<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP to user mapping unreliable in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30226#M22086</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can I have a first CP policy do NTLM auth and if it fails use a second CP policy asking the user for credentials ?&lt;/P&gt;&lt;P&gt;Are CP policies evaluated in a specific order (like security rules) ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 Feb 2011 08:27:18 GMT</pubDate>
    <dc:creator>dieter_b</dc:creator>
    <dc:date>2011-02-15T08:27:18Z</dc:date>
    <item>
      <title>IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30222#M22082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Situation: PC connected to our domain. Domain users log on to it. Domain users have internet access.&lt;/P&gt;&lt;P&gt;The same PC is used for assessments. These (external) users log on with a local user account (not known as a domain user). These users are not allowed to have internet access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a domain user has logged on to the PC, the IP is mapped to the user. If the domain user logs off, the IP mapping remains (until timeout). If in the meantime a local user logs on, he/she has full internet access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This posed two severe problems:&lt;/P&gt;&lt;P&gt;1. Traffic coming from that PC is mistakenly logged as coming from that user.&lt;/P&gt;&lt;P&gt;2. Policies for denying applications based on user don't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I make the device &lt;STRONG&gt;reliably &lt;/STRONG&gt;identify users and allow/deny applications ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 12:36:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30222#M22082</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-14T12:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30223#M22083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dieter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just suggest some settings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Disable local users for your end user access&lt;/P&gt;&lt;P&gt;2. Change the default time of Age-out timeout in UIA as small as possible&lt;/P&gt;&lt;P&gt;3. If using NetBIOS Probing, you may consider to shorten that but it will affect your network performance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 15:51:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30223#M22083</guid>
      <dc:creator>johnnywong</dc:creator>
      <dc:date>2011-02-14T15:51:42Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30224#M22084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. What exactly do you mean with disabling local users ?&lt;/P&gt;&lt;P&gt;2. Lowering the timeout only has effect on the PAN agent. Users are cached on the device with a fixed timeout of 3600 s. That's just too long.&lt;/P&gt;&lt;P&gt;3. no NetBIOS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead of using an agent, is there any way I can do realtime LDAP checking ? Instead of having policies look at IP addresses (even if you specify users, it comes down to IP's only), have the policies look at the user who's requesting access ? Similar to proxy authentication...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 15:59:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30224#M22084</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-14T15:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30225#M22085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, then Captive Portal might do the trick. In captive portal you can set idle timeout and maximum session length. On the other hand there is no "logoff" or client probing. Using Captive Portal with NTLM-auth is "fairly" transparent to the user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 20:14:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30225#M22085</guid>
      <dc:creator>rapoint_person</dc:creator>
      <dc:date>2011-02-14T20:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30226#M22086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can I have a first CP policy do NTLM auth and if it fails use a second CP policy asking the user for credentials ?&lt;/P&gt;&lt;P&gt;Are CP policies evaluated in a specific order (like security rules) ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 08:27:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30226#M22086</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-15T08:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30227#M22087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you define your Captive Portal you specify both an agent for NTLM authentication and an authentication profile for form-based authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means (and might not be well documented by Palo) that if you choose method NTLM in the CP-policy it will first try NTLM-authentication and then use form-based authentication as a fall back mechanism. You don't need a second policy with method captive-portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rules are read from the top to bottom. This in turn means you can make exceptions above a general policy with method NTLM or captive-portal if you want.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 08:38:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30227#M22087</guid>
      <dc:creator>rapoint_person</dc:creator>
