<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to integrate between Ruckus and Palo Alto in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8558#M1632</link>
    <description>It is really simple actually. 
&lt;BR /&gt;
After 9.8 you are able to get the user login and IP from the syslog information. So you just need to forward the syslog from ZD to PA management IP (remember enable the Syslog listener on the iface) or to a machine running the Palo Alto User-ID agent. In case of 802.1x.
&lt;BR /&gt;&lt;BR /&gt;
In case you are using AD auth, you can simply install and run the PA User-ID on your AD server.
&lt;BR /&gt;&lt;BR /&gt;
Of course, both cases you need to configure your PA to receive information from the agents or SysLog events filters.
&lt;BR /&gt;&lt;BR /&gt;
It works pretty good!</description>
    <pubDate>Fri, 05 Dec 2014 19:25:57 GMT</pubDate>
    <dc:creator>dilojunior</dc:creator>
    <dc:date>2014-12-05T19:25:57Z</dc:date>
    <item>
      <title>How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8555#M1629</link>
      <description>Hi everyone,
&lt;BR /&gt;&lt;BR /&gt;
I have some problem about how to integrate between Ruckus and Palo Alto.
&lt;BR /&gt;&lt;BR /&gt;
The Palo Alto need the Ruckus syslog message which contain the IP and username for creating the policy but I tried to set Ruckus to send the syslog to Palo Alto but in the syslog messages are contain username and MAC address.
&lt;BR /&gt;&lt;BR /&gt;
Do you have any idea how to set the Ruckus to send IP and username in syslog message of if you have any way for integration, please advice me.</description>
      <pubDate>Sat, 11 Oct 2014 16:23:03 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8555#M1629</guid>
      <dc:creator>teeraphol_sukpr</dc:creator>
      <dc:date>2014-10-11T16:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8556#M1630</link>
      <description>I actually looked into this a while ago and I believe the correct solution would be to have Palo Alto implement Radius accounting SSO.  We have a Sonicwall that does this and several other vendors offer similar capabilities but Palo Alto does not :-(.  When I was in talks with them they said that the only way this would be possible was to have a one of their solutions providers come up with a solution.  I am guessing they would just come up with a Radius accounting to syslog translator which you can most likely do yourself if you want using Freeradius.
&lt;BR /&gt;&lt;BR /&gt;
I would recommend asking Palo Alto to implement Radius accounting SSO.  Hopefully if enough people ask they will add that feature.  If they ask you can tell them that this is one of the reasons why we stopped looking at them.</description>
      <pubDate>Sun, 12 Oct 2014 22:43:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8556#M1630</guid>
      <dc:creator>michael_brown_5</dc:creator>
      <dc:date>2014-10-12T22:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8557#M1631</link>
      <description>Teeraphol:
&lt;BR /&gt;&lt;BR /&gt;
I'm not aware (offhand) of a way for a PaloAlto firewall to consume syslog information.
&lt;BR /&gt;&lt;BR /&gt;
What are you trying to achieve?
&lt;BR /&gt;
PaloAlto has Active Directory (and other?) integration features that help it determine what user is using which computer.
&lt;BR /&gt;
(in case you want to use PaloAlto user-based ACLs?)
&lt;BR /&gt;&lt;BR /&gt;
Are your users not using Active Directory?
&lt;BR /&gt;
If that's the case, you may be able to configure the Ruckus for Radius authentication and use an AD machine as your radius server.
&lt;BR /&gt;&lt;BR /&gt;
If that doesn't solve your problem, please provide more detail re: what your goals are.</description>
      <pubDate>Tue, 14 Oct 2014 16:36:01 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8557#M1631</guid>
      <dc:creator>bill_burns_6069</dc:creator>
      <dc:date>2014-10-14T16:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8558#M1632</link>
      <description>It is really simple actually. 
&lt;BR /&gt;
After 9.8 you are able to get the user login and IP from the syslog information. So you just need to forward the syslog from ZD to PA management IP (remember enable the Syslog listener on the iface) or to a machine running the Palo Alto User-ID agent. In case of 802.1x.
&lt;BR /&gt;&lt;BR /&gt;
In case you are using AD auth, you can simply install and run the PA User-ID on your AD server.
&lt;BR /&gt;&lt;BR /&gt;
Of course, both cases you need to configure your PA to receive information from the agents or SysLog events filters.
