: Enhanced Authentication for Dedicated Log Collectors and WildFire Appliances
Focus
Focus

Enhanced Authentication for Dedicated Log Collectors and WildFire Appliances

Table of Contents
End-of-Life (EoL)

Enhanced Authentication for Dedicated Log Collectors and WildFire Appliances

Create enhanced authentication for Dedicated Log Collectors and WildFire appliances to address authentication security gaps.
Bridge the security gap in your infrastructure for Dedicated Log Collector (PanoramaManaged CollectorsAuthentication) and WildFire (PanoramaManaged WildFire ApplianceAuthentication) deployments by leveraging enhanced authentication for your appliances. PAN-OS® 10.0 introduces the ability to create multiple local administrators with granular authentication parameters, as well as leverage LDAP, RADIUS, or TACACS+ for remote authorization and authentication from the Panorama™ management server. Local administrators are configured directly on the CLI of the Dedicated Log Collector and WildFire appliances. Pushing new configuration changes to a Dedicated Log Collector or WildFire appliance overwrites existing local administrators with the administrators configured for the Dedicated Log Collector.
This example shows how to configure the authentication for a Dedicated Log Collector.
  1. Log in to the Panorama web interface.
  2. Configure a Dedicated Log Collector.
  3. Configure Panorama administrator accounts as needed.
  4. If you are using remote authentication, configure your LDAP, RADIUS, or TACAS+ for Panorama.
  5. Configure an authentication profile to define the authentication service that validates the login credentials of the administrators who access the Dedicated Log Collector CLI.
  6. Configure the authentication for the Dedicated Log Collector.
    1. Select PanoramaManaged Collectors and select a Dedicated Log Collector that you added in Step 2.
    2. Select the Authentication Profile you configured in Step 5.
    3. Configure the authentication Timeout Configuration for the Dedicated Log Collector.
      1. Enter the number of Failed Attempts before a user is locked out of the Dedicated Log Collector CLI.
      2. Enter the Lockout Time, in minutes, for which the Dedicated Log Collector locks out a user account after that user reaches the configured number of Failed Attempts.
      3. Enter the Idle Timeout, in minutes, before the user account is automatically logged out due to inactivity.
      4. Enter the Max Session Count to set how many user accounts can simultaneously access the Dedicated Log Collector.
      5. Enter the Max Session Time the administrator can be logged in before being automatically logged out.
    4. Add the Dedicated Log Collector administrators.
      You must add the administrator (admin) as either a local administrator or as an imported Panorama administrator—but not both. The push to managed firewalls fails if an administrator is not added or if the administrator is added as both a local administrator and as an imported Panorama administrator.
      1. Add and configure new administrators unique to the Dedicated Log Collector. These administrators are specific to the Dedicated Log Collectors for which they are created and you manage these administrators from this table.
      2. Add any administrators configured on Panorama. These administrators are created on Panorama and imported to the Dedicated Log Collector.
    5. Click OK to save the Dedicated Log Collector authentication configuration.
  7. Commit and then Commit and Push your configuration changes.
  8. Log in to the CLI of the Dedicated Log Collector.