SlideShare une entreprise Scribd logo
1  sur  51
User-ID
User Expert Forum, 23 October 2013

Alberto Rivai, CCIE #20068, CISSP
Systems Engineer

© 2013 Palo Alto Networks. Proprietary and Confidential
Identification Technologies Transforming the Firewall

App-ID
Identify the application

User-ID
Identify the user

Content-ID
Scan the content
A-I-A

Authentication

Identification

The firewall
determines the
identity of the user
directly

Firewall learns the
identity of the user
from another, trusted
system

Authorization
Assigning rights to an
Authenticated user
User-ID Flow

A combination of
methods are used to
find User and Group
information and map
those Users to session
source IP address(es)
User-ID Session Information
• Each session contains source IP address and App-ID(s)
• User-ID maps a user name to the source IP address
• Security Policy can then use source user, source IP, and

App-ID as match criteria
Session from
172.16.19.10
contains uTorrent!!!

Which user is
logged in at
172.16.19.10???
User-ID Process
• Enumerating Users and Groups
• Mapping Users to IP addresses
Enumerating Users
and Groups

© 2013 Palo Alto Networks. Proprietary and Confidential
Enumerate Users and Groups
• Firewall accesses the directory via LDAP
-

Find specific users

-

Find groups and group membership

-

Maintain User-to-Group Mapping

Domain Controllers
LDAP Configuration
Group Mapping configuration

Default 60
seconds
Group Mapping configuration
Verify Group Mapping
admin@PA-VM> show user users-IDs

Verify members of the group mapping
Refresh Group Mapping
Refresh Group Mapping
admin@PA-VM> debug user-id refresh group-mapping all
Useful CLI Commands
admin@PA-VM> show user group list

admin@PA-VM> show user group name <groupname>
Useful CLI Commands
admin@PA-VM> show user group-mapping state all

admin@PA-VM> show user group-mapping statistics
Remember, by default the firewall directly through the MGT
port accesses the directory via LDAP

Domain Controllers

Select the check box if the User-ID
Agent is to be used as a LDAP
proxy instead of the firewall
connecting directly to the directory
service.
Mapping Users to IP
addresses

© 2013 Palo Alto Networks. Proprietary and Confidential
User-ID configuration Zone

192.168.6.4
User-ID Agent Types
Device > User Identification

Configured on the Firewall

Configured on
a Windows system
Mapping Users to IP
Addresses with Windows
Agent

© 2013 Palo Alto Networks. Proprietary and Confidential
Install Windows agent in any member server

• Local administrator
account
• Log on as service
• For Win2K8, Add the
service account user to
the “Event Log Reader”
and “Server Operator”
built in local security
groups in the domain.
• For Win2K3, the user
right “Manage auditing
and security log” must
be given to that
account.
Server Monitor Tab

How often new user
logins are detected by
reading the security log
on the AD server, 1
second default.
AD Security Logs
• By default Active Directory records the Username and IP

address of successful login events
• Agent must have rights to read the security log

Domain Controller 1
User-ID Agent

Domain Controller 2
AD Security Logs
• On Windows 2003 DCs:
-

672(Authentication Ticket Granted, which occurs on the logon
moment),

-

673(Service Ticket Granted)

-

674(Ticket Granted Renewed which may happen several times
during the logon session)

• On Windows 2008 DCs:
-

4768(Authentication Ticket Granted)

-

4769(Service Ticket Granted)

-

4770(Ticket Granted Renewed)
AD Security Logs
• The mappings will be maintained for a configurable time

out, which is recommended to be set to half the DHCP
lease time used in the environment.
• Client systems in an AD domain using the default

configuration will attempt to renew their tickets every 10
hours.
Server Monitor Tab

How often additional user →
IP address mappings are
derived by reading the
session table of active
resources on the AD server,
10 second default
Shared Server sessions
• When AD users connect to printer or file shares, the server

logs the user name and IP address.
• Will only refresh known User/IP mappings
• The agent must have rights to view the current open

sessions on the Domain Controller
• The agent will require Server Operator privileges to read

the session table.

User-ID Agent

Shared Server
Client Probing

How often the agent will
issue WMI/NETBIOS
queries to desktops, 20
minute default.
WMI Query
• If no mapping can be achieved with passive methods, the

Agent switches to active methods
• WMI queries can be sent to workstations to find users
-

Requires WMI be enabled on each system

User-ID Agent
WMI Query
• Each learned IP will be probed once per interval period.

