Submit Search
Upload
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
•
10 likes
•
4,395 views
Alberto Rivai
Follow
Cisco Wireless LAN Controller Palo Alto Networks Configuration Guide
Read less
Read more
Technology
Report
Share
Report
Share
1 of 13
Recommended
Access Network Evolution
Access Network Evolution
Cisco Canada
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdf
ControlCase
Enterprise architecture artefacts
Enterprise architecture artefacts
Brian Loomis
Low level design template (1)
Low level design template (1)
anosha jamshed
Introduction to PCI DSS
Introduction to PCI DSS
Saumya Vishnoi
FIWARE Training: FIWARE Training: i4Trust Marketplace
FIWARE Training: FIWARE Training: i4Trust Marketplace
FIWARE
Role-Based Access Control
Role-Based Access Control
EmpowerID
uCPE and VNFs Explained
uCPE and VNFs Explained
Alan Percy
Recommended
Access Network Evolution
Access Network Evolution
Cisco Canada
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdf
ControlCase
Enterprise architecture artefacts
Enterprise architecture artefacts
Brian Loomis
Low level design template (1)
Low level design template (1)
anosha jamshed
Introduction to PCI DSS
Introduction to PCI DSS
Saumya Vishnoi
FIWARE Training: FIWARE Training: i4Trust Marketplace
FIWARE Training: FIWARE Training: i4Trust Marketplace
FIWARE
Role-Based Access Control
Role-Based Access Control
EmpowerID
uCPE and VNFs Explained
uCPE and VNFs Explained
Alan Percy
Digital Attribution Modeling Using Apache Spark-(Anny Chen and William Yan, A...
Digital Attribution Modeling Using Apache Spark-(Anny Chen and William Yan, A...
Spark Summit
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
Cisco Product & Solutions Overview
Cisco Product & Solutions Overview
Emirates Computers
63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
OAuth 2.0 with IBM WebSphere DataPower
OAuth 2.0 with IBM WebSphere DataPower
Shiu-Fun Poon
Supplier And Service Provider Governance
Supplier And Service Provider Governance
Alan McSweeney
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
Shah Sheikh
Packet icons 2 2-06
Packet icons 2 2-06
Angel Ramiro Hurtado Hurtado
Fortinet sandboxing
Fortinet sandboxing
Nick Straughan
Doing Enterprise Architecture
Doing Enterprise Architecture
John Macasio
Threat Hunting with Splunk
Threat Hunting with Splunk
Splunk
Juniper for Enterprise
Juniper for Enterprise
MarketingArrowECS_CZ
Api Gateway
Api Gateway
KhaqanAshraf
Cloud Decision Framework
Cloud Decision Framework
NetApp
Comcast SIP Technical Description
Comcast SIP Technical Description
MichaelBencic2
Event-driven Architecture
Event-driven Architecture
Centric Consulting
Data Onboarding Breakout Session
Data Onboarding Breakout Session
Splunk
Technical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series Switches
Robb Boyd
Building Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache Kafka
Guido Schmutz
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
Devam Shah
Palo alto networks NAT flow logic
Palo alto networks NAT flow logic
Alberto Rivai
User expert forum user-id
User expert forum user-id
Alberto Rivai
More Related Content
What's hot
Digital Attribution Modeling Using Apache Spark-(Anny Chen and William Yan, A...
Digital Attribution Modeling Using Apache Spark-(Anny Chen and William Yan, A...
Spark Summit
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
Cisco Product & Solutions Overview
Cisco Product & Solutions Overview
Emirates Computers
63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
OAuth 2.0 with IBM WebSphere DataPower
OAuth 2.0 with IBM WebSphere DataPower
Shiu-Fun Poon
Supplier And Service Provider Governance
Supplier And Service Provider Governance
Alan McSweeney
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
Shah Sheikh
Packet icons 2 2-06
Packet icons 2 2-06
Angel Ramiro Hurtado Hurtado
Fortinet sandboxing
Fortinet sandboxing
Nick Straughan
Doing Enterprise Architecture
Doing Enterprise Architecture
John Macasio
Threat Hunting with Splunk
Threat Hunting with Splunk
Splunk
Juniper for Enterprise
Juniper for Enterprise
MarketingArrowECS_CZ
Api Gateway
Api Gateway
KhaqanAshraf
Cloud Decision Framework
Cloud Decision Framework
NetApp
Comcast SIP Technical Description
Comcast SIP Technical Description
MichaelBencic2
Event-driven Architecture
Event-driven Architecture
Centric Consulting
Data Onboarding Breakout Session
Data Onboarding Breakout Session
Splunk
Technical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series Switches
Robb Boyd
Building Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache Kafka
Guido Schmutz
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
Devam Shah
What's hot
(20)
Digital Attribution Modeling Using Apache Spark-(Anny Chen and William Yan, A...
Digital Attribution Modeling Using Apache Spark-(Anny Chen and William Yan, A...
