- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
In today's complex network environments, strong security and efficient traffic management are paramount. Many organizations rely on robust firewalls like Palo Alto Networks for advanced threat protection and granular policy enforcement. However, when it comes to dynamic user identity management, flexible captive portals, and precise bandwidth control at the edge, a specialized solution like 24Online can offer significant advantages.
Imagine a scenario where your security firewall isn't just protecting against threats, but also seamlessly integrating with your identity and access management system, allowing for advanced intelligent traffic shaping and a smooth user experience from the moment they connect. This isn't just a dream; it's a reality achievable by integrating 24Online with Palo Alto Networks, leveraging the power of APIs.
Palo Alto Networks is a leader in next-generation firewalls, providing unparalleled visibility into applications, users, and content. Its capabilities include intrusion prevention, advanced threat protection, URL filtering, and application control.
24Online excels in identity and access management, especially for diverse user bases, offering:
While 24Online and Palo Alto Networks can certainly co-exist in a network, the real magic happens when they are integrated through APIs. This allows for a dynamic exchange of information, leading to:
1. Context-Aware Security Policies:
2. Enhanced Traffic Shaping and QoS:
3. Unified Captive Portal and Security Workflow:
Consider a common scenario: a corporate guest Wi-Fi network.
This integrated approach means you're not just providing internet access; you're providing secure, controlled, and managed internet access, with full visibility and policy enforcement from two industry-leading solutions working in harmony.
Integrating 24Online with Palo Alto Networks through API allows organizations to create a truly intelligent and secure network infrastructure. You gain the best of both worlds: 24Online's dynamic identity and access management with flexible captive portals and precise bandwidth control, combined with Palo Alto Networks' industry-leading next-generation firewall capabilities. This synergy ensures a secure, efficient, and user-friendly network experience for everyone.
Step 1: Device> User Identification> User Mapping > User-ID agent> Syslog Filter> Add Syslog Parse Profile
Steps for Login
Event Regex: \s*LOGIN\s*
Username Regex: UserName:([A-Za-z0-9@._-]+)
Address Regex: FramedIP:([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3})
Follow same steps for Logout
Event Regex: \s*LOGOUT\s*
Username Regex: UserName:([A-Za-z0-9@._-]+)
Address Regex: FramedIP:([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3})
Step 2: Device> User Identification> User Mapping > Server monitoring > Add new and change type> Syslog sender> Both PARSE Profile Login and Logout
Step 3: Configure policy based on user/group wise.
The integration allows the Palo Alto Networks firewall to:
24online System Configuration
Step 1: Configure Authentication Server
Configure the LDAP authentication server to enable centralized user management.
Figure 1: 24online Manage Authentication Server Interface
Step 2: Configure Syslog Data Pusher
Configure the syslog data pusher to send authentication events to the Palo Alto Networks firewall.
|
Parameter |
Pusher 1 |
Pusher 2 |
Description |
|
IP Address |
20.x.x.x |
20.x.y.y |
PA-VM firewall |
|
Port |
514 |
514 |
Standard syslog |
|
Type |
Syslog |
Syslog |
Protocol type |
|
Format |
Login |
Logout |
Event types |
Figure 2: 24online Syslog Data Pusher Configuration
Step 3: Configure Syslog Server Profile
Configure the firewall to receive and send syslog messages.
|
Parameter |
Value |
|
Profile Name |
24online |
|
Server Name |
24online |
|
Syslog Server |
20.x.x.x |
|
Transport |
UDP |
|
Port |
514 |
|
Format |
BSD |
|
Facility |
LOG_USER |
Figure 3: PA-VM Syslog Server Profile Configuration
Step 4: Configure User-ID Agent Syslog Filters
Configure syslog parsing filters to extract user information from incoming syslog messages.
Figure 4: PA-VM User-ID Agent Syslog Filters Configuration
Step 5: Configure Network Interfaces
Ensure the management interface is properly configured to receive syslog messages.
Figure 5: PA-VM Network Interface Configuration
Verify Syslog Communication
After configuration, verify that syslog messages are being properly exchanged between 24online and the Palo Alto Networks firewall.
Check Syslog Output
Figure 6: Syslog Authentication Messages in Browser
Figure 7: CLI Output Showing User-IP Mappings
Figure 8: PA-VM Traffic Logs with User Information
Figure 9: PA-VM Traffic Logs with User Information
Figure 10: PA-VM Traffic Logs with User sukdev7
Generate network traffic and verify it appears in firewall logs with username
NGFW Panorama #PANOS #Captive-Portal #24OnlineIntegration
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
| Subject | Likes |
|---|---|
| 3 Likes | |
| 3 Likes | |
| 3 Likes | |
| 2 Likes | |
| 2 Likes |
| User | Likes Count |
|---|---|
| 6 | |
| 5 | |
| 4 | |
| 2 | |
| 2 |