• When receives an IP address that has no user data

associated with it, the firewall will send the IP to all the AD
agents configured and will request them to probe in order
to determine the user.
• This request will be added to the queue along with the

known IP addresses waiting to be polled. If the Agent is
able to determine the user IP based on the probe, the
information will be sent back to the firewall.
WMI Query
• The underlying WMI query that is sent can be simulated

with the following command, where remotecomputer would
be the IP address of the system being probed:
wmic /node:remotecomputer computersystem get username
Cache Tab

How long entries in the IP to
username cache kept by the agent
are valid. Current entries can be
viewed from the main User
Identification Agent Screen under
IP to Username Information, 45
minutes default.

The user ID cache timeout on the Windows agent only dictates
how long the mapping will live on the Agent itself. The firewall
will timeout all ip mappings in 60 minutes.
Agent Service Tab
Mapping Users to IP
Addresses with Firewall
Agent

© 2013 Palo Alto Networks. Proprietary and Confidential
WMI Authentication
Server Monitor

How often additional user →
IP address mappings are
derived by reading the
session table of active
resources on the AD server,
2 second default
How often the agent will
issue WMI queries to
desktops, 20 minute default.
Specify the collector name
if you want this firewall to
act as a user mapping
redistribution point for other
firewalls on your network.
The collector name and
pre-shared key are used
when configuring the UserID Agents on the firewalls
that will pull the user
mapping information.

Device -> user
Identification -> User-ID
Agents
Best practices

© 2013 Palo Alto Networks. Proprietary and Confidential
User Data Redistribution
• Firewalls can act as User Agents to each other for IP

Address mapping
• Enabled on interfaces as part of the interface management

profile
• Redistributes address mappings learned locally
-

Will redistribute Captive Portal and Global Protect users

-

Does not redistribute mappings learned from other agents
Windows
Server

UID Agent

GlobalProtect
Agent
Scaling to complex environments
Large / Distributed
Global Sites
DC’s in every location
Many AD domains or forests
Hundreds of Firewalls

Non AD
RADIUS Group based
Apple Open Directory
Other LDAP
Subscriber DB

Scores of VSYS
Solutions
Hardware Agents
Dedicated HW Agents
MS Log Forwarding

Solutions
API – Probably over SYSLOG
PAN-OS Agent vs. Software Agent
• Both read security logs from servers
• Hardware PAN-OS agent much more efficient for

bandwidth
Just User - IP
<< X MB

Full Security Log
X MB of data

Just required event ID’s
.05X MB of data
Microsoft Log forwarding
• Simplifies the DC environment for the Agent
• Great for rapidly expanding networks where tracking new

DC’s is difficult
• Built into Windows
Log forwarding
Agent reads logs

DC1

DC2
Member server

DC3
User-ID API

© 2013 Palo Alto Networks. Proprietary and Confidential
User-ID XML API
• API allows user data to be pulled from other sources on

the network
• Defines a XML payload sent to User-ID over SSL

•A script on an external
device uses the User-ID
API to send updates to
User-ID

User-ID updates
User-to-IP Mapping
on the firewall
Enabling User-ID Agent for User-ID API
• XML-formatted data is sent to the User-ID Agent

• Software agents must be

enabled to accept XML
API requests that then
sends it to the firewall via
SSL

• The PAN-OS agent is

always enabled
• A User-ID Agent

permission can be used to
create an administrator
account to accent XML API
connections
Additional User-ID API XML Request Options
<login>
Entry Timeout

<entry name=”domainuid1” ip=”10.1.1.1” timeout=“20”>
<groups>
<entry name=“finance-group”>
<members>
<entry name=”domainuid1”>

Local Group
Membership

<entry name=”domainuid2”>
</members>
</entry>
</groups>
<entry name=”domainuid1” ip=”10.1.1.1” timeout=“20”>

HIP Profile
Information

<hip-report>
…
</hip-report>
Use Case : Catholic Education SA
https://github.com/cesa
netwan/scripts/wiki/CE
Filter-UID-RADIUSscript

Microsoft AD,
DHCP and NPS

Microsoft AD,
DHCP and NPS
Resources
• https://live.paloaltonetworks.com
• https://live.paloaltonetworks.com/community/devcenter
• https://github.com/cesanetwan/scripts/wiki/CEFilter-UID-

RADIUS-script
User expert forum   user-id

Contenu connexe

Tendances

5 initial access to palo alto using cli
5 initial access to palo alto using cli5 initial access to palo alto using cli
5 initial access to palo alto using cliMostafa El Lathy
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall conceptsMostafa El Lathy
 
