<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID and internet access in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-internet-access/m-p/113862#M45249</link>
    <description>&lt;P&gt;Hi Farzana,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could deploy Global Protect &amp;amp; internal host detection so that when the computer comes out of hibernation, the GP connects and authenticates the user that way (but does not establish a tunnel). &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another way would be to implement a 'catch-all' captive portal policy so that if all the other identification methods fail, they have to authenticate via a captive portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One other way would be to configure wireless access points to send syslog to your firewall, if a user authenticates to the wireless network the AP could send syslog to the firewall containing the username &amp;amp; IP address which you can configure the firewall to parse out and create a mapping for them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can find more info here and determine which solution best fits you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/user-id-overview#67469" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/user-id-overview#67469&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
    <pubDate>Fri, 16 Sep 2016 10:44:43 GMT</pubDate>
    <dc:creator>bmorris1</dc:creator>
    <dc:date>2016-09-16T10:44:43Z</dc:date>
    <item>
      <title>User-ID and internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-internet-access/m-p/113841#M45245</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If a user uses the PC at home (not behind the Palos) to access the Internet then hibernates their PC, then comes to work and connects to the network (behind the Palos) and un-hibernates, they can no longer access the Internet until the PC re-authenticates to AD and when the user-ID agent can identify the user again. There is a period when the user cannot use the Internet as the Palo policy states the user must be known via user-ID. This can be while depending on what apps the user uses after they un-hibernate.&lt;/P&gt;&lt;P&gt;Is there a way to fix this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2016 06:46:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-internet-access/m-p/113841#M45245</guid>
      <dc:creator>Farzana</dc:creator>
      <dc:date>2016-09-16T06:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID and internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-internet-access/m-p/113862#M45249</link>
      <description>&lt;P&gt;Hi Farzana,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could deploy Global Protect &amp;amp; internal host detection so that when the computer comes out of hibernation, the GP connects and authenticates the user that way (but does not establish a tunnel). &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another way would be to implement a 'catch-all' captive portal policy so that if all the other identification methods fail, they have to authenticate via a captive portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One other way would be to configure wireless access points to send syslog to your firewall, if a user authenticates to the wireless network the AP could send syslog to the firewall containing the username &amp;amp; IP address which you can configure the firewall to parse out and create a mapping for them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can find more info here and determine which solution best fits you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/user-id-overview#67469" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/user-id-overview#67469&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2016 10:44:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-internet-access/m-p/113862#M45249</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2016-09-16T10:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID and internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-internet-access/m-p/114038#M45276</link>
      <description>&lt;P&gt;Thanks Ben for the wonderful suggestions.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2016 00:21:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-internet-access/m-p/114038#M45276</guid>
      <dc:creator>Farzana</dc:creator>
      <dc:date>2016-09-19T00:21:53Z</dc:date>
    </item>
  </channel>
</rss>