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Cisco Product & Solutions Overview
Cisco Product & Solutions Overview
63 Requirements for CASB
63 Requirements for CASB
OAuth 2.0 with IBM WebSphere DataPower
OAuth 2.0 with IBM WebSphere DataPower
Supplier And Service Provider Governance
Supplier And Service Provider Governance
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
Packet icons 2 2-06
Packet icons 2 2-06
Fortinet sandboxing
Fortinet sandboxing
Doing Enterprise Architecture
Doing Enterprise Architecture
Threat Hunting with Splunk
Threat Hunting with Splunk
Juniper for Enterprise
Juniper for Enterprise
Api Gateway
Api Gateway
Cloud Decision Framework
Cloud Decision Framework
Comcast SIP Technical Description
Comcast SIP Technical Description
Event-driven Architecture
Event-driven Architecture
Data Onboarding Breakout Session
Data Onboarding Breakout Session
Technical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series Switches
Building Event Driven (Micro)services with Apache Kafka
Building Event Driven (Micro)services with Apache Kafka
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
Viewers also liked
Palo alto networks NAT flow logic
Palo alto networks NAT flow logic
Alberto Rivai
User expert forum user-id
User expert forum user-id
Alberto Rivai
Palo Alto Networks authentication
Palo Alto Networks authentication
Alberto Rivai
User id installation and configuration
User id installation and configuration
Alberto Rivai
User Expert forum Wildfire configuration
User Expert forum Wildfire configuration
Alberto Rivai
Unified Access Update - 11AC and Switching Platform
Unified Access Update - 11AC and Switching Platform
Cisco Canada
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design session
Cisco Russia
Introduction to cisco wireless
Introduction to cisco wireless
Able George
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Alberto Rivai
Datasheet Cisco AP1600series, AP2600series, AP Controller 2500 series
Datasheet Cisco AP1600series, AP2600series, AP Controller 2500 series
Dani Royman Simanjuntak
BACIK CISCO SKILLS
BACIK CISCO SKILLS
Peťko Z Chochoľova
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager Ds
Steven_Jackson
Nat
Nat
Elshan86
Firewall basics
Firewall basics
Sandeep Yadav
NAT Traversal
NAT Traversal
Davide Carboni
Network Security - Layer 2
Network Security - Layer 2
samis
F5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer Training
F5 Networks
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12
Sassan Saharkhiz_ CRISC
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Cisco Mobility
Viewers also liked
(20)
Palo alto networks NAT flow logic
Palo alto networks NAT flow logic
User expert forum user-id
User expert forum user-id
Palo Alto Networks authentication
Palo Alto Networks authentication
User id installation and configuration
User id installation and configuration
User Expert forum Wildfire configuration
User Expert forum Wildfire configuration
Unified Access Update - 11AC and Switching Platform
Unified Access Update - 11AC and Switching Platform
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design session
Introduction to cisco wireless
Introduction to cisco wireless
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Datasheet Cisco AP1600series, AP2600series, AP Controller 2500 series
Datasheet Cisco AP1600series, AP2600series, AP Controller 2500 series
BACIK CISCO SKILLS
BACIK CISCO SKILLS
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager Ds
Nat
Nat
Firewall basics
Firewall basics
NAT Traversal
NAT Traversal
Network Security - Layer 2
Network Security - Layer 2
F5 BIG-IP Web-based Customer Training
F5 BIG-IP Web-based Customer Training
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
Configuration F5 BIG IP ASM v12
Configuration F5 BIG IP ASM v12
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Similar to Cisco Wireless LAN Controller Palo Alto Networks Config Guide
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
Vuz Dở Hơi
CCNA_RSE_Chp10.pptx
CCNA_RSE_Chp10.pptx
HugoGamez7
25.3.11 packet tracer logging from multiple sources
25.3.11 packet tracer logging from multiple sources
Freddy Buenaño
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
bobbywlane695641
Cisco acs configuration guide
Cisco acs configuration guide
RichardsCCNA
Clearswift f5 implementation_technical guide
Clearswift f5 implementation_technical guide
Marco Essomba
Ap config
Ap config
Trong Oganort Gampoula
IoT Meets Security
IoT Meets Security
Samsung Open Source Group
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
Luca Bongiorni
Student packet tracer manual v1.1
Student packet tracer manual v1.1
milkux
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Canada
LTRSEC-2017-LG
LTRSEC-2017-LG
Gurudatt pai
Palo alto networks product overview
Palo alto networks product overview
Belsoft
CaseStudy_4_Master
CaseStudy_4_Master
Brian Lawson
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
Inductive Automation
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
Mostafa El Lathy
Network topology by essay corp uk
Network topology by essay corp uk
Johnsmith5188
Prévention et détection des mouvements latéraux
Prévention et détection des mouvements latéraux
ColloqueRISQ
Ccnp iscw lab guide
Ccnp iscw lab guide
VNG
11 palo alto user-id concepts
11 palo alto user-id concepts
Mostafa El Lathy
Similar to Cisco Wireless LAN Controller Palo Alto Networks Config Guide
(20)
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
CCNA_RSE_Chp10.pptx
CCNA_RSE_Chp10.pptx
25.3.11 packet tracer logging from multiple sources
25.3.11 packet tracer logging from multiple sources
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
Copyright © 2016 VIT, All Rights Reserved. VIT and its log.docx
Cisco acs configuration guide
Cisco acs configuration guide
Clearswift f5 implementation_technical guide
Clearswift f5 implementation_technical guide
Ap config
Ap config
IoT Meets Security
IoT Meets Security
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
Student packet tracer manual v1.1
Student packet tracer manual v1.1
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
LTRSEC-2017-LG
LTRSEC-2017-LG
Palo alto networks product overview
Palo alto networks product overview
CaseStudy_4_Master
CaseStudy_4_Master
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
Network topology by essay corp uk
Network topology by essay corp uk
Prévention et détection des mouvements latéraux
Prévention et détection des mouvements latéraux
Ccnp iscw lab guide
Ccnp iscw lab guide
11 palo alto user-id concepts
11 palo alto user-id concepts
Recently uploaded
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
Hyundai Motor Group
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
null - The Open Security Community
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Recently uploaded
(20)
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
1.