14 palo alto quality of service(qos) concept
14 palo alto quality of service(qos) concept14 palo alto quality of service(qos) concept
14 palo alto quality of service(qos) conceptMostafa El Lathy
 
7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces conceptsMostafa El Lathy
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy conceptsMostafa El Lathy
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configurationAlberto Rivai
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authenticationAlberto Rivai
 
2 what is the best firewall (sizing)
2 what is the best firewall (sizing)2 what is the best firewall (sizing)
2 what is the best firewall (sizing)Mostafa El Lathy
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy conceptsMostafa El Lathy
 
16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy conceptMostafa El Lathy
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyMostafa El Lathy
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...BAKOTECH
 

Tendances (20)

5 initial access to palo alto using cli
5 initial access to palo alto using cli5 initial access to palo alto using cli
5 initial access to palo alto using cli
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall concepts
 
14 palo alto quality of service(qos) concept
14 palo alto quality of service(qos) concept14 palo alto quality of service(qos) concept
14 palo alto quality of service(qos) concept
 
7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy concepts
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configuration
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
2 what is the best firewall (sizing)
2 what is the best firewall (sizing)2 what is the best firewall (sizing)
2 what is the best firewall (sizing)
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy concepts
 
Aruba OS 6.3 Command Line Interface Reference Guide
Aruba OS 6.3 Command Line Interface Reference GuideAruba OS 6.3 Command Line Interface Reference Guide
Aruba OS 6.3 Command Line Interface Reference Guide
 
16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept
 
Aruba mobility access switch useful commands v2
Aruba mobility access switch useful commands v2Aruba mobility access switch useful commands v2
Aruba mobility access switch useful commands v2
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
 
Firewall
FirewallFirewall
Firewall
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 

En vedette

Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logicAlberto Rivai
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configurationAlberto Rivai
 
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideAlberto Rivai
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using YubikeyPalo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using YubikeyAlberto Rivai
 
Cross-device tracking with Google Analytics - Thomas Danniau @ gaucBE
Cross-device tracking with Google Analytics - Thomas Danniau @ gaucBECross-device tracking with Google Analytics - Thomas Danniau @ gaucBE
Cross-device tracking with Google Analytics - Thomas Danniau @ gaucBEThe Reference
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2samis
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networksdtimal
 
Vfm website-projects
Vfm website-projectsVfm website-projects
Vfm website-projectsvfmindia
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180Suresh Kumar
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
 
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...Netgear Italia
 
Concepts: Management VLAN
Concepts: Management VLANConcepts: Management VLAN
Concepts: Management VLANJelmer de Reus
 
TechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerTechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerRobb Boyd
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from cachingvfmindia
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1vfmindia
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 

En vedette (20)

Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
 
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using YubikeyPalo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
 
Cross-device tracking with Google Analytics - Thomas Danniau @ gaucBE
Cross-device tracking with Google Analytics - Thomas Danniau @ gaucBECross-device tracking with Google Analytics - Thomas Danniau @ gaucBE
Cross-device tracking with Google Analytics - Thomas Danniau @ gaucBE
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
 
PAN Platform Summary
PAN Platform SummaryPAN Platform Summary
PAN Platform Summary
 
FlexPod_for_HondaTH
FlexPod_for_HondaTHFlexPod_for_HondaTH
FlexPod_for_HondaTH
 
NATE-Central-Log
NATE-Central-LogNATE-Central-Log
NATE-Central-Log
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networks
 
Vfm website-projects
Vfm website-projectsVfm website-projects
Vfm website-projects
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
 
Concepts: Management VLAN
Concepts: Management VLANConcepts: Management VLAN
Concepts: Management VLAN
 
TechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerTechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data Broker
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from caching
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 

Similaire à User expert forum user-id

The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewNick Owen
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsSandeep Patil
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7EAE
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdfDeepakAC3
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner BusinesstoVirtual
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
Nava SIEM Agent Datasheet
Nava SIEM Agent DatasheetNava SIEM Agent Datasheet
Nava SIEM Agent DatasheetLinkgard
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campOlav Tvedt
 
Cryptzone: The Software-Defined Perimeter
Cryptzone: The Software-Defined PerimeterCryptzone: The Software-Defined Perimeter
Cryptzone: The Software-Defined PerimeterCryptzone
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgEric Vanderburg
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Amazon Web Services
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 

Similaire à User expert forum user-id (20)

