<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CLI command for LDAP status in 4.1.4 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23269#M16966</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you included the groups in the group include list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the WebUI -&amp;gt; Device tab -&amp;gt; User Identification -&amp;gt; Group mapping Setting tab -&amp;gt; Click your defined server (define one if not already defined) -&amp;gt; Group Include List tab -&amp;gt; and ensure you've added all the groups you want to use in your policies here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this doesn't help and you've recently updated to 4.1.x from 4.0.x or below, it may be the case you have some older groups on the firewall that are no longer compatible. The output of those commands should let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Jason Seals &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Mar 2012 20:31:23 GMT</pubDate>
    <dc:creator>jseals</dc:creator>
    <dc:date>2012-03-23T20:31:23Z</dc:date>
    <item>
      <title>CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23264#M16961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to setup a server profile for LDAP in PAN OS 4.1.4&lt;/P&gt;&lt;P&gt;Unfortunatelly I only see some groups of users but not the individual users themself.&lt;/P&gt;&lt;P&gt;Running the command "show users ldap-server" is not available in 4.1.4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is a screenshot of the current configuration. Is that okay so far?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the way to identify where the problem is?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;Christof&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 14:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23264#M16961</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-03-23T14:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23265#M16962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you trying to see what is happening when they are trying to authenticate?&amp;nbsp;&amp;nbsp; If so, would&amp;nbsp; "less mp-log authd.log" help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 16:27:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23265#M16962</guid>
      <dc:creator>mrsold</dc:creator>
      <dc:date>2012-03-23T16:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23266#M16963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No. I am trying to setup ldap connection at all. My target is to apply&lt;/P&gt;&lt;P&gt;user based security rules.&lt;/P&gt;&lt;P&gt;Von meinem iPhone gesendet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am 23.03.2012 um 17:27 schrieb msoldner &amp;lt;live@paloaltonetworks.com&amp;gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you trying to see what is happening when they are trying to&lt;/P&gt;&lt;P&gt;authenticate?   If so, would  "less mp-log authd.log" help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 16:35:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23266#M16963</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-03-23T16:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23267#M16964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that with 4.1.x, the firewall directly connects to the LDAP server and queries for AD groups. The user-id agent performs the user-to-ip mappings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you aren't seeing users, it may be an issue with the agent connectivity or settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To show what users are found in the groups:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show user group name &amp;lt;group name&amp;gt; (You can tab to list all of the available group names)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To show what users are being mapped to IPs properly:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show user ip-user-mapping all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To show the state of your user agent (since that's what is in charge of user-to-ip mapping)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show user user-id-agent state all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Jason Seals &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 19:15:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23267#M16964</guid>
      <dc:creator>jseals</dc:creator>
      <dc:date>2012-03-23T19:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23268#M16965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The uiAgent is working well.&lt;/P&gt;&lt;P&gt;But for user based security rules the uiAgent is not used as far as I&lt;/P&gt;&lt;P&gt;understood.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see two groups in the user field in the security rules but they are&lt;/P&gt;&lt;P&gt;not from the Users container of the AD. These two groups are directly&lt;/P&gt;&lt;P&gt;under the domain level and don't reflect my domain security groups or&lt;/P&gt;&lt;P&gt;even better the individual users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will query the commands on Monday and let you know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Von meinem iPhone gesendet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am 23.03.2012 um 20:16 schrieb jseals &amp;lt;live@paloaltonetworks.com&amp;gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that with 4.1.x, the firewall directly connects to the&lt;/P&gt;&lt;P&gt;LDAP server and queries for AD groups. The user-id agent performs the&lt;/P&gt;&lt;P&gt;user-to-ip mappings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you aren't seeing users, it may be an issue with the agent&lt;/P&gt;&lt;P&gt;connectivity or settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To show what users are found in the groups:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE level="1"&gt;&lt;P&gt;show user group name &amp;lt;group name&amp;gt; (You can tab to list all of the available group names)&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To show what users are being mapped to IPs properly:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE level="1"&gt;&lt;P&gt;show user ip-user-mapping all&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To show the state of your user agent (since that's what is in charge&lt;/P&gt;&lt;P&gt;of user-to-ip mapping)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE level="1"&gt;&lt;P&gt;show user user-id-agent state all&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jason Seals&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 19:23:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23268#M16965</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-03-23T19:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23269#M16966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you included the groups in the group include list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the WebUI -&amp;gt; Device tab -&amp;gt; User Identification -&amp;gt; Group mapping Setting tab -&amp;gt; Click your defined server (define one if not already defined) -&amp;gt; Group Include List tab -&amp;gt; and ensure you've added all the groups you want to use in your policies here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this doesn't help and you've recently updated to 4.1.x from 4.0.x or below, it may be the case you have some older groups on the firewall that are no longer compatible. The output of those commands should let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Jason Seals &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 20:31:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23269#M16966</guid>
