<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is anyone using the Aruba Clearpass device to identify user and machine name information? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26879#M19616</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 24.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt;Howto: Authenticate a Palo Alto Firewall via Clearpass and RADIUS&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;‎This was taken from an Aruba Airheads forum, which I am a member.&amp;nbsp; It was orignally posted by Mike Courtney, at Adaptive Communications &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;This how-to configures RADIUS authentication on a Palo Alto device running PANOS 5.x / 6.0 and integrating that with Clearpass. The Palo Alto device will be configured to receive a RADIUS VSA from Clearpass and provide super-user access for an AD specific user.&lt;BR /&gt; &lt;BR /&gt; As before, I have a lab running Clearpass 6.2.x. I have a Windows 2012 server with defined users and groups and I've built the necessary role mappings under Configuration &amp;gt; Identity &amp;gt; Role Mappings in Clearpass. I've also created Clearpass / Tips roles that are mapped to my Windows 2012 groups.&lt;BR /&gt; &lt;BR /&gt; Clearpass:&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Enable the Palo Alto Dictionary in Clearpass:&lt;BR /&gt; &lt;/STRONG&gt;&lt;BR /&gt; 1. Administration &amp;gt; Dictionaries &amp;gt; RADIUS&lt;BR /&gt; 2. Filter &amp;gt; Vendor Name &amp;gt; Contains &amp;gt; "Palo"&lt;BR /&gt; 3. Click on "PaloAlto" and then click "Enable"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt; Add the Device to Clearpass:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;1. Configuration &amp;gt; Network &amp;gt; Devices&lt;BR /&gt; 2. Select "Add Devices"&lt;BR /&gt; i. Name = &amp;lt;Name you'd like&amp;gt;&lt;BR /&gt; ii. RADIUS Shared Secret = &amp;lt;Your shared secret&amp;gt;&lt;BR /&gt; iii. Vendor Name = PaloAlto&lt;BR /&gt; 3. Select "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;I use device groups for everything in Clearpass. This step can be optional, it's just my personal preference.&lt;BR /&gt; &lt;/STRONG&gt;&lt;BR /&gt; 1. Configuration &amp;gt; Network &amp;gt; Device groups&lt;BR /&gt; 2. Select "Add Device Group"&lt;BR /&gt; 3. Fill in the "Name" field. I'll be using "Palo Altos" in this example&lt;BR /&gt; 4. Select "List" under "Format"&lt;BR /&gt; 5. Under the "List", move the Palo Alto Device from the "Available Devices" to "Selected Devices"&lt;BR /&gt; 6. Click "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt;Create a Palo Alto Enforcement Profile:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;1. Configuration &amp;gt; Enforcement &amp;gt; Profiles&lt;BR /&gt; 2. Click "Add Enforcement Profile"&lt;BR /&gt; 3. Select "RADIUS based enforcement" as the Template&lt;BR /&gt; 4. Provide a name, "Palo Alto RADIUS Admin"&lt;BR /&gt; 5. Make sure that "Accept" is set under "Action"&lt;BR /&gt; 6. Under Attributes:&lt;BR /&gt; i. Type - "Radius: PaloAlto"&lt;BR /&gt; ii. Name - "PaloAlto-Admin-Role (1)",&lt;BR /&gt; iii. Value - "superuser"&lt;BR /&gt; 7. Finally, click "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Create a Palo Alto Enforcement Policy:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;1. Configuration &amp;gt; Enforcement &amp;gt; Policies&lt;BR /&gt; 2. Click "Add Enforcement Policy"&lt;BR /&gt; 3. Under "Enforcement", provide a name, "Palo Alto Login Enforcement Policy"&lt;BR /&gt; 4. Verify that RADIUS is the "Enforcement Type"&lt;BR /&gt; 5. Select "[Deny Access Profile] for the "Default Profile&lt;BR /&gt; 6. Select "Rules" and click "Add Rule"&lt;BR /&gt; 7. Mine looks like this:&lt;BR /&gt; i. Type - Tips&lt;BR /&gt; ii. Name - Role&lt;BR /&gt; iii. Operator - EQUALS&lt;BR /&gt; iv. PaloAlto-Admins&lt;BR /&gt; 8. Enforcement Profiles &amp;gt; "Profile Names" &amp;gt; "[RADIUS] Palo Alto RADIUS Admin"&lt;BR /&gt; 9. Click "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Create a Palo Alto Login Service:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;1. Configuration &amp;gt; Services&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;2. Click "Add Service"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;3. Select "Type" of "RADIUS Enforcement ( Generic )"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;4. Provide a name for the service, "Palo Alto Firewall Logins"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;5. Under "Service Rule" enter the following:&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Type - Connection&lt;BR /&gt; ii. Name - "NAD-IP-Address"&lt;BR /&gt; iii. Operator - "BELONGS_TO_GROUP"&lt;BR /&gt; iv. Value - "Palo Altos"&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;6. Under Authentication:&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Authentication Methods - PAP&lt;BR /&gt; ii. Authentication Sources - &amp;lt;your AD&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;7. Under Roles select the "Role Mapping Policy" for your domain. Here's what mine looks like by clicking "Modify."&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Type - Authorization:Windows-2012&lt;BR /&gt; ii. Name - memberOf&lt;BR /&gt; iii. Operator - EQUALS&lt;BR /&gt; iv. Value - CN=PaloAlto-Admins,CN=Users,DC=top,DC=local&lt;BR /&gt; v. Actions &amp;gt; "Role Name" &amp;gt; "PaloAlto-Admins"&lt;BR /&gt; 8. Under "Enforcement" &amp;gt; "Enforcement Policy" select the enforcement policy that we created &amp;gt; "Palo Alto Login Enforcement Policy"&lt;BR /&gt; 9. Click "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;CONFIGURING THE PALO ALTO DEVICE:&lt;/STRONG&gt;&lt;BR /&gt; The steps below will be done through the GUI.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;BR /&gt; 1. Go to Device &amp;gt; Server Profiles &amp;gt; RADIUS &amp;gt; "+ Add"&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: lower-roman;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;i. Name = Clearpass&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;Click "+ Add" in this menu:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Name = FQDN of the Clearpass server&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; ii. IP Address = &amp;lt;Clearpass IP address&amp;gt;&lt;BR /&gt; iii. Secret = Shared secret for the Palo Alto device in Clearpass&lt;BR /&gt; iv. Port = 1812&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;Click "Ok" in this menu&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;2. Go to Device &amp;gt; Authentication Profile &amp;gt; "+ Add"&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Name = PAN-Clearpass&lt;BR /&gt; ii. Authentication = RADIUS&lt;BR /&gt; iii. Server Profile = "Clearpass" (From step 1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;3. Go to Device &amp;gt; Authentication Sequence &amp;gt; "+ Add"&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Name = PAN-Auth-Sequence&lt;BR /&gt; ii. Click "+ Add"&lt;BR /&gt; iii. Select "PAN-Clearpass" (From step 2)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt; EDIT - 04/22/2014 - I had to take this additional setup on a Palo Alto device that had multiple Authentication profiles and RADIUS servers. It should be included as part of the steps to guarantee RADIUS authentication on a Palo Alto device.&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;4. Go to Device &amp;gt; Setup &amp;gt; Management Settings &amp;gt; Authentication Settings &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Click the Widget button in the corner&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; ii. Select "PAN-Clearpass" under Authentication Profile"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; iii. Save this configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt; You should now be able to log into the GUI and the CLI on a Palo Alto device with Clearpass. You can verify this on the CLI by typing:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt;show admins&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;Also, the AD account will show up before the "@" symbol on a successful CLI connection:&lt;BR /&gt; &lt;BR /&gt; mcourtney@PA-200&amp;gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;This will show up in the GUI under: &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt;Dashboard &amp;gt; Logged In Admins &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;You can verify that things are working by logging into a Palo Alto device and viewing the results in Access Tracker found under &lt;BR /&gt; &lt;STRONG&gt;Monitoring &amp;gt; Live Monitoring.&lt;BR /&gt; &lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 19 May 2014 14:42:31 GMT</pubDate>
