<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect ip-user-mapping issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39982#M29315</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe you could use the CLI command &lt;STRONG&gt;&lt;EM&gt;set user-id-collector include-exclude-network&lt;/EM&gt;&lt;/STRONG&gt; in order to exclude GP IP Pool 10.1.253.0/24 from AD IP usermapping ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds&lt;/P&gt;&lt;P&gt;Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Feb 2013 13:10:57 GMT</pubDate>
    <dc:creator>gafrol</dc:creator>
    <dc:date>2013-02-22T13:10:57Z</dc:date>
    <item>
      <title>GlobalProtect ip-user-mapping issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39981#M29314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;PA-500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PAN-OS 5.0.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello, we've deployed GlobalProtect with local user authentication (authentication profile = local database), user identification is enabled both on trust and vpnclient zones.&lt;/P&gt;&lt;P&gt;Also, user mapping is enabled with UID Agent directly from the firewall.&lt;/P&gt;&lt;P&gt;Everything's working fine with vpn authentication, once connected the client shows up as the LOCAL user as expected:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;IP address:&amp;nbsp; 10.1.253.10 (vsys1)&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; assigned ip address range is 10.1.253.0/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;User:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; abcde&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; this is in the local user database&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;From:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Idle Timeout: 2591965s&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Max. TTL:&amp;nbsp;&amp;nbsp;&amp;nbsp; 2591965s&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Groups that the user belongs to (used in policy)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the vpn client starts to generate traffic to/from internal lan accessing active directory resources (i.e. remote desktop or network shares) it has to authenticate towards Active Directory with domain credentials.&lt;/P&gt;&lt;P&gt;This obviously also generates security logs on the DCs, which are read by onboard UID agents causing ip-user-mapping to change from LOCAL user to AD user for the same ip address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP address:&amp;nbsp; 10.1.253.10 (vsys1)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;User:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; testdomain\testuser&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; this is the AD account used to authenticate when accessing internal lan resources&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;From:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AD&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Idle Timeout: 2699s&lt;/P&gt;&lt;P&gt;Max. TTL:&amp;nbsp;&amp;nbsp;&amp;nbsp; 2696s&lt;/P&gt;&lt;P&gt;Groups that the user belongs to (used in policy)&lt;/P&gt;&lt;P&gt;Group(s):&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=vpn_users-all,ou=vpn,dc=testdomain,dc=local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is causing issues since security policies for vpn clients are setup with LOCAL users and not AD users, as obviuos.&lt;/P&gt;&lt;P&gt;I'm aware that using AD authentication for GlobalProtect would be advisable, but now we have to keep on with local user authentication.&lt;/P&gt;&lt;P&gt;Haw can we prevent AD user-ip-mapping from &lt;EM&gt;overwriting &lt;/EM&gt;the initial (correct) GlobalProtect mapping for vpn client network range 10.1.253.0/24?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ps: I've tried the Include/Exclude Network option in Use Mapping section by entering the exclusion for 10.1.253.0/24, but with no success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 10:36:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39981#M29314</guid>
      <dc:creator>errevisystem</dc:creator>
      <dc:date>2013-02-22T10:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect ip-user-mapping issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39982#M29315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe you could use the CLI command &lt;STRONG&gt;&lt;EM&gt;set user-id-collector include-exclude-network&lt;/EM&gt;&lt;/STRONG&gt; in order to exclude GP IP Pool 10.1.253.0/24 from AD IP usermapping ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds&lt;/P&gt;&lt;P&gt;Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 13:10:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39982#M29315</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2013-02-22T13:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect ip-user-mapping issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39983#M29316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have done a quick test on 5.0.1 on my PA and I do see the same behavior. I have excluded the network 10.101.101.0/24 as shown below in the running configuration from the CLI&lt;IMG alt="Screen Shot 2013-02-22 at 9.54.41 AM.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/5702_Screen Shot 2013-02-22 at 9.54.41 AM.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;But User-IP-Mappings for the IP of the GP client 10.101.101.125 are still mapped if I access an AD inside my network as shown below &lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2013-02-22 at 9.55.12 AM.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/5703_Screen Shot 2013-02-22 at 9.55.12 AM.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;This is not working a expected. I would suggest you to open a ticket with support for further help.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sandeep T&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 18:03:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39983#M29316</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2013-02-22T18:03:47Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect ip-user-mapping issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39984#M29317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;did you managed with this?&lt;/P&gt;&lt;P&gt;we are having almost the same issues.&lt;/P&gt;&lt;P&gt;what have you done?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jan 2014 07:05:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39984#M29317</guid>
      <dc:creator>minow</dc:creator>
      <dc:date>2014-01-28T07:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect ip-user-mapping issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39985#M29318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi minov&lt;/P&gt;&lt;P&gt;This topis is near one year old. What version of PAN do you have installed?&lt;/P&gt;&lt;P&gt;Please upgarde to 5.0.9, I'm on 5.0.9 and I haven't such problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jan 2014 18:20:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39985#M29318</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-01-28T18:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect ip-user-mapping issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39986#M29319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;5.0.9 i have a user authenticate through Radius, and then RDP to a server and some shares then the user-ip-mapping changes to the AD user which have different policy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jan 2014 17:54:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-ip-user-mapping-issue/m-p/39986#M29319</guid>
      <dc:creator>minow</dc:creator>
      <dc:date>2014-01-29T17:54:14Z</dc:date>
    </item>
  </channel>
</rss>