The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems Overview
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for Protocols
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
Null talk
Null talkNull talk
Null talk
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate Presentation
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
 
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Nava SIEM Agent Datasheet
Nava SIEM Agent DatasheetNava SIEM Agent Datasheet
Nava SIEM Agent Datasheet
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
 
Cryptzone: The Software-Defined Perimeter
Cryptzone: The Software-Defined PerimeterCryptzone: The Software-Defined Perimeter
Cryptzone: The Software-Defined Perimeter
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
 
Ekran system functions v. 5.0
Ekran system functions v. 5.0Ekran system functions v. 5.0
Ekran system functions v. 5.0
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

User expert forum user-id

  • 1. User-ID User Expert Forum, 23 October 2013 Alberto Rivai, CCIE #20068, CISSP Systems Engineer © 2013 Palo Alto Networks. Proprietary and Confidential
  • 2. Identification Technologies Transforming the Firewall App-ID Identify the application User-ID Identify the user Content-ID Scan the content
  • 3. A-I-A Authentication Identification The firewall determines the identity of the user directly Firewall learns the identity of the user from another, trusted system Authorization Assigning rights to an Authenticated user
  • 4. User-ID Flow A combination of methods are used to find User and Group information and map those Users to session source IP address(es)
  • 5. User-ID Session Information • Each session contains source IP address and App-ID(s) • User-ID maps a user name to the source IP address • Security Policy can then use source user, source IP, and App-ID as match criteria Session from 172.16.19.10 contains uTorrent!!! Which user is logged in at 172.16.19.10???
  • 6. User-ID Process • Enumerating Users and Groups • Mapping Users to IP addresses
  • 7. Enumerating Users and Groups © 2013 Palo Alto Networks. Proprietary and Confidential
  • 8. Enumerate Users and Groups • Firewall accesses the directory via LDAP - Find specific users - Find groups and group membership - Maintain User-to-Group Mapping Domain Controllers
  • 12. Verify Group Mapping admin@PA-VM> show user users-IDs Verify members of the group mapping
  • 14. Refresh Group Mapping admin@PA-VM> debug user-id refresh group-mapping all
  • 15. Useful CLI Commands admin@PA-VM> show user group list admin@PA-VM> show user group name <groupname>
  • 16. Useful CLI Commands admin@PA-VM> show user group-mapping state all admin@PA-VM> show user group-mapping statistics
  • 17. Remember, by default the firewall directly through the MGT port accesses the directory via LDAP Domain Controllers Select the check box if the User-ID Agent is to be used as a LDAP proxy instead of the firewall connecting directly to the directory service.
  • 18. Mapping Users to IP addresses © 2013 Palo Alto Networks. Proprietary and Confidential
  • 20. User-ID Agent Types Device > User Identification Configured on the Firewall Configured on a Windows system
  • 21. Mapping Users to IP Addresses with Windows Agent © 2013 Palo Alto Networks. Proprietary and Confidential
  • 22. Install Windows agent in any member server • Local administrator account • Log on as service • For Win2K8, Add the service account user to the “Event Log Reader” and “Server Operator” built in local security groups in the domain. • For Win2K3, the user right “Manage auditing and security log” must be given to that account.
  • 23. Server Monitor Tab How often new user logins are detected by reading the security log on the AD server, 1 second default.
  • 24. AD Security Logs • By default Active Directory records the Username and IP address of successful login events • Agent must have rights to read the security log Domain Controller 1 User-ID Agent Domain Controller 2
  • 25. AD Security Logs • On Windows 2003 DCs: - 672(Authentication Ticket Granted, which occurs on the logon moment), - 673(Service Ticket Granted) - 674(Ticket Granted Renewed which may happen several times during the logon session) • On Windows 2008 DCs: - 4768(Authentication Ticket Granted) - 4769(Service Ticket Granted) - 4770(Ticket Granted Renewed)
  • 26. AD Security Logs • The mappings will be maintained for a configurable time out, which is recommended to be set to half the DHCP lease time used in the environment. • Client systems in an AD domain using the default configuration will attempt to renew their tickets every 10 hours.
  • 27. Server Monitor Tab How often additional user → IP address mappings are derived by reading the session table of active resources on the AD server, 10 second default