      <dc:date>2011-02-15T08:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30228#M22088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, I will try that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 08:41:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30228#M22088</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-15T08:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30229#M22089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update on the original situation:&lt;/P&gt;&lt;P&gt;There's a serious flaw in using the PAN agent:&lt;/P&gt;&lt;P&gt;- domain user logs on, ip is mapped to user&lt;/P&gt;&lt;P&gt;- domain user logs off&lt;/P&gt;&lt;P&gt;- local user logs on before the domain user-to-ip mapping times out on the device (3600s)&lt;/P&gt;&lt;P&gt;- as long as no other domain user logs on to the same pc, the PAN agent sees the ip active, but doesn't even check if it's still the same user&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Proof of this is in the PAN agent log, fragment of the log at the time a local user was logged on (local username is completely different from domain username):&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;2011 02 15 13:14:04, PAN_AGENT_GET_NEW_IP: Number of IPs received from device (127.0.0.1): 1&lt;BR /&gt;2011 02 15 13:14:04,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; QueryIP 10.39.1.98 (mengrp\dieter) done&lt;BR /&gt;2011 02 15 13:14:04, Sending 1 IP(s) to device (127.0.0.1)&lt;BR /&gt;2011 02 15 13:14:04,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1] 10.39.1.98 : mengrp\dieter to device (127.0.0.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This gets logged every other minute or so. Doesn't even matter if the local user logs of or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The mapping never times out. You'd expect it to time out, what else is the age-out timeout setting in the PAN agent for ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I ever be 100% certain that logged traffic is from a specific user ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 12:34:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30229#M22089</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-15T12:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30230#M22090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@dietr:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the QueryIP looks like a Netbios/WMI probe. Is Netbios/WMI probing enabled? If so what is the timer setting for the probe interval?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 13:05:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30230#M22090</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-02-15T13:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30231#M22091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct. I was testing to see if it made any difference. It doesn't.&lt;/P&gt;&lt;P&gt;Log fragment with NetBIOS disabled:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;2011 02 15 14:33:55, Sending 5 IP(s) to device (127.0.0.1)&lt;BR /&gt;2011 02 15 14:33:55,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1] 10.39.1.62 : mengrp\geoffrey.beulque to device (127.0.0.1)&lt;BR /&gt;&lt;STRONG&gt;2011 02 15 14:33:55,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [2] 10.39.1.98 : mengrp\dieter to device (127.0.0.1)&lt;/STRONG&gt;&lt;BR /&gt;2011 02 15 14:33:55,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [3] 10.39.0.106 : mengrp\geoffrey.beulque to device (127.0.0.1)&lt;BR /&gt;2011 02 15 14:33:55,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [4] 10.39.0.199 : mengrp\dieter.bulcke to device (127.0.0.1)&lt;BR /&gt;2011 02 15 14:33:55,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [5] 10.39.0.17 : mengrp\paul.gijswijt to device (127.0.0.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that the pc has been physically disconnected from the network over half an hour ago. But the PAN agent still thinks it is mapped to the domain user. Age-out timeout is set to 5 min.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 13:37:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30231#M22091</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-15T13:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30232#M22092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@dieter:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in your pan agent config file what is the setting for &amp;lt;enable_full_expire&amp;gt;? if it is 0 change it to 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there a user_ip_map.txt file in the Pan Agent folder? If so delete it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;restart the PanAgent service. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do you still see the problem? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 13:53:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30232#M22092</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-02-15T13:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30233#M22093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;enable_full_expire was indeed set to 0 (why is that option not on the configure dialog ?!)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The file user_ip_map.txt gets recreated shortly after restarting the panagentservice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will test timeout expiration now...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 14:02:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30233#M22093</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-15T14:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30234#M22094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, the user now times out on the PAN agent.&lt;/P&gt;&lt;P&gt;But on the device the timeout is fixed at 3600 seconds. This means the local user who has logged on shortly after the domain user can still access the internet. And that traffic is mistakenly logged as coming from the domain user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 14:22:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30234#M22094</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-15T14:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30235#M22095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See you got some help regarding your idle/expire timers.&lt;/P&gt;&lt;P&gt;I agree that monitoring security logs solely never will identify users 100% correctly. You might get close to 100% depending on your network and you configuration. The main reasons for this being:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3366ff;"&gt;A)&amp;nbsp;&amp;nbsp;&amp;nbsp; PAN-agent does not monitor logoff events. I’m not even sure DC’s default log those types of events.