<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic UIA / PAN Agent to Firewall Communication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/uia-pan-agent-to-firewall-communication/m-p/18157#M13231</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the User Identification with PAN-OS 2.1 Tech Note rev00E 03/09, I can read :&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"The User Identification Agent must have IP connectivity to the firewall management interface.&lt;BR /&gt;This is true even if the firewall is managed by an inline, Layer 3 interface on the firewall. All&lt;BR /&gt;Agent communication to the firewall is sent and received through the firewall management&lt;BR /&gt;interface. It is not possible to use an inline Layer 3 interface for this function in PAN-OS 2.1."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it always true in the 3.0 or 3.1 version ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I manage several isolated AD domains. These domains should have NO access to the Management network, so no access to the management interface.&lt;/P&gt;&lt;P&gt;If in a new version, it could be possible to establish this connectivity between the PA and the UIA on a L3 Interface (configured with a correct management profile),&lt;/P&gt;&lt;P&gt;- which permitted services should be enabled on the L3 interface ?&lt;BR /&gt;- On the PA Device User Identication configuration page, How to specify the interface used to join the UIA ? (only IP/port are possible to specify)... My problem is that several domains could have overlaped subnets. Not a problem with dedicated Interface / Virtual Router, but to join the UIA... which L3 to use... ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks - Sylvain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 25 Apr 2010 20:37:46 GMT</pubDate>
    <dc:creator>slechatton</dc:creator>
    <dc:date>2010-04-25T20:37:46Z</dc:date>
    <item>
      <title>UIA / PAN Agent to Firewall Communication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/uia-pan-agent-to-firewall-communication/m-p/18157#M13231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the User Identification with PAN-OS 2.1 Tech Note rev00E 03/09, I can read :&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"The User Identification Agent must have IP connectivity to the firewall management interface.&lt;BR /&gt;This is true even if the firewall is managed by an inline, Layer 3 interface on the firewall. All&lt;BR /&gt;Agent communication to the firewall is sent and received through the firewall management&lt;BR /&gt;interface. It is not possible to use an inline Layer 3 interface for this function in PAN-OS 2.1."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it always true in the 3.0 or 3.1 version ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I manage several isolated AD domains. These domains should have NO access to the Management network, so no access to the management interface.&lt;/P&gt;&lt;P&gt;If in a new version, it could be possible to establish this connectivity between the PA and the UIA on a L3 Interface (configured with a correct management profile),&lt;/P&gt;&lt;P&gt;- which permitted services should be enabled on the L3 interface ?&lt;BR /&gt;- On the PA Device User Identication configuration page, How to specify the interface used to join the UIA ? (only IP/port are possible to specify)... My problem is that several domains could have overlaped subnets. Not a problem with dedicated Interface / Virtual Router, but to join the UIA... which L3 to use... ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks - Sylvain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Apr 2010 20:37:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/uia-pan-agent-to-firewall-communication/m-p/18157#M13231</guid>
      <dc:creator>slechatton</dc:creator>
      <dc:date>2010-04-25T20:37:46Z</dc:date>
    </item>
    <item>
      <title>Re: UIA / PAN Agent to Firewall Communication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/uia-pan-agent-to-firewall-communication/m-p/18158#M13232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sylvain,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried configuring the Service Route under the Device Tab and change the interface to the L3 on which you want to communicated with UIA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Apr 2010 10:26:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/uia-pan-agent-to-firewall-communication/m-p/18158#M13232</guid>
      <dc:creator>vinesh</dc:creator>
      <dc:date>2010-04-26T10:26:31Z</dc:date>
    </item>
    <item>
      <title>Re: UIA / PAN Agent to Firewall Communication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/uia-pan-agent-to-firewall-communication/m-p/18159#M13233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vinesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you help, it's usefull to redirect a service to an interface, but&lt;/P&gt;&lt;P&gt;- which service is used to connect to UIA ?&lt;/P&gt;&lt;P&gt;- if the subnets are overlapped, how to specify the destinations ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks - Sylvain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Apr 2010 17:36:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/uia-pan-agent-to-firewall-communication/m-p/18159#M13233</guid>
      <dc:creator>slechatton</dc:creator>
      <dc:date>2010-04-26T17:36:33Z</dc:date>
    </item>
  </channel>
</rss>

