Configure Access to Monitored Servers
Table of Contents
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > GTP Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Device Block List
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Configure Access to Monitored Servers
Use the Server Monitoring section to Add server
profiles that specify the servers the firewall will monitor.
Configure at least two User-ID monitored
servers so if a server goes down, the firewall can still learn IP-address-to-username
mappings.
The complete procedure to
configure the PAN-OS integrated User-ID agent to monitor servers
requires additional tasks besides creating server profiles.
Server Monitoring Settings | Description |
---|---|
Name | Enter a name for the server. |
Description | Enter a description of the server. |
Enabled | Select this option to enable log monitoring
for this server. |
Type | Select the server type. Your selection determines
which other fields this dialog displays.
|
Transport Protocol (Microsoft Active Directory and Microsoft Exchange only) | Select the transport protocol:
|
Network Address | Enter the server IP address or FQDN for
the monitored server. If you use Kerberos for server authentication,
you must enter an FQDN. This option is not supported when the Type is Novell eDirectory. |
Server Profile (Novell eDirectory only) | Select an LDAP server profile for connecting
to the Novell eDirectory server (Device
> Server Profiles > LDAP). |
Connection Type (Syslog Sender only) | Select whether the User-ID agent listens
for syslog messages on the UDP port (514)
or the SSL port (6514). If you select SSL,
the Syslog Service Profile you select when
you enable Server
Monitoring determines which SSL/TLS versions are allowed
and the certificate that the firewall uses to secure a connection
to the syslog sender. As a security
best practice, select SSL when using the
PAN-OS integrated User-ID agent to map IP addresses to usernames.
If you select UDP, ensure that the syslog
sender and client are both on a dedicated, secure network to prevent
untrusted hosts from sending UDP traffic to the firewall. |
Filter (Syslog Sender only) | If the server Type is Syslog Sender,
then Add one or more Syslog Parse profiles
to use for extracting usernames and IP addresses from the syslog
messages received from this server. You can add a custom profile
(see Syslog
Filters) or a predefined profile. For each profile, set the Event
Type:
If you add a predefined Syslog Parse profile,
check its name to determine whether it is intended to match login
or logout events. |
Default Domain Name (Syslog Sender only) | (Optional) If the server Type is Syslog
Sender, enter a domain name to override the current
domain name in the username of your syslog message or prepend the domain
to the username if your syslog message doesn’t contain a domain. |