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3366ff;"&gt;B)&amp;nbsp;&amp;nbsp;&amp;nbsp; PAN-devices rely on timers and/or wmi/nebios probing to speed up expiration of old ip-user mappings.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3366ff;"&gt;C)&amp;nbsp;&amp;nbsp;&amp;nbsp; Palo doesn’t have an agent solution that can be installed on the client to pickup logon/logoff events and report these events on the fly to a “PAN-client-service” or whatever you want to call it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Picking up client local logon events on the other hand would only be interesting if those types of logons resulted in the user was re-labeled as “unknown”. That way we can choose to deal with them as unknown users, have them logon in the domain again or use captive portal. Then again, this would require some sort of agent on the client.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 14:26:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30235#M22095</guid>
      <dc:creator>rapoint_person</dc:creator>
      <dc:date>2011-02-15T14:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30236#M22096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;This undermines one of the most important features PaloAlto advertises: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.paloaltonetworks.com/technology/user-id.html"&gt;http://www.paloaltonetworks.com/technology/user-id.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 14:38:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30236#M22096</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-15T14:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30237#M22097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, that is one way to look at it. As I mentioned before it is likley we don't know 100% of the users 100% of the time. In a Windows environment local client users are a bit of a hazzle. Then again, how many of us allow "avarage Joe" to logon locally? In most cases nearly all users are in our directory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know how the LDAP-agent works with e-Directory as Novell saves both logon/logoff events in the directory as well as the client IP. In theory it would be easier to keep track of these users... but.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...users were born to make our lives a living hell &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt; They shut off the PC's without logging off, hibernate the PC, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;100% correct 100% of the time is tough, but there is room for improvement no doubt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good Luck!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 18:21:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30237#M22097</guid>
      <dc:creator>rapoint_person</dc:creator>
      <dc:date>2011-02-15T18:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30238#M22098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you require absolute to the second 100% information on a user - this will need s/w on the client.&amp;nbsp; For this you have a couple of options:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Use a combination of 802.1x supplicants and 802.1x Network.&amp;nbsp; Then use RADIUS messages from 802.1x over EAP, for example, to hook into our User-ID XML-API.&amp;nbsp; You'll get log on and off here.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; PAN-OS 4.0 will give you client s/w that can be distributed to get to the desired results for User-ID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 18:34:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30238#M22098</guid>
      <dc:creator>James</dc:creator>
      <dc:date>2011-02-15T18:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30239#M22099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Like you said: most users are in our active directory. That's because we want to make sure the user is allowed/forbidden access to certain resources. I consider AD authentication very reliable. The only time it fails is when users give their passwords to others, but that is not my responsability anymore.&lt;/P&gt;&lt;P&gt;Until further notice I consider User ID not reliable, but it &lt;STRONG&gt;is &lt;/STRONG&gt;my responsability to make sure unauthenticated user can't browse the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having my reseller escalate the issue to the local PA office.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Feb 2011 07:38:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30239#M22099</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-16T07:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30240#M22100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dieter,&lt;/P&gt;&lt;P&gt;The real problem we are hitting here is that you have non domain users as well as domain users and our current design has no real support for local users. If you were having multiple domain users use the sytem, the new log in events would update and all would be well. Instead what happens is there is no event that we track occuring when the local user loggs on. You can define log out scripts in your AD to remove the user from User ID using the API. This would serve to make the local user unknown, which seems to be the result that you want. Does this make sence?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 17:20:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30240#M22100</guid>
      <dc:creator>npiagentini</dc:creator>
      <dc:date>2011-02-17T17:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: IP to user mapping unreliable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30241#M22101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does make sense, but as far as I know, the PAN agents don't collect log out events.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 17:23:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-to-user-mapping-unreliable/m-p/30241#M22101</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2011-02-17T17:23:51Z</dc:date>
    </item>
  </channel>
</rss>

