I see you asked your question a while back. Maybe you already got it working. If so, please share. Otherwise, I have a little bit to share since I have gotten this partially working. Well, maybe only the tiniest bit working. First thing is that the ClearPass server connects from its RADIUS IP rather from the Management IP. This is hard to figure out without a sniffer, if you have the https requests go to the Management port on the Palo Alto, which is what I first tried. However, since most of our PAs are HA pairs, that would mean two management IP entries for each. Plus, no firewall logging to help debug the thing. So I made the trust interface an https management port, updated the ACL, then added a Security Policy to allow the RADIUS servers to talk ssl to the interface IP. This seems to have worked. Sort of. I see the connections, but they come up as "incomplete" rather than "ssl" as I would expect. They're short too. 6 packets and 636 bytes each. I used a browser to connect and it worked fine, so it seems functional. Also, I see only a a few IP entries added to the ip-user-mapping table. I should see hundreds. Here's what I think is the useful command: "show user ip-user-mapping all | match XMLAPI". Another thing, which may or may not be an issue, is that for those few entries I do get, I see only the user name and not the domain. That's in contrast to what I see in the table from the User-ID Agent. The documentation on this is shy of useful detail, especially on the Palo Alto config side. I'll keep poking at it, but I'm hoping a little activity here will draw out somebody who has this working.
... View more