      <dc:creator>jseals</dc:creator>
      <dc:date>2012-03-23T20:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23270#M16967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That' s probably the issue. I have not assigned any groups...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The box is pretty new in our environment and was already shipped with OS 4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your suggestions. I will report Monday!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Christof&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Von meinem iPhone gesendet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am 23.03.2012 um 21:31 schrieb jseals &amp;lt;live@paloaltonetworks.com&amp;gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you included the groups in the group include list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the WebUI -&amp;gt; Device tab -&amp;gt; User Identification -&amp;gt; Group mapping&lt;/P&gt;&lt;P&gt;Setting tab -&amp;gt; Click your defined server (define one if not already&lt;/P&gt;&lt;P&gt;defined) -&amp;gt; Group Include List tab -&amp;gt; and ensure you've added all the&lt;/P&gt;&lt;P&gt;groups you want to use in your policies here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this doesn't help and you've recently updated to 4.1.x from 4.0.x&lt;/P&gt;&lt;P&gt;or below, it may be the case you have some older groups on the&lt;/P&gt;&lt;P&gt;firewall that are no longer compatible. The output of those commands&lt;/P&gt;&lt;P&gt;should let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jason Seals&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 20:55:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23270#M16967</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-03-23T20:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23271#M16968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ran the query in terminal and received only these groups back that I see&lt;/P&gt;&lt;P&gt;in *WebUI -&amp;gt; Device tab -&amp;gt; User Identification -&amp;gt; Group mapping Setting tab&lt;/P&gt;&lt;P&gt;-&amp;gt; Click your defined server (define one if not already defined) -&amp;gt; Group&lt;/P&gt;&lt;P&gt;Include List tab. *&lt;/P&gt;&lt;P&gt;Curiously I cannot select any group in CN=Users. It appears as empty (Which&lt;/P&gt;&lt;P&gt;it surely not is).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only can select groups that are directly under the Domain names level&lt;/P&gt;&lt;P&gt;(see attachment) and not in any of the containers.&lt;/P&gt;&lt;P&gt;The Domain is a 2003 level domain. Is the PANOS only compatible with newer&lt;/P&gt;&lt;P&gt;domain levels?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Christof&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Mar 2012 12:56:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23271#M16968</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-03-26T12:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23272#M16969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have a Windows 2003 Domain Controller in my lab environment, and I can select groups to be added in CN=Users. I can open up any containers I have under the domain and add groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you positive that the bind dn you're using for your LDAP Server Profile has the ability to query in all of your containers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to change the bind dn to a domain admin or something similar just for testing, so we can ensure he can open the containers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Jason Seals &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Mar 2012 17:24:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23272#M16969</guid>
      <dc:creator>jseals</dc:creator>
      <dc:date>2012-03-26T17:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23273#M16970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I use Administrator Account für Domain bind.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your input.&lt;/P&gt;&lt;P&gt;Christof&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Von meinem iPhone gesendet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am 26.03.2012 um 19:24 schrieb jseals &amp;lt;live@paloaltonetworks.com&amp;gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have a Windows 2003 Domain Controller in my lab environment,&lt;/P&gt;&lt;P&gt;and I can select groups to be added in CN=Users. I can open up any&lt;/P&gt;&lt;P&gt;containers I have under the domain and add groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you positive that the bind dn you're using for your LDAP Server&lt;/P&gt;&lt;P&gt;Profile has the ability to query in all of your containers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to change the bind dn to a domain admin or something&lt;/P&gt;&lt;P&gt;similar just for testing, so we can ensure he can open the containers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jason Seals&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Mar 2012 20:33:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23273#M16970</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-03-26T20:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23274#M16971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any other ideas?&lt;/P&gt;&lt;P&gt;As I said, the domain Administrator account is used for Bind DN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The domain itself was a SBS 2003 domain 3 years back and has been upgraded to standard domain at that time.&lt;/P&gt;&lt;P&gt;I still see an OU=MyBusiness and some Exchange relics. Can this be an issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The groups that I can select (see my previous posts) most likely are groups from the old SBS schema, as I do not see such kind of groups on our second site ( Windows 2008R2 Standard Domain).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;P&gt;Christof&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 09:00:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23274#M16971</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-03-29T09:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23275#M16972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cristof,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may be best to continue troubleshooting in a support case at this point for more direct support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please open up a support case and we can work to a faster resolution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Jason &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 19:20:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23275#M16972</guid>
