<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pan-agent settings over the WAN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/62#M54</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi rmonvon, thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are currently running PANOS 4.0.11 and UIA 3.1.2. I see all the pan-agents are connected and the primary one is only for retrieving group membership.&lt;/P&gt;&lt;P&gt;So the ip-user&amp;nbsp; mappings are still picked up from all pan-agents. &lt;/P&gt;&lt;P&gt;I've done some testing in our lab and it seems to work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Aug 2012 15:00:12 GMT</pubDate>
    <dc:creator>rds</dc:creator>
    <dc:date>2012-08-09T15:00:12Z</dc:date>
    <item>
      <title>Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/51#M43</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are having some issues with our remote sites as they browse the internet through the central site however they authenticate to Domain Controllers locally in the remote sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When we enter the remote site DC's in the pan-agent (which resides in the central site) the traffic generated by the agent when pulling the security event logs kills the 10Mbps WAN link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any recommended settings we can tweak which would minimize this traffic or is there a bandwidth limit we can set somewhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are currently running pan-agent 3.1.2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 15:48:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/51#M43</guid>
      <dc:creator>rds</dc:creator>
      <dc:date>2012-08-06T15:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/52#M44</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Our solution was to install a pan-agent at each remote site.&amp;nbsp; The bandwidth required between pan-agent and the firewall is almost nothing compared to the bandwidth between pan-agent and the DC.&amp;nbsp; The reason is that pan-agent needs to constantly read all of the security event log entries on the DC, but only needs to provide the results (list of usernames and IPs) to the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 20:23:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/52#M44</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-08-06T20:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/53#M45</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;abelgard is correct and the agent will need to read all the events in the security log to detect the logon/logoff events.&amp;nbsp; As a example, if your DC is generating 100MB log/hour then the agent will retrieve 100MB per hour.&amp;nbsp; You can deploy an agent closer to the DC as suggested.&amp;nbsp; The agent can also read the security log of exchange server(s) and typically, exchange server(s) are centrally located.&amp;nbsp; If remote users are logging into your exchange server(s) and your exchange server(s) are centrally located, this is another option to consider. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 04:09:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/53#M45</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-08-07T04:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/54#M46</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the responses. Please correct me if I'm wrong but the PA only references one agent as the active agent for a domain. &lt;/P&gt;&lt;P&gt;So if it references an agent in the central site, which doesn't list all the DC's how does the agent at the remote site help in this situation?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 08:14:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/54#M46</guid>
      <dc:creator>rds</dc:creator>
      <dc:date>2012-08-07T08:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/55#M47</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Each PA can support up to 100 agents.&amp;nbsp; See this posting:&amp;nbsp; &lt;A __default_attr="13481" __jive_macro_name="message" class="jive_macro jive_macro_message" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 14:32:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/55#M47</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-08-07T14:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/56#M48</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It can support 100 agents but..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"only one agent per domain actually connects to the firewall at a time.&lt;/EM&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;EM&gt; In other words, having multiple user-id agents connected to 1 firewall for 1 domain will only provide redunancy in case one of the agents goes down."&lt;/EM&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Does it mean that if our PA is connected to one pan-agent it will still recognise the users authenticating to a DC that is referenced on one of the backup agents?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 16:19:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/56#M48</guid>
      <dc:creator>rds</dc:creator>
      <dc:date>2012-08-07T16:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/57#M49</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Further down that post, there is a correction and you can have multiple agents connected at the same time.&amp;nbsp; You can have agent1 monitoring DC1 in the core, agent2 monitoring DC2 at remote site A, agent3 monitoring DC3 at remote site B, and so on.&amp;nbsp; Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"• Each UIA can connect to up to 100 Domain Controllers&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;• Each firewall can support up to 100 UIA’s&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;• Limit of 100 entries each in the Allow and Ignore list on the UIA"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;In summary, it looks like we can have 100 agents connected.&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 16:41:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/57#M49</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-08-07T16:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/58#M50</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok so this would require us to be running UIA 4.1.x. Does this also mean we need to be running PANOS 4.1.x? We are currently running 4.0.11.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2012 08:20:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/58#M50</guid>
      <dc:creator>rds</dc:creator>
      <dc:date>2012-08-08T08:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/59#M51</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is supported for PAN-S 4.0 as well.&amp;nbsp; You don't have to upgrade to 4.1.&amp;nbsp; The UIA should be the same 4.x release train to match the 4.x of your PA devices.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2012 18:21:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/59#M51</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-08-08T18:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/60#M52</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There doesn't seem to be a 4.0.x UIA agent? It goes from 3.1.2 -&amp;gt; 4.1.0? &lt;/P&gt;&lt;P&gt;&lt;IMG alt="UIA.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/3709_UIA.jpg" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 11:22:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/60#M52</guid>
      <dc:creator>rds</dc:creator>
      <dc:date>2012-08-09T11:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/61#M53</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please use the 3.1.2-AD agent as it is forward compatible.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 12:31:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/61#M53</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-08-09T12:31:18Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/62#M54</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi rmonvon, thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are currently running PANOS 4.0.11 and UIA 3.1.2. I see all the pan-agents are connected and the primary one is only for retrieving group membership.&lt;/P&gt;&lt;P&gt;So the ip-user&amp;nbsp; mappings are still picked up from all pan-agents. &lt;/P&gt;&lt;P&gt;I've done some testing in our lab and it seems to work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 15:00:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/62#M54</guid>
      <dc:creator>rds</dc:creator>
      <dc:date>2012-08-09T15:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: Pan-agent settings over the WAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/63#M55</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about deploying it straight at each DC and in the configuration set it to only read security log from localhost?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way the only traffic is the one between PA and each DC/Pan-agent server (which would be very little compared to when the security logs is being tailed over the network between pan-agent and each DC its set to monitor).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 22:21:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-agent-settings-over-the-wan/m-p/63#M55</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-08-20T22:21:31Z</dc:date>
    </item>
  </channel>
</rss>

