<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RADIUS authentication and multi-vsys configuration in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/radius-authentication-and-multi-vsys-configuration/m-p/69248#M40228</link>
    <description>&lt;P&gt;Hi unfortunately this is currently not a supported feature. However since they are read only users they would not be able to make any changes even if they can see them. Also, with your read-write users there isn't a way to only allow them access to change interfaces within their specific vsys either. Access domains and RADIUS are the only way it is possible to have the scenario where a user can only view logs, ACC, policies etc... for their Vsys only and the network interface info as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You may want to consider using a vsys based admin role instead of a device based admin role. It would remove the ability for these users to see the network interfaces, vlans, VRs, network profiles etc... altogether while still showing the zones and global protect info per vsys.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Dec 2015 08:39:24 GMT</pubDate>
    <dc:creator>jpeters</dc:creator>
    <dc:date>2015-12-09T08:39:24Z</dc:date>
    <item>
      <title>RADIUS authentication and multi-vsys configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/radius-authentication-and-multi-vsys-configuration/m-p/69086#M40156</link>
      <description>&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;i have a pair of 5020, with multi-vsys environment and i want to be able to separate admin access based on vsys and read-only/read write access. I successfully configured following admin access scenario, using external RADIUS server:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;separate read-only user access to all vsys&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;separate read-only user access to only one vsys&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;separate read-write user access to all vsys&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;separate read-write user access to only one vsys.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;These are all working fine; the question is:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;when i login as read-only single vsys user, the following behavior is as expected: ACC shows only one vsys, Monitor tab shows only one vsys, Policy tab shows only one vsys, etc but Network tab shows interface for all vsys instead of just for vsys I have read-only access; virtual routers shows all vrs not just related to one vsys, BUT the zones shows only zones related to one vsys. My question is: with scenario when read-only user has access to only one vsys, is it possible to show interfaces related to that vsys ONLY?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; line-height: 15.0pt; orphans: auto; text-align: start; widows: 1; -webkit-text-stroke-width: 0px; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 10.5pt; font-family: Lato; color: #333333;"&gt;Thanks for your feedback..&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Dec 2015 17:10:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/radius-authentication-and-multi-vsys-configuration/m-p/69086#M40156</guid>
      <dc:creator>Kalemegdan</dc:creator>
      <dc:date>2015-12-07T17:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS authentication and multi-vsys configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/radius-authentication-and-multi-vsys-configuration/m-p/69248#M40228</link>
      <description>&lt;P&gt;Hi unfortunately this is currently not a supported feature. However since they are read only users they would not be able to make any changes even if they can see them. Also, with your read-write users there isn't a way to only allow them access to change interfaces within their specific vsys either. Access domains and RADIUS are the only way it is possible to have the scenario where a user can only view logs, ACC, policies etc... for their Vsys only and the network interface info as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You may want to consider using a vsys based admin role instead of a device based admin role. It would remove the ability for these users to see the network interfaces, vlans, VRs, network profiles etc... altogether while still showing the zones and global protect info per vsys.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 08:39:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/radius-authentication-and-multi-vsys-configuration/m-p/69248#M40228</guid>
      <dc:creator>jpeters</dc:creator>
      <dc:date>2015-12-09T08:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS authentication and multi-vsys configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/radius-authentication-and-multi-vsys-configuration/m-p/69270#M40245</link>
      <description>&lt;P&gt;Hi, thanks for your feedback.&lt;/P&gt;
&lt;P&gt;Unfortunatelly if i change firewall based admin role for Virtual system, in Web UI tab interface, in Network section only zones and Global protect are available for selection of enable, readonly or disable. Admin role for Device does have all tabls available under Network subsection so i think i might need to infor customer that there is no way to hide interface tab.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 19:13:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/radius-authentication-and-multi-vsys-configuration/m-p/69270#M40245</guid>
      <dc:creator>Kalemegdan</dc:creator>
      <dc:date>2015-12-09T19:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS authentication and multi-vsys configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/radius-authentication-and-multi-vsys-configuration/m-p/69302#M40253</link>
      <description>&lt;P&gt;Yes currently there is now way to hide it or rather limit the network pages by vsys. Would be a great feature for a future release. Recommend reaching out to your SE and suggest it as a feature request.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2015 03:10:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/radius-authentication-and-multi-vsys-configuration/m-p/69302#M40253</guid>
      <dc:creator>jpeters</dc:creator>
      <dc:date>2015-12-10T03:10:59Z</dc:date>
    </item>
  </channel>
</rss>

