Thursday, December 1, 2016

Palo Alto Networks - Ruckus User-ID Integration

Palo Alto Networks firewalls are built on three core technologies: App-IDUser-ID, and Content-ID. User-ID specifically, accomplishes two objectives:
  1. The mapping of IP addresses to actual user account information. This is imperative for troubleshooting and/or analyzing logged data, as IP address assignments change over time.
  2. The usage of user/group information within a security policy. This allows administrators to get very granular with how they enforce corporate security posture.
In most Palo Alto Networks firewall deployments, I see User-ID configured via an agent that ties into Active Directory. However, this is typically where the integration stops. It is imperative that as much user information as possible is ingested by the firewall so that logs and security policy remain consistent. User-ID provides other mechanisms by which we can tie into user account information (i.e. syslog, API, etc.). After all, active directory is only one of those ways. Specific to Ruckus Wireless, the integration happens via syslog. As users authenticate via 802.1X or captive portal with their credentials, this information is logged in the controller. We just need to share it with the firewall.

On the Ruckus controller(s):
  1. Enable the Client Association option in the Debug Logs. This will allow ZoneDirector to log the client associations containing client login information and IP.
  2. Enable syslog forwarding in ZoneDirector to the firewall's MGT IP or User-ID agent IP. 
On the Palo Alto Networks firewall:
  1. Enable the MGT interface to receive syslog under Device -> Setup -> Management -> Management Interface Settings.
  2. Navigate to Device -> User Identification -> User Mapping -> Palo Alto Networks User ID Agent Setup -> Syslog Filters -> Add.
  3. Create a filter to recognize the syslog messages sent from ZoneDirector. 
    1. Name: Ruckus Wireless
    2. Type: Regex Identifier 
    3. Event Regex: operation=(update|add){1} 
    4. Username Regex: sta_name (?:=.*\\|=)([a-z]+);
    5. Address Regex: sta_ip=(10\.[0-9]+\.[0-9]+\.[0-9]+); ## change this to reflect your IP range
  4. Navigate to Device -> User Identification -> Server Monitoring -> Add
    1. Name: Ruckus Wireless
    2. Type: Syslog Sender
    3. Network Address: (IP of ZoneDirector)
    4. Filter: Ruckus Wireless
  5. Commit

No comments:

Post a Comment