    <dc:creator>MemphisBrothers</dc:creator>
    <dc:date>2014-05-19T14:42:31Z</dc:date>
    <item>
      <title>Is anyone using the Aruba Clearpass device to identify user and machine name information?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26878#M19615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Apple userid is not getting sent from the PA UserID agent to the PA500.&amp;nbsp; Since the Aruba Clearpass device is seeing all of that info and more I found a doc that would allow the Clearpass to send that data to PA.&amp;nbsp; Has anyone out there used this method?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 May 2014 14:41:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26878#M19615</guid>
      <dc:creator>MemphisBrothers</dc:creator>
      <dc:date>2014-05-19T14:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: Is anyone using the Aruba Clearpass device to identify user and machine name information?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26879#M19616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 24.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt;Howto: Authenticate a Palo Alto Firewall via Clearpass and RADIUS&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;‎This was taken from an Aruba Airheads forum, which I am a member.&amp;nbsp; It was orignally posted by Mike Courtney, at Adaptive Communications &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;This how-to configures RADIUS authentication on a Palo Alto device running PANOS 5.x / 6.0 and integrating that with Clearpass. The Palo Alto device will be configured to receive a RADIUS VSA from Clearpass and provide super-user access for an AD specific user.&lt;BR /&gt; &lt;BR /&gt; As before, I have a lab running Clearpass 6.2.x. I have a Windows 2012 server with defined users and groups and I've built the necessary role mappings under Configuration &amp;gt; Identity &amp;gt; Role Mappings in Clearpass. I've also created Clearpass / Tips roles that are mapped to my Windows 2012 groups.&lt;BR /&gt; &lt;BR /&gt; Clearpass:&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Enable the Palo Alto Dictionary in Clearpass:&lt;BR /&gt; &lt;/STRONG&gt;&lt;BR /&gt; 1. Administration &amp;gt; Dictionaries &amp;gt; RADIUS&lt;BR /&gt; 2. Filter &amp;gt; Vendor Name &amp;gt; Contains &amp;gt; "Palo"&lt;BR /&gt; 3. Click on "PaloAlto" and then click "Enable"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt; Add the Device to Clearpass:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;1. Configuration &amp;gt; Network &amp;gt; Devices&lt;BR /&gt; 2. Select "Add Devices"&lt;BR /&gt; i. Name = &amp;lt;Name you'd like&amp;gt;&lt;BR /&gt; ii. RADIUS Shared Secret = &amp;lt;Your shared secret&amp;gt;&lt;BR /&gt; iii. Vendor Name = PaloAlto&lt;BR /&gt; 3. Select "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;I use device groups for everything in Clearpass. This step can be optional, it's just my personal preference.&lt;BR /&gt; &lt;/STRONG&gt;&lt;BR /&gt; 1. Configuration &amp;gt; Network &amp;gt; Device groups&lt;BR /&gt; 2. Select "Add Device Group"&lt;BR /&gt; 3. Fill in the "Name" field. I'll be using "Palo Altos" in this example&lt;BR /&gt; 4. Select "List" under "Format"&lt;BR /&gt; 5. Under the "List", move the Palo Alto Device from the "Available Devices" to "Selected Devices"&lt;BR /&gt; 6. Click "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt;Create a Palo Alto Enforcement Profile:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;1. Configuration &amp;gt; Enforcement &amp;gt; Profiles&lt;BR /&gt; 2. Click "Add Enforcement Profile"&lt;BR /&gt; 3. Select "RADIUS based enforcement" as the Template&lt;BR /&gt; 4. Provide a name, "Palo Alto RADIUS Admin"&lt;BR /&gt; 5. Make sure that "Accept" is set under "Action"&lt;BR /&gt; 6. Under Attributes:&lt;BR /&gt; i. Type - "Radius: PaloAlto"&lt;BR /&gt; ii. Name - "PaloAlto-Admin-Role (1)",&lt;BR /&gt; iii. Value - "superuser"&lt;BR /&gt; 7. Finally, click "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Create a Palo Alto Enforcement Policy:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;1. Configuration &amp;gt; Enforcement &amp;gt; Policies&lt;BR /&gt; 2. Click "Add Enforcement Policy"&lt;BR /&gt; 3. Under "Enforcement", provide a