Palo Alto Networks
PANOS 6.1, Cisco WLC 5500, Kiwi Syslogd integration guide Alberto Rivai Systems Engineer – Major Accounts Palo Alto Networks Melbourne, Australia
2.
Summary PAN-OS 6.0
introduced the ability to use the Palo Alto Networks firewall and the User-ID Agent as a syslog listener for collecting syslogs from different systems in the network, and to map users to IP addresses. The user to IP mappings could be used in security rules and policies. The problem with Cisco Wireless LAN Controller, it does not send successful user authentication message through syslog. Cisco WLC generates SNMP traps which we can utilize to get the user to IP mapping. This document shows a quick configuration guide on how to configure Cisco WLC to send SNMP traps to Kiwi Syslogd, which then converts and forwards the messages through syslog protocol to Palo Alto Networks syslog receiver. 2 | ©2014, Palo Alto Networks. Confidential and Proprietary.
3.
Cisco WLC configuration
Create SNMP receiver by going to Management tab and Trap Receivers 3 | ©2014, Palo Alto Networks. Confidential and Proprietary.
4.
Kiwi Syslogd configuration
- 1 Open Kiwi Syslog server console, go to File -> Setup Right click on Actions and create a new action 4 | ©2014, Palo Alto Networks. Confidential and Proprietary.
5.
Kiwi Syslogd configuration
- 2 Select Forward to another host Enter the IP address of the Palo Alto Networks syslog receiver 5 | ©2014, Palo Alto Networks. Confidential and Proprietary.
6.
Palo Alto Networks
configuration - 1 Login to the WebUI Go to Device -> User Identification Click on the gear icon on the Palo Alto Networks User ID Agent setup window 6 | ©2014, Palo Alto Networks. Confidential and Proprietary.
7.
Palo Alto Networks
configuration - 2 Go to Syslog Filters tab and click Add Select Field Identifier 7 | ©2014, Palo Alto Networks. Confidential and Proprietary.
8.
Palo Alto Networks
configuration - 3 Use the below identifier to identify the syslog message Event String : enterprise=1.3.6.1.4.1.9.9.599.0.4 Username Prefix : 1.3.6.1.4.1.9.9.599.1.3.1.1.27.0= Username Delimiter : , Address Prefix : cldcClientIPAddress.0= Address Delimiter : , 8 | ©2014, Palo Alto Networks. Confidential and Proprietary.
9.
Palo Alto Networks
configuration - 4 Add Server Monitoring, go to Device – User Identification and click Add under Server Monitoring window Select type : Syslog Sender and enter the IP address of Kiwi Syslogd server 9 | ©2014, Palo Alto Networks. Confidential and Proprietary.
10.
Palo Alto Networks
configuration - 5 Verify that the Syslog receiver is enabled Go to Device – Setup – Management – Management Interface Setting 10 | ©2014, Palo Alto Networks. Confidential and Proprietary.
11.
Verify syslog receiver
Execute the below command admin@PA-200-arivai> show user server-monitor <syslog receiver name> You will see the number of log messages increasing 11 | ©2014, Palo Alto Networks. Confidential and Proprietary.
12.
Verify syslog receiver
To identify if the syslog receiver successfully parsed the message and identify users, execute the below command admin@PA-200-arivai> show user ip-user-mapping all type SYSLOG 12 | ©2014, Palo Alto Networks. Confidential and Proprietary.
13.
13 | ©2014,
Palo Alto Networks. Confidential and Proprietary.