  • 28. Shared Server sessions • When AD users connect to printer or file shares, the server logs the user name and IP address. • Will only refresh known User/IP mappings • The agent must have rights to view the current open sessions on the Domain Controller • The agent will require Server Operator privileges to read the session table. User-ID Agent Shared Server
  • 29. Client Probing How often the agent will issue WMI/NETBIOS queries to desktops, 20 minute default.
  • 30. WMI Query • If no mapping can be achieved with passive methods, the Agent switches to active methods • WMI queries can be sent to workstations to find users - Requires WMI be enabled on each system User-ID Agent
  • 31. WMI Query • Each learned IP will be probed once per interval period. • When receives an IP address that has no user data associated with it, the firewall will send the IP to all the AD agents configured and will request them to probe in order to determine the user. • This request will be added to the queue along with the known IP addresses waiting to be polled. If the Agent is able to determine the user IP based on the probe, the information will be sent back to the firewall.
  • 32. WMI Query • The underlying WMI query that is sent can be simulated with the following command, where remotecomputer would be the IP address of the system being probed: wmic /node:remotecomputer computersystem get username
  • 33. Cache Tab How long entries in the IP to username cache kept by the agent are valid. Current entries can be viewed from the main User Identification Agent Screen under IP to Username Information, 45 minutes default. The user ID cache timeout on the Windows agent only dictates how long the mapping will live on the Agent itself. The firewall will timeout all ip mappings in 60 minutes.
  • 35. Mapping Users to IP Addresses with Firewall Agent © 2013 Palo Alto Networks. Proprietary and Confidential
  • 37. Server Monitor How often additional user → IP address mappings are derived by reading the session table of active resources on the AD server, 2 second default
  • 38. How often the agent will issue WMI queries to desktops, 20 minute default.
  • 39. Specify the collector name if you want this firewall to act as a user mapping redistribution point for other firewalls on your network. The collector name and pre-shared key are used when configuring the UserID Agents on the firewalls that will pull the user mapping information. Device -> user Identification -> User-ID Agents
  • 40. Best practices © 2013 Palo Alto Networks. Proprietary and Confidential
  • 41. User Data Redistribution • Firewalls can act as User Agents to each other for IP Address mapping • Enabled on interfaces as part of the interface management profile • Redistributes address mappings learned locally - Will redistribute Captive Portal and Global Protect users - Does not redistribute mappings learned from other agents Windows Server UID Agent GlobalProtect Agent
  • 42. Scaling to complex environments Large / Distributed Global Sites DC’s in every location Many AD domains or forests Hundreds of Firewalls Non AD RADIUS Group based Apple Open Directory Other LDAP Subscriber DB Scores of VSYS Solutions Hardware Agents Dedicated HW Agents MS Log Forwarding Solutions API – Probably over SYSLOG
  • 43. PAN-OS Agent vs. Software Agent • Both read security logs from servers • Hardware PAN-OS agent much more efficient for bandwidth Just User - IP << X MB Full Security Log X MB of data Just required event ID’s .05X MB of data
  • 44. Microsoft Log forwarding • Simplifies the DC environment for the Agent • Great for rapidly expanding networks where tracking new DC’s is difficult • Built into Windows Log forwarding Agent reads logs DC1 DC2 Member server DC3
  • 45. User-ID API © 2013 Palo Alto Networks. Proprietary and Confidential
  • 46. User-ID XML API • API allows user data to be pulled from other sources on the network • Defines a XML payload sent to User-ID over SSL •A script on an external device uses the User-ID API to send updates to User-ID User-ID updates User-to-IP Mapping on the firewall
  • 47. Enabling User-ID Agent for User-ID API • XML-formatted data is sent to the User-ID Agent • Software agents must be enabled to accept XML API requests that then sends it to the firewall via SSL • The PAN-OS agent is always enabled • A User-ID Agent permission can be used to create an administrator account to accent XML API connections
  • 48. Additional User-ID API XML Request Options <login> Entry Timeout <entry name=”domainuid1” ip=”10.1.1.1” timeout=“20”> <groups> <entry name=“finance-group”> <members> <entry name=”domainuid1”> Local Group Membership <entry name=”domainuid2”> </members> </entry> </groups> <entry name=”domainuid1” ip=”10.1.1.1” timeout=“20”> HIP Profile Information <hip-report> … </hip-report>
  • 49. Use Case : Catholic Education SA https://github.com/cesa netwan/scripts/wiki/CE Filter-UID-RADIUSscript Microsoft AD, DHCP and NPS Microsoft AD, DHCP and NPS
  • 50. Resources • https://live.paloaltonetworks.com • https://live.paloaltonetworks.com/community/devcenter • https://github.com/cesanetwan/scripts/wiki/CEFilter-UID- RADIUS-script