<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static user-id to IP-address mapping in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21486#M15690</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the bottom of the User-ID setup screen you can enter exclude addresses that will be ignored for user-ID.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Aug 2015 00:13:25 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2015-08-03T00:13:25Z</dc:date>
    <item>
      <title>Static user-id to IP-address mapping</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21485#M15689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way in PanOS 6.1.x to manually map&amp;nbsp; a user-id to an ip-address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or is there a way to set an IP-address to be exempt from the user-id mapping policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have PA-500s being staged behind a generic firewall inside a production network with a PA-3000 on the perimeter. The PA-500s NAT their external connections via the generic firewall and cannot establish connection to the PA update server without connecting a laptop behind the generic fw and authenticating via the captive portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Charles&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Aug 2015 23:45:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21485#M15689</guid>
      <dc:creator>Charles_Cabico</dc:creator>
      <dc:date>2015-08-02T23:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: Static user-id to IP-address mapping</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21486#M15690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the bottom of the User-ID setup screen you can enter exclude addresses that will be ignored for user-ID.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Aug 2015 00:13:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21486#M15690</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-08-03T00:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Static user-id to IP-address mapping</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21487#M15691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Steven. Just to confirm that if I follow this route, then I would need to explicitly define all networks to be user-id'd under the include action.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-4651"&gt;How the User-ID Agent Include/Exclude List Works &lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Aug 2015 05:55:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21487#M15691</guid>
      <dc:creator>Charles_Cabico</dc:creator>
      <dc:date>2015-08-03T05:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: Static user-id to IP-address mapping</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21488#M15692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, once you setup this section it is comprehensive on both exclude and include networks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Aug 2015 10:51:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21488#M15692</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-08-03T10:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: Static user-id to IP-address mapping</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21489#M15693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Or you can also add an exception policy for your PA500 ip address in the top of captive portal policies. Just need to configure action as "no-captive-portal" &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from: PA500_IP -Trust&lt;/P&gt;&lt;P&gt;To: any -Untrust&lt;/P&gt;&lt;P&gt;Actions: no-captive-portal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you cand test the policy using the following command&lt;/P&gt;&lt;P&gt;test cp-policy-match from &amp;lt;value&amp;gt;|&amp;lt;any&amp;gt; to &amp;lt;value&amp;gt;|&amp;lt;any&amp;gt; source &amp;lt;ip/netmask&amp;gt; destination &amp;lt;ip/netmask&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2015 19:40:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21489#M15693</guid>
      <dc:creator>glastra1</dc:creator>
      <dc:date>2015-08-05T19:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: Static user-id to IP-address mapping</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21490#M15694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Keep in mind that the Agents process the include / exclude networks list in a top-down fashion just like the firewalls do policy.&amp;nbsp; What I did to keep from having to manually identify all of the networks I wanted to include, is I put all of my excludes at the top and then created 3 include entries to cover all of the RFC1918 addresses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2015 19:42:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/static-user-id-to-ip-address-mapping/m-p/21490#M15694</guid>
      <dc:creator>MRosloniec</dc:creator>
      <dc:date>2015-08-05T19:42:44Z</dc:date>
    </item>
  </channel>
</rss>