&lt;BR /&gt;&lt;BR /&gt;
It works pretty good!</description>
      <pubDate>Fri, 05 Dec 2014 19:25:57 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8558#M1632</guid>
      <dc:creator>dilojunior</dc:creator>
      <dc:date>2014-12-05T19:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8559#M1633</link>
      <description>Helo, I forwarded the syslog from ZD to PA's Management IP (the syslog listener was enabled), but where to configure the syslog event filter?</description>
      <pubDate>Mon, 22 Dec 2014 04:24:24 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8559#M1633</guid>
      <dc:creator>nick_khor</dc:creator>
      <dc:date>2014-12-22T04:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8560#M1634</link>
      <description>I don think the ZD recognize the radius authenticated user's IP.
&lt;BR /&gt;
ZD only recognize the MAC address and Username, the Username is tie to the MAC address even in the event logs, cli command "show current-active-client" doesn't tell you any information about the IP address.
&lt;BR /&gt;&lt;BR /&gt;
While the radius authentication is happening, in that context, there is no IP recognition involve between client, ZD and radius server.
&lt;BR /&gt;&lt;BR /&gt;
So, my point is, if ZD itself can't recognize the authenticated user's IP and provided insufficient information, how can the PanOS recognize it?
&lt;BR /&gt;&lt;BR /&gt;
Please correct/advise me if i'm wrong. Feel free to email me too, &lt;A href="mailto:nick_khor@hotmail.com" rel="nofollow"&gt;nick_khor@hotmail.com&lt;/A&gt;.
&lt;BR /&gt;
Thanks.</description>
      <pubDate>Tue, 23 Dec 2014 01:30:41 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8560#M1634</guid>
      <dc:creator>nick_khor</dc:creator>
      <dc:date>2014-12-23T01:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8561#M1635</link>
      <description>I believed his goal is to find out the Domain User Authenticated device, not the Domain Hardware Authenticated device.
&lt;BR /&gt;&lt;BR /&gt;
For example, a domain user's Android is authenticated, he is in the network and got an IP. But ZD doesn't know the Android's IP and PanOS can't recognize the Android's username.</description>
      <pubDate>Tue, 23 Dec 2014 01:48:54 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8561#M1635</guid>
      <dc:creator>nick_khor</dc:creator>
      <dc:date>2014-12-23T01:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8562#M1636</link>
      <description>Hey Nick,
&lt;BR /&gt;&lt;BR /&gt;
Actually after 9.8 if you enabled on the &lt;B&gt;"Debug Logs"&lt;/B&gt; the &lt;B&gt;Client Association&lt;/B&gt; option, the ZD start to log the client association with some messages with the client login information and IP even if it uses Radius or Captive Portal.
&lt;BR /&gt;
&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_5f91c414135b77e24794fac1_0e4bfcbc8a0c53d14557ce64cc7c4d45_debug_inline-a07f417f-71d9-478a-9c98-1e2d002d4950-887041819.PNG1421165070"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/386i5EB35439056A68AC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_5f91c414135b77e24794fac1_0e4bfcbc8a0c53d14557ce64cc7c4d45_debug_inline-a07f417f-71d9-478a-9c98-1e2d002d4950-887041819.PNG1421165070" alt="Image_ images_messages_5f91c414135b77e24794fac1_0e4bfcbc8a0c53d14557ce64cc7c4d45_debug_inline-a07f417f-71d9-478a-9c98-1e2d002d4950-887041819.PNG1421165070" /&gt;&lt;/span&gt; &lt;BR /&gt;&lt;BR /&gt;
Don't forget to enable syslog forwarding on ZD to the PA's MGMT IP or User-ID agent IP.
&lt;BR /&gt;
&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_5f91c414135b77e24794fac1_18a014e752073d975f816c9291005641_logs_inline-bfc32272-7579-4259-87c5-a817610f5e69-619672653.PNG1421165117"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/387i8E35728E351BB666/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_5f91c414135b77e24794fac1_18a014e752073d975f816c9291005641_logs_inline-bfc32272-7579-4259-87c5-a817610f5e69-619672653.PNG1421165117" alt="Image_ images_messages_5f91c414135b77e24794fac1_18a014e752073d975f816c9291005641_logs_inline-bfc32272-7579-4259-87c5-a817610f5e69-619672653.PNG1421165117" /&gt;&lt;/span&gt; &lt;BR /&gt;&lt;BR /&gt;
I don't recall the exactly message, but I discovered it using an external syslog (on linux) receiving the messages. Do a grep filtering for "sta_name" or "operation=add"
&lt;BR /&gt;&lt;BR /&gt;
At PA you need to enabled the MGMT interface to receive the message and then create a syslog filter on "Device" -&amp;gt; "User Identification" -&amp;gt; tab "User Mapping" click on the little engine on the right corner, and then the tab syslog filters (hidden right?)
