Enviroment I've worked on: 13k+ active users (expected to double in the next couple of years) 120+ domain controllers 180+ remote sites with WAN links varying from 4Mb - 10Gb Centralised internet gateway Very dynamic network, sites been mobilised/ demobilised usually on a monthly basis My opinion its great for large centralised and static enviroments.. were all you users are in a central location... However if you have a large disparate or spread out enviroment you might hit some issues with some of the undocumented limitations of the UserID agents/ architecture. -Each firewall can only talk to a maximum 100 userID agents -Each agent can only monitor a maximum of 100 domain controllers So if you have more than 100 DCs you CANT just push an agent out to all of them so that sec logs can be locally read and user-ip maps sent to FW.. Or the other way if you wanted to use a central agent to monitor multiple DCs (which unfortunately tends to generate alot of traffic across the WAN).. then you would need to install a minimum 4 agents servers.. (ie. 2 agents cos single agent can only monitor max 100dcs.. and another 2 needed to provide redunadncy) I really hope PA will increase these seeminly arbitrary limitations in the near future.. (amazinly the older agent by "default" would only let you connect to a max of 10 domain controllers... you'd have to edit a xml config file to get them to talk to more.) -- Some recommendations As PA recommend.. whatever your primary authentication method, it's usually worthwhile setting up captive portal/ NTLM auth as fallback authentication mechanism for any web users/ clients which slip through the cracks. Just be aware when setting up for NTLM authing that some browsers (e.g firefox) require manual configuration in order to support NTLM.. and they also maintian their own separate list of trusted RootCA's i.e they dont refernce the local windows certificate store (which you might be updating via grou policy etc)... so firefox users might get cert warnings when hitting the CP/NTLM redirect. Regarding you IV Pumps/ or SCADA style equipment, if you do already have these devices in dedicated VLANs but you cant trunk them all back to central layer 3 interface to push them through a dedicated interface/ zone on the firewall natively... you can potentially virtualise your network at a layer 3 level. Utilise a combination of VRF or VRF-LIte to create a separate virtual layer3 network instance and you could use mGRE or IPSEC/VTI to tunnel this traffic across your regular network back to a central interface connect through the firewall providing complete network isolation for your sensitive devices and then... apply appropriate policies on that zone/interface. Otherwise yes as you mentioned it is possible to put a non-authenticating policy before your standard user web browsing authetnicated policy.. and as long as you specifying the trusted destination which can be accessed without authentication this could be considerded an acceptable level of security (depedning on your risk model). Which you could also further secure by creating a custom application signature and only allow the specifically required type of traffic. I find this suitable for things like printers etc that want to phone home across the net to their vendors to order more consumables or notify of problems etc. e.g Permit ***FROM*** src = 10.0.0.0/8 (be specific if you can.. but dont have to) user = any (ie. dont require authentication) ***TO*** dst = 1.1.1.1/32 ( be specific) port = TCP 577 App = IVPUMP (create custom app signature) I believe Cisco's got big whitepaper on TrustSec/ NAC 2.0 style stuff spefically focussed on medical enviroments which may be of interest to you http://www.cisco.com/en/US/docs/solutions/Verticals/Healthcare/bnac_adg_2.0.html As already mentioned if you do implement a NAC solution these devices will be authenticated automatically by the NAC system (by profiling, eap or MAC address etc), you can then plug into these systems using syslog and the extensibile UserID api to get that auth information to the firewall. Enterasys has whitepapers out on doing this with Palo Alto currently, but should work for most any standard system.
... View more