<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is a &amp;quot;large&amp;quot; deployment for User-ID on the firewall? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26813#M19562</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got the impression that the built in PAN-agent (which lives in the mgmtplane of PANOS 5.0 and upwards) is mainly for small deployments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like max 100 users/clients or so...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I could be wrong... it would however be really nice if the built in PAN-agent is all you need when running PANOS 5.0 even for larger deployments (thousands or ten of thousands of clients).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that the security log can be somewhat large when it comes to bandwidth. And in a large deployment there can be up to 100 DC-servers which, if you are unlucky, would mean up to 500Mbit/s just in security log being sent to the PA-device. The bandwidth between PAN-agent and each PA-device is much lower than the bandwidth between each PAN-agent and DC-servers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Jan 2013 18:49:00 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2013-01-28T18:49:00Z</dc:date>
    <item>
      <title>What is a "large" deployment for User-ID on the firewall?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26812#M19561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a pair of 5020s and about 4000 users on 4 AD controllers. Throughout the 4.0 and 4.1 series, we have seen the Windows-based UserID Agent drop groups and users, and are interested in seeing if native event log polling from 5.0 might help. Target date is mid-March, by which point we hope 5.0 to be somewhat stable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The documentation says that the UserID Agent is still supported and recommended for "large" deployments. Can anyone quantify that? I consider us "small," but to the extent that PAN firewalls have displaced UTM and web filters, maybe we're "medium."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 16:11:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26812#M19561</guid>
      <dc:creator>rgraves</dc:creator>
      <dc:date>2013-01-28T16:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: What is a "large" deployment for User-ID on the firewall?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26813#M19562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got the impression that the built in PAN-agent (which lives in the mgmtplane of PANOS 5.0 and upwards) is mainly for small deployments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like max 100 users/clients or so...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I could be wrong... it would however be really nice if the built in PAN-agent is all you need when running PANOS 5.0 even for larger deployments (thousands or ten of thousands of clients).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that the security log can be somewhat large when it comes to bandwidth. And in a large deployment there can be up to 100 DC-servers which, if you are unlucky, would mean up to 500Mbit/s just in security log being sent to the PA-device. The bandwidth between PAN-agent and each PA-device is much lower than the bandwidth between each PAN-agent and DC-servers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 18:49:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26813#M19562</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-28T18:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: What is a "large" deployment for User-ID on the firewall?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26814#M19563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have previously asked support about this since we have considered using agentless user-id in a large deployment. Here are the numbers that I got:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ecf3ea;"&gt;It depends on a few things. It depends on the number of DCs that are involved and the type of device the customer is using. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ecf3ea; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 11px; line-height: 1.5em;"&gt;If its a 500 series you should be fine monitoring up to 10 servers. Same is true for a 200 series. The 2000 series has only little memory in the management plane, which is why I would possibly only monitor 2-5 servers. &lt;BR /&gt;Other devices like the new 3000 series or the 5000 series have more memory in the management plane. Meaning monitoring up to 50 servers should work fine."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the limitation is not the number of users but number of DCs that is monitored.&lt;/P&gt;&lt;P&gt;As for your installation you should be fine with using agentless installation, but remember if you got "slow" links between the PA and the DC's you should consider installing the user-id agent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jo Christian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2013 08:07:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26814#M19563</guid>
      <dc:creator>jochristian</dc:creator>
      <dc:date>2013-01-29T08:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: What is a "large" deployment for User-ID on the firewall?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26815#M19564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The limitation does lie in the amount of servers monitored and these are limited by the platform and the resources available to the mgmt plane as JoChristian mentions above. &lt;/P&gt;&lt;P&gt;The maximum amount of users is identical across all platforms which is currently 64k on the DP users and 640 groups, so a pair of 5020's with 4 AD's and 4k users should not be a problem at all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2013 14:08:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26815#M19564</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2013-01-29T14:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: What is a "large" deployment for User-ID on the firewall?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26816#M19565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;We have case number 00110330 open right now, describing symptoms that mirror this same issue.&lt;/STRONG&gt; On our PA5020s we only have 835 out of 2,000 users sync'ing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2013 14:46:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26816#M19565</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-01-29T14:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: What is a "large" deployment for User-ID on the firewall?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26817#M19566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So even with 32.000 users and lets say 50 DC servers it should not be any problem of using the internal PAN-agent if you run 3000-series and upwards?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any drawbacks by using this internal PAN-agent other than the bandwidth needed between the PA device and all DC's ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will for example commit times run away as with 2000-series?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2013 16:48:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26817#M19566</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-29T16:48:37Z</dc:date>
    </item>
    <item>
      <title>Re: What is a "large" deployment for User-ID on the firewall?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26818#M19567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To be a little bit more specific concerning the 640 groups "a firewall can hold": --&amp;gt; This is only the &lt;STRONG&gt;number of groups that can be used in the policies of the firewall&lt;/STRONG&gt; (source or destination user section), but the firewall can store more than 640 groups in its database, which of course is a MUST because many customers might have more than 640 groups in their ADs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see the actual number of different groups, you can use the following command on the CLI:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;show user group list | match Total&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This shows the number of groups.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Aug 2013 12:59:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-a-quot-large-quot-deployment-for-user-id-on-the-firewall/m-p/26818#M19567</guid>
      <dc:creator>Ludwig</dc:creator>
      <dc:date>2013-08-13T12:59:46Z</dc:date>
    </item>
  </channel>
</rss>

