<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Cisco concentrator/ISE - USER-ID log to PA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582095#M116441</link>
    <description>&lt;P class="Bj-Wd gLCoR" data-pm-slice="1 1 []"&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;, thank you very much for your time and thanks for your advice.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Yes, the issue here is also in the filtering needed for the&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Log-In and Log-OFF.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;So yes in this case I would also need that information from the ISE.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Now that I see it, I doubt that this information is sent from the ISE, maybe the login or that the connection was validated from the ASA to the ISE to authenticate and validate the user and already indicates OK, I am not sure if when the Cisco Anyconnect client exits the ASA, the ASA indicates to the ISE that the user released the session and performed the log-off.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Because if not, I would only apply the User Identification Timeout (default 45 min) to release the user mapping, thinking that I will only have the login or the successful validation of the ISE, but not the logoff.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;User Identification Timeout (min)&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Set the timeout value in minutes for user mapping entries (range is 1 to 3,600; default is 45).&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;What do you think, any advice, recommendation or detail to consider ?&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;I remain attentive&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Best regards&lt;/P&gt;</description>
    <pubDate>Fri, 29 Mar 2024 05:18:11 GMT</pubDate>
    <dc:creator>Metgatz</dc:creator>
    <dc:date>2024-03-29T05:18:11Z</dc:date>
    <item>
      <title>VPN Cisco concentrator/ISE - USER-ID log to PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/580977#M116320</link>
      <description>&lt;P&gt;USER-ID log from VPN Cisco concentrator&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dear Live community, how is everything going ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you ever had to do the following?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have to integrate a Cisco ASA, with Palo Alto, so that the PA receives from a Cisco ASA and/or Cisco ISE the users to be able to have mapper with USER-ID the users that connect by VPN. ( There is no global protect )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Details:&lt;/P&gt;
&lt;P&gt;Cisco ASA --- Cisco ISE ( AAA ) users with any connect - Flows through PA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They want the Palo Alto firewalls to be able to read the users that when a user connects via VPN to the Cisco ASA, the Palo Alto FW receives the information from the Cisco ASA and/or the Cisco ISE on the PA, so that the User-ID can somehow get that information from those users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Clarifications, the PA does not have and should not use Global Protect. The Palo Alto FW must receive the information from the Cisco ASA and/or Cisco ISE when VPN users connect, Palo Alto can map them and see them in the User Log fields of the PA when traffic passes through it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please can you guide me and/or indicate me how to achieve this goal, at least as a base, limitations, considerations and/or guide to achieve this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your time and collaboration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I remain attentive&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 03:11:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/580977#M116320</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2024-03-20T03:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Cisco concentrator/ISE - USER-ID log to PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/580985#M116321</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179185"&gt;@Metgatz&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can configure ISE to send syslog data to a NGFW which parses User-ID info.&amp;nbsp; It works great.&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/t5/general-topics/cisco-ise-integration-for-userid/m-p/381362" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/cisco-ise-integration-for-userid/m-p/381362&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 04:42:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/580985#M116321</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-03-20T04:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Cisco concentrator/ISE - USER-ID log to PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582095#M116441</link>
      <description>&lt;P class="Bj-Wd gLCoR" data-pm-slice="1 1 []"&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;, thank you very much for your time and thanks for your advice.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Yes, the issue here is also in the filtering needed for the&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Log-In and Log-OFF.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;So yes in this case I would also need that information from the ISE.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Now that I see it, I doubt that this information is sent from the ISE, maybe the login or that the connection was validated from the ASA to the ISE to authenticate and validate the user and already indicates OK, I am not sure if when the Cisco Anyconnect client exits the ASA, the ASA indicates to the ISE that the user released the session and performed the log-off.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Because if not, I would only apply the User Identification Timeout (default 45 min) to release the user mapping, thinking that I will only have the login or the successful validation of the ISE, but not the logoff.&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;User Identification Timeout (min)&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Set the timeout value in minutes for user mapping entries (range is 1 to 3,600; default is 45).&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;What do you think, any advice, recommendation or detail to consider ?&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;I remain attentive&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="Bj-Wd gLCoR"&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 05:18:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582095#M116441</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2024-03-29T05:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Cisco concentrator/ISE - USER-ID log to PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582133#M116448</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179185"&gt;@Metgatz&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What specific issue do you have?&amp;nbsp; Is the NGFW showing the User-ID mappings for the ASA AnyConnect users?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 11:38:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582133#M116448</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-03-29T11:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Cisco concentrator/ISE - USER-ID log to PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582171#M116453</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179185"&gt;@Metgatz&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we have implemented IP-User mapping from AnyConnect clients by parsing ASA logs. For AnyConnect session connection and disconnection there are below syslog messages generated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;746012&lt;BR /&gt;Error Message %ASA-5-746012: user-identity: Add IP-User mapping IP Address - domain_name \user_name result - reason&lt;BR /&gt;Explanation: A new user-IP mapping has been added to the user-to-IP address mapping database. The status of the operation (success or failure) is indicated. The success reason is VPN user. The failure reasons include the following: Maximum user limit reached and Duplicated address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;746013&lt;BR /&gt;Error Message %ASA-5-746013: user-identity: Delete IP-User mapping IP Address - domain_name \user_name result - reason&lt;BR /&gt;Explanation: A change has been made to the user-to-IP address mapping database. The status of the operation (success or failure) is indicated. The success reasons include the following: Inactive timeout, NetBIOS probing failed, PIP notification, VPN user logout, Cut-through-proxy user logout, and MAC address mismatch. The failure reason is PIP notification.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our case this works well to update User-ID mapping in Firewalls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2024 23:12:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582171#M116453</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-03-29T23:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Cisco concentrator/ISE - USER-ID log to PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582172#M116454</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp;thanks for your reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Excellent, yes that's exactly what I'm looking for. I was already looking at those logs and yes, there I will have both login and logout. From the ISE I will not have the logout versus the ASA log for both cases. This way sounds better.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please if it was not too much bother and waiting for your help and collaboration, could you share the Regex or Field that you used in the syslog parse profile for both the LogIn event and the LogOut, only generically, without sharing anything sensitive, and then I adjust them to what I need, but if you could share the ones you used, that are working in the environment that you mention that works without problems, I would appreciate it very much.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your time, advice and collaboration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I remain attentive&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 00:38:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582172#M116454</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2024-03-30T00:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Cisco concentrator/ISE - USER-ID log to PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582234#M116467</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179185"&gt;@Metgatz&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am sorry for late response. This has been set years ago and I have in meanwhile moved to different position. Please give me some time to research it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 11:28:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/582234#M116467</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-04-01T11:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Cisco concentrator/ISE - USER-ID log to PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/995910#M122326</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179185"&gt;@Metgatz&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am sorry for very late response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately, I do not have much to share. In our environment ASAs are sending SNMP traps for user logon/logoff to User-ID server:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging list eventlist_user_login_logout message 746013&lt;BR /&gt;logging list eventlist_user_login_logout message 746012&lt;BR /&gt;snmp-server enable traps syslog&lt;BR /&gt;snmp-server host management &amp;lt;user-id server&amp;gt; community ***** version 2c&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;then kiwi syslog (running on User-ID agent server) picks snmp trap up, archives it for auditing, then forwards it to User-ID agent's port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2024 07:04:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-cisco-concentrator-ise-user-id-log-to-pa/m-p/995910#M122326</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-12-02T07:04:30Z</dc:date>
    </item>
  </channel>
</rss>

