<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID and app discovery on IPSec tunnel  for site-to-site VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374748#M89110</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/143364"&gt;@JoschkaKruse&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;User-ID information will age-out unless your are actively receiving additional logs for that user or you have enabled probing. You can either adjust that so it holds onto the mapping longer, add additional sources to be monitored such as Exchange, or setup probing. What is your timeout value currently set to?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Dec 2020 17:57:51 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-12-16T17:57:51Z</dc:date>
    <item>
      <title>User-ID and app discovery on IPSec tunnel  for site-to-site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374664#M89086</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we're using a VM300. I've recently set up&amp;nbsp; 2 VPN tunnels, ike1 and ikev2. Tunnels come up successfully, but no user-ID is being transmitted and apps are not being discovered properly.&lt;/P&gt;&lt;P&gt;We also have another site connected via MPLS where everything works fine.&lt;/P&gt;&lt;P&gt;User-ID has been enabled on the zone where the tunnels are connected to.&lt;/P&gt;&lt;P&gt;Any hints and ideas what I am missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2020 15:39:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374664#M89086</guid>
      <dc:creator>JoschkaKruse</dc:creator>
      <dc:date>2020-12-16T15:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: Agentless User-ID and app discovery on IPSec tunnel  for site-to-site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374695#M89092</link>
      <description>&lt;P&gt;Good Morning&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I am a little confused about expectations and what&amp;nbsp; you described.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First, User ID is NOT transmitted, it is received from your local FW, when a Src Addr communicates.&lt;/P&gt;
&lt;P&gt;So I do not believe we are "transmitting" UserID to the remote side.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not sure I understand the connection between no UserID and applications detection.&lt;/P&gt;
&lt;P&gt;Are you stating the zero applications are seen across your VPN?&amp;nbsp; That does seem strange.&lt;/P&gt;
&lt;P&gt;Perhaps you can do more into detail on this aspect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think the feature you need to enable (if I understand correctly) is User ID redistribution.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/deploy-user-id-in-a-large-scale-network/redistribute-user-mappings-and-authentication-timestamps/configure-user-id-redistribution.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/deploy-user-id-in-a-large-scale-network/redistribute-user-mappings-and-authentication-timestamps/configure-user-id-redistribution.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2020 13:45:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374695#M89092</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2020-12-16T13:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: Agentless User-ID and app discovery on IPSec tunnel  for site-to-site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374696#M89093</link>
      <description>&lt;P&gt;what mechanism are you using to match incoming IP addresses to user-id ? (are incoming user connections logging in via an account on the local AD. is Captive Portal set up? )&lt;/P&gt;&lt;P&gt;and what are you seeing in regards to apps not being identified correctly?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2020 13:45:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374696#M89093</guid>
      <dc:creator>Thyrion</dc:creator>
      <dc:date>2020-12-16T13:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: Agentless User-ID and app discovery on IPSec tunnel  for site-to-site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374698#M89095</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/143364"&gt;@JoschkaKruse&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets make it clear user-ID has nothing to do with app-ID, so lets separate the two issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;User-ID:&lt;/P&gt;&lt;P&gt;Enabling user-ID on the IPsec tunnel zone will only tell the firewall to look for user-to-ip mapping for the source IPs that are received from that zone. You still need to have the "user-to-ip" mapping information from somewhere. If you say you are using Agentless I guess you are using Server Monitor and firewall is looking at the Active Directly security logs for logon events. Can you confirm that AD you are monitoring have logon events for the users in the remote network? Are these users use the same AD?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot think of any reason why IPsec tunnel will behave differently from any other interface on the firewall. So I will abstract from the fact that it is IPsec tunnel, and look if the AD that FW is monitoring actually have information for IP network behind the tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application-ID:&lt;/P&gt;&lt;P&gt;Again - no reason why IPsec tunnel will behave differently from any other interface on the firewall. In addition FW will always try to identify the traffic that is processing, no matter if you use apps in the security rulebase or not. Can you explain a bit more what do you mean by "apps are not being dicovered properly"? What is firewall reporting and what do you expect to be reporting?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2020 13:49:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374698#M89095</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2020-12-16T13:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID and app discovery on IPSec tunnel  for site-to-site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374744#M89108</link>
      <description>&lt;P&gt;I'm pretty new to Palo and firewalling, so sorry for the lack of info I gave you &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;We're using a UIA and terminal server agent. Sorry for the faulty info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for all your responses so far.&amp;nbsp;Just figured it out I guess &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;App-id for internal traffic worked properly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same with user-id somehow.&lt;/P&gt;&lt;P&gt;Maybe I had a faulty client for my tests yesterday.&lt;/P&gt;&lt;P&gt;So my only issue seemed to be the app-id.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I saw that all external requests ended up as incomplete and NAT destination port as 0.&lt;/P&gt;&lt;P&gt;So what I missed was, to add the VPN zone to the hide NAT rule. After that, appid was recognized immediately. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only thing I'm wondering about is the fact that the user-id gets lost after a longer period of inactivity on the client in the VPN network. Maybe that's cause of the cache settings configured for the user-id?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2020 16:42:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374744#M89108</guid>
      <dc:creator>JoschkaKruse</dc:creator>
      <dc:date>2020-12-16T16:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID and app discovery on IPSec tunnel  for site-to-site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374748#M89110</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/143364"&gt;@JoschkaKruse&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;User-ID information will age-out unless your are actively receiving additional logs for that user or you have enabled probing. You can either adjust that so it holds onto the mapping longer, add additional sources to be monitored such as Exchange, or setup probing. What is your timeout value currently set to?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2020 17:57:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-and-app-discovery-on-ipsec-tunnel-for-site-to-site-vpn/m-p/374748#M89110</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-12-16T17:57:51Z</dc:date>
    </item>
  </channel>
</rss>