name, "Palo Alto Login Enforcement Policy"&lt;BR /&gt; 4. Verify that RADIUS is the "Enforcement Type"&lt;BR /&gt; 5. Select "[Deny Access Profile] for the "Default Profile&lt;BR /&gt; 6. Select "Rules" and click "Add Rule"&lt;BR /&gt; 7. Mine looks like this:&lt;BR /&gt; i. Type - Tips&lt;BR /&gt; ii. Name - Role&lt;BR /&gt; iii. Operator - EQUALS&lt;BR /&gt; iv. PaloAlto-Admins&lt;BR /&gt; 8. Enforcement Profiles &amp;gt; "Profile Names" &amp;gt; "[RADIUS] Palo Alto RADIUS Admin"&lt;BR /&gt; 9. Click "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;Create a Palo Alto Login Service:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;1. Configuration &amp;gt; Services&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;2. Click "Add Service"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;3. Select "Type" of "RADIUS Enforcement ( Generic )"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;4. Provide a name for the service, "Palo Alto Firewall Logins"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;5. Under "Service Rule" enter the following:&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Type - Connection&lt;BR /&gt; ii. Name - "NAD-IP-Address"&lt;BR /&gt; iii. Operator - "BELONGS_TO_GROUP"&lt;BR /&gt; iv. Value - "Palo Altos"&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;6. Under Authentication:&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Authentication Methods - PAP&lt;BR /&gt; ii. Authentication Sources - &amp;lt;your AD&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;7. Under Roles select the "Role Mapping Policy" for your domain. Here's what mine looks like by clicking "Modify."&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Type - Authorization:Windows-2012&lt;BR /&gt; ii. Name - memberOf&lt;BR /&gt; iii. Operator - EQUALS&lt;BR /&gt; iv. Value - CN=PaloAlto-Admins,CN=Users,DC=top,DC=local&lt;BR /&gt; v. Actions &amp;gt; "Role Name" &amp;gt; "PaloAlto-Admins"&lt;BR /&gt; 8. Under "Enforcement" &amp;gt; "Enforcement Policy" select the enforcement policy that we created &amp;gt; "Palo Alto Login Enforcement Policy"&lt;BR /&gt; 9. Click "Save"&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;CONFIGURING THE PALO ALTO DEVICE:&lt;/STRONG&gt;&lt;BR /&gt; The steps below will be done through the GUI.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;BR /&gt; 1. Go to Device &amp;gt; Server Profiles &amp;gt; RADIUS &amp;gt; "+ Add"&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: lower-roman;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;i. Name = Clearpass&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;Click "+ Add" in this menu:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Name = FQDN of the Clearpass server&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; ii. IP Address = &amp;lt;Clearpass IP address&amp;gt;&lt;BR /&gt; iii. Secret = Shared secret for the Palo Alto device in Clearpass&lt;BR /&gt; iv. Port = 1812&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;Click "Ok" in this menu&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;2. Go to Device &amp;gt; Authentication Profile &amp;gt; "+ Add"&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Name = PAN-Clearpass&lt;BR /&gt; ii. Authentication = RADIUS&lt;BR /&gt; iii. Server Profile = "Clearpass" (From step 1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;3. Go to Device &amp;gt; Authentication Sequence &amp;gt; "+ Add"&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Name = PAN-Auth-Sequence&lt;BR /&gt; ii. Click "+ Add"&lt;BR /&gt; iii. Select "PAN-Clearpass" (From step 2)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt; EDIT - 04/22/2014 - I had to take this additional setup on a Palo Alto device that had multiple Authentication profiles and RADIUS servers. It should be included as part of the steps to guarantee RADIUS authentication on a Palo Alto device.