&lt;BR /&gt;&lt;BR /&gt;
There you can create a regex filter to recognize those messages. 
&lt;BR /&gt;
Here we created a filter like this:
&lt;BR /&gt;
Type: Regex Identifier
&lt;BR /&gt;
Event Regex: operation=(update|add){1}
&lt;BR /&gt;
Username Regex: sta_name(?:=.*\\|=)([0-9]+); (our users login are just numbers)
&lt;BR /&gt;
Address Regex: sta_ip=(10\.[0-9]+\.[0-9]+\.[0-9]+);
&lt;BR /&gt;&lt;BR /&gt;
And you need to add a Server Monitoring on PA's as well for the ZD, just right bellow on the User Mapping tab.
&lt;BR /&gt;
&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_5f91c414135b77e24794fac1_35665f3d2a183c78885640aea7c8b3d0_PA_inline-5501b9f5-6b04-4e15-8801-59527691d401-726585763.PNG1421165263"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/388i9A282164FECF5E5A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_5f91c414135b77e24794fac1_35665f3d2a183c78885640aea7c8b3d0_PA_inline-5501b9f5-6b04-4e15-8801-59527691d401-726585763.PNG1421165263" alt="Image_ images_messages_5f91c414135b77e24794fac1_35665f3d2a183c78885640aea7c8b3d0_PA_inline-5501b9f5-6b04-4e15-8801-59527691d401-726585763.PNG1421165263" /&gt;&lt;/span&gt; &lt;BR /&gt;&lt;BR /&gt;
It worked for us configuring on PA but we want it better.
&lt;BR /&gt;&lt;BR /&gt;
As I said, after we tested that, we were sure that PA was identifying the user authentication.. we implemented an external PA User-ID agent to receive the message from the Zone Director and configured the same filter on it, with that our PA's mgmt interface don't need to be listen to all those syslog message and just get the information the PA need already filtered by the agent. 
&lt;BR /&gt;&lt;BR /&gt;
Cheers.
&lt;BR /&gt;
ps: Sorry for the delay, I was on vacation!</description>
      <pubDate>Tue, 13 Jan 2015 16:11:22 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8562#M1636</guid>
      <dc:creator>dilojunior</dc:creator>
      <dc:date>2015-01-13T16:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8563#M1637</link>
      <description>Helo Odilo,
&lt;BR /&gt;&lt;BR /&gt;
Thanks for that tips. Late is better than never ;)
&lt;BR /&gt;&lt;BR /&gt;
I found this out from the syslog
&lt;BR /&gt;
"Jan 14 08:43:47 stamgr: stamgr_send_log_v4():operation=add;seq=3;sta_ip=192.168.XX.XX;sta_mac=a0:88:69:XX:XX:XX;zd/ap=6c:aa:b3:XX:XX:XX/84:18:3a:XX:XX:XX;sta_ostype=Windows 7/Vista;sta_name=host/LP-XXX.Domain.local;stamgr_handle_remote_ipc "
&lt;BR /&gt;&lt;BR /&gt;
operation=add;
&lt;BR /&gt;
sta_ip=192.168.XX.XXX;
&lt;BR /&gt;
sta_name=host/LP-XXX.Domain.local;
&lt;BR /&gt;
---
&lt;BR /&gt;&lt;BR /&gt;
That was a Computer Authentication log, the user authentication log was not appear in the syslog, i will need some times to check it out.
&lt;BR /&gt;
Btw, thanks for your guide!</description>
      <pubDate>Wed, 14 Jan 2015 01:31:10 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8563#M1637</guid>
      <dc:creator>nick_khor</dc:creator>
      <dc:date>2015-01-14T01:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to integrate between Ruckus and Palo Alto</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8564#M1638</link>
      <description>Good!
&lt;BR /&gt;&lt;BR /&gt;
We did some filter on radius as well, to permit only user + pass authentication, so we don't have our domain machines authenticating there. That way we can "assure" (ok maybe 99.99% of the time) that the user authenticating is the real user not just a machine that could be used by other one.
&lt;BR /&gt;&lt;BR /&gt;
No problem, glad I can help :)
&lt;BR /&gt;
Good luck!
&lt;BR /&gt;&lt;BR /&gt;
Cheers.</description>
      <pubDate>Wed, 14 Jan 2015 15:20:06 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-to-integrate-between-Ruckus-and-Palo-Alto/m-p/8564#M1638</guid>
      <dc:creator>dilojunior</dc:creator>
      <dc:date>2015-01-14T15:20:06Z</dc:date>
    </item>
  </channel>
</rss>