      <dc:creator>jseals</dc:creator>
      <dc:date>2012-03-29T19:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23276#M16973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jseals how large is your AD structure?&amp;nbsp; Im suspecting its relatively small? correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been troubleshooting an issue with support regarding 4.1.3-4 direct group enumeration.. whereby the Palo Alto is only able to retrieve a small portion of our AD structure/ objects. Having similar experiences where from the Palo Alto am not able to browse the full structure and group enumeration for example shows only 26 users in "domain users" group when there is in fact over 27,000 ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I change back to using LDAP proxy and a 3.1x userID agent the group enumeration works correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At first I suspected an issue with LDAP paging.. but packet captures indicated paging is working .. but seem to point towards some strange delays/timeouts towards the end of the session..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be related to this discussion.. difficult to tell at this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the user having problems..&amp;nbsp; If everything looks to be configured correctly and your domain structure/ permissions are good.. then try doing some packet captures from the Palo Alto monitoring tab.. filtering on LDAP communications with domain controller. Would recommend temporarily changing to unencrypted TCP 389 for the LDAP bind so you can view the full LDAP protocol interactions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Apr 2012 11:08:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23276#M16973</guid>
      <dc:creator>ucteam</dc:creator>
      <dc:date>2012-04-01T11:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23277#M16974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Our LDAP is very small, too. We have approx. 40 users in the domain&lt;/P&gt;&lt;P&gt;that is having this issue.&lt;/P&gt;&lt;P&gt;I can sometimes see the groups in security policy set up page although&lt;/P&gt;&lt;P&gt;I did not select (and even see them) in the group mappings page.&lt;/P&gt;&lt;P&gt;Applying these groups to the policies does not have any effect.&lt;/P&gt;&lt;P&gt;The user agent is showing connected, but I have only a couple of users&lt;/P&gt;&lt;P&gt;known to the device although I know that there are more online in that&lt;/P&gt;&lt;P&gt;moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At our second facility (2008 domain) everything is working fine. The&lt;/P&gt;&lt;P&gt;user ID agent and the group mappings are working and I can build&lt;/P&gt;&lt;P&gt;security rules for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Christof&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Von meinem iPhone gesendet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am 01.04.2012 um 13:08 schrieb ucteam &amp;lt;live@paloaltonetworks.com&amp;gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jseals how large is your AD structure?  Im suspecting its relatively&lt;/P&gt;&lt;P&gt;small? correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been troubleshooting an issue with support regarding 4.1.3-4&lt;/P&gt;&lt;P&gt;direct group enumeration.. whereby the Palo Alto is only able to&lt;/P&gt;&lt;P&gt;retrieve a small portion of our AD structure/ objects. Having similar&lt;/P&gt;&lt;P&gt;experiences where from the Palo Alto am not able to browse the full&lt;/P&gt;&lt;P&gt;structure and group enumeration for example shows only 26 users in&lt;/P&gt;&lt;P&gt;"domain users" group when there is in fact over 27,000 ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I change back to using LDAP proxy and a 3.1x userID agent the&lt;/P&gt;&lt;P&gt;group enumeration works correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At first I suspected an issue with LDAP paging.. but packet captures&lt;/P&gt;&lt;P&gt;indicated paging is working .. but seem to point towards some strange&lt;/P&gt;&lt;P&gt;delays/timeouts towards the end of the session..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be related to this discussion.. difficult to tell at this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the user having problems..  If everything looks to be configured&lt;/P&gt;&lt;P&gt;correctly and your domain structure/ permissions are good.. then try&lt;/P&gt;&lt;P&gt;doing some packet captures from the Palo Alto monitoring tab..&lt;/P&gt;&lt;P&gt;filtering on LDAP communications with domain controller. Would&lt;/P&gt;&lt;P&gt;recommend temporarily changing to unencrypted TCP 389 for the LDAP&lt;/P&gt;&lt;P&gt;bind so you can view the full LDAP protocol interactions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Apr 2012 12:28:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23277#M16974</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-04-01T12:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23278#M16975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any fundamental differences between the 2 deployments? ie. the one that is working and the one that isnt?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 10:54:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23278#M16975</guid>
      <dc:creator>ucteam</dc:creator>
      <dc:date>2012-04-02T10:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23279#M16976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Only the domain levels:&lt;/P&gt;&lt;P&gt;Working deployment is 2008 domain.&lt;/P&gt;&lt;P&gt;Not working deployment is 2003 domain (that has been migrated from a Small&lt;/P&gt;&lt;P&gt;Business Server 2003 4 years back).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 11:06:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23279#M16976</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-04-02T11:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command for LDAP status in 4.1.4</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23280#M16977</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;finally we identified the issue.&lt;/P&gt;&lt;P&gt;We have 2 DC's in the concerned domain. Both had a UI-agent installed and&lt;/P&gt;&lt;P&gt;configured. However one of them seemed to drop his settings.&lt;/P&gt;&lt;P&gt;I realized that after rummage in the console. The command "show user&lt;/P&gt;&lt;P&gt;user-id-agent config name" then showed no configuration on one of the&lt;/P&gt;&lt;P&gt;UI-agents.&lt;/P&gt;&lt;P&gt;The group mapping is now working after configuring the second agent again&lt;/P&gt;&lt;P&gt;(and verifying that the config is really saved).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your thoughts!&lt;/P&gt;&lt;P&gt;Christof&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Mon, Apr 2, 2012 at 12:57 PM, Christof Schmidt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2012 06:29:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-for-ldap-status-in-4-1-4/m-p/23280#M16977</guid>
      <dc:creator>cschmi</dc:creator>
      <dc:date>2012-04-05T06:29:14Z</dc:date>
    </item>
  </channel>
</rss>