&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;4. Go to Device &amp;gt; Setup &amp;gt; Management Settings &amp;gt; Authentication Settings &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; i. Click the Widget button in the corner&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; ii. Select "PAN-Clearpass" under Authentication Profile"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&amp;nbsp;&amp;nbsp; iii. Save this configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt; You should now be able to log into the GUI and the CLI on a Palo Alto device with Clearpass. You can verify this on the CLI by typing:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt;show admins&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;Also, the AD account will show up before the "@" symbol on a successful CLI connection:&lt;BR /&gt; &lt;BR /&gt; mcourtney@PA-200&amp;gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;This will show up in the GUI under: &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;&lt;STRONG&gt;Dashboard &amp;gt; Logged In Admins &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Times New Roman','serif';"&gt;You can verify that things are working by logging into a Palo Alto device and viewing the results in Access Tracker found under &lt;BR /&gt; &lt;STRONG&gt;Monitoring &amp;gt; Live Monitoring.&lt;BR /&gt; &lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 May 2014 14:42:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26879#M19616</guid>
      <dc:creator>MemphisBrothers</dc:creator>
      <dc:date>2014-05-19T14:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: Is anyone using the Aruba Clearpass device to identify user and machine name information?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26880#M19617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are doing this.&lt;/P&gt;&lt;P&gt;Worked like a charm using PANOS6.0.X on our PA-200 following the Aruba/PAN technotes.&lt;/P&gt;&lt;P&gt;Setting up our PA-3020 with PANOS6.1.1 we are getting intermittent issues... ending up with a system not working.&lt;/P&gt;&lt;P&gt;We tried enabling UserID on external interface and we tried the mgmt interface... the PA deviceadminUser "aruba" logs in ok but no userinfo.&lt;/P&gt;&lt;P&gt;We are investigating at the moment. Will update when i know more&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jan 2015 08:02:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26880#M19617</guid>
      <dc:creator>steinar</dc:creator>
      <dc:date>2015-01-13T08:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: Is anyone using the Aruba Clearpass device to identify user and machine name information?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26881#M19618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got it working with some tweaks specific to our systems.&amp;nbsp; Now I see all.&amp;nbsp; :smileycool:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jan 2015 18:12:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26881#M19618</guid>
      <dc:creator>MemphisBrothers</dc:creator>
      <dc:date>2015-01-13T18:12:17Z</dc:date>
    </item>
    <item>
      <title>Re: Is anyone using the Aruba Clearpass device to identify user and machine name information?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26882#M19619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Care to share?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Steinar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Jan 2015 11:36:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26882#M19619</guid>
      <dc:creator>steinar</dc:creator>
      <dc:date>2015-01-14T11:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Is anyone using the Aruba Clearpass device to identify user and machine name information?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26883#M19620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have either of you been able to use LDAP groups in rules when the members come from Clearpass and are not logged into the Domain?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now we can use Domain users and LDAP groups.&amp;nbsp; But if the users are populated via XML, they do not "match up" with the LDAP groups.&amp;nbsp; Therefore we cannot use LDAP groups when writing policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be opening a case, but was hoping to understand this better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;db&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Jan 2015 18:30:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-anyone-using-the-aruba-clearpass-device-to-identify-user-and/m-p/26883#M19620</guid>
      <dc:creator>dbrenipc</dc:creator>
      <dc:date>2015-01-29T18:30:19Z</dc:date>
    </item>
  </channel>
</rss>

