Please check if the users get into the PAN Agent 1st of all. I assume you downloaded the PAN Agent for AD and not for LDAP, as they are two different things.
So I guess the first place to troubleshoot is where the User-ID is "broken". Is it between the Agent and the DC's or between the Agent and the PA Appliance?
You can check on the Agent if it is able to read the LDAP tree and also able to get all user information and groups. If not, then please turn the logging up to verbose and capture the logs.
This may turn into a support case, but let me know how you get on with this?
Here's how me and the Tech fixed this issue.
*First you must have the AD agent then when setting up the UIA on the PAN ensure you choose PAN-Agent this is why your getting the SSL errors.
*The reason your not getting the IP information is because of your Auditing on the DC's in your organization. I had to go in group policy and go to the policy for domain controllers enable Success/Failure in the local policies Auditing container.
*If you are using Server 2008 here's the events the UIA looks for 4624, 4768, 4769, 4770, 4776 once this is working the UIA looks at the DC security logs in event viewer for logon success/failures this will happen immediately but I did a gpupdate /force on my DC's.
*Go to your UIA and select Get IP All you should see your IP's that you configured in the ALLOW IP. That's all I did and I'm in business.
thanks for your help. i will answer your suggestions:
i already had pan agent selected
we used to have the old version of pan agents so surely the auditing is already setup. i can click get all and that shows me all the user to IP mappings on the PAN agent.
most are server 2003 DC's with 1 server 2008, but they all worked fine before 3.1
IPs allowed are all private ranges on the PAN agent. there is also a checkpoint FW between the management interface on the PAN and some of the DCs with the agent installed, but I have checked and that traffic is all accepted and passed. I can see in the logs on the PAN Agent that it's seeing the connection from the PAN.
Message was edited by: aveva.palo
the issue was 2 fold.
some of the DCs I upgraded to 3.1 PAN Agent I also rebooted because of windows updates. others I didn't. the other ones had no pan agent service running. that isn't the main issue, but I'm posting it here for future reference.
in the end the palo 4020 had cached some SSL info that is established when connecting to the PAN Agents. as I upgraded the agents they didn't recognise the SSL info from the PAN and refused the connection. Palo tech support ran some commands to diagnose this, then ran one command to restart a service on the PAN box that looks after the PAN agent connections. this also flushed the cashe, but the user traffic was not affected.
How is the traffic recognized in your traffic log, as ssl or as paloalto-userid-agent?
There is an application named "paloalto-userid-agent" (or similar) which in case you use a non default port you might need to setup an "application override" for so the PAN will know its userid-agent traffic. However when you setup a policy for this traffic (if reach through one of the interfaces on the dataplane) I think you need to setup both ssl and paloalto-userid-agent as allowed applications.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!