldcClientIPAddress.0=  Address Delimiter : , 8 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 9. Palo Alto Networks configuration - 4  Add Server Monitoring, go to Device – User Identification and click Add under Server Monitoring window  Select type : Syslog Sender and enter the IP address of Kiwi Syslogd server 9 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 10. Palo Alto Networks configuration - 5  Verify that the Syslog receiver is enabled  Go to Device – Setup – Management – Management Interface Setting 10 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 11. Verify syslog receiver  Execute the below command  admin@PA-200-arivai> show user server-monitor <syslog receiver name>  You will see the number of log messages increasing 11 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 12. Verify syslog receiver  To identify if the syslog receiver successfully parsed the message and identify users, execute the below command  admin@PA-200-arivai> show user ip-user-mapping all type SYSLOG 12 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 13. 13 | ©2014, Palo Alto Networks. Confidential and Proprietary.