Pan-Os New Features Guide
Pan-Os New Features Guide
Version 9.1
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2019-2019 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
December 20, 2019
SD-WAN Features............................................................................................25
Secure SD-WAN........................................................................................................................................27
App-ID Features................................................................................................29
Streamlined Application-Based Policy................................................................................................. 31
Simplified Application Dependency Workflow..................................................................................32
Panorama Features...........................................................................................33
Automatic Panorama Connection Recovery...................................................................................... 35
User-ID Features...............................................................................................37
Include Username in HTTP Header Insertion Entries......................................................................39
Dynamic User Groups..............................................................................................................................41
GlobalProtect Features....................................................................................45
Enhanced Logging for GlobalProtect................................................................................................... 47
GlobalProtect Activity Charts and Graphs on the ACC...................................................... 47
New GlobalProtect Log Category............................................................................................ 48
New GlobalProtect Admin Role............................................................................................... 49
Log Forwarding for GlobalProtect Logs................................................................................. 49
Custom Reports for GlobalProtect.......................................................................................... 50
Virtualization Features.....................................................................................53
VM-Series Firewall on VMware NSX-T (East-West)........................................................................55
5
6 PAN-OS ® NEW FEATURES GUIDE | Upgrade to PAN-OS 9.1
© 2019 Palo Alto Networks, Inc.
Upgrade/Downgrade Considerations
The following table lists the new features that have upgrade or downgrade impact. Make sure you
understand all upgrade/downgrade considerations before you upgrade to or downgrade from a PAN-OS 9.1
release. For additional information about PAN-OS 9.1 releases, refer to the PAN-OS 9.1 Release Notes.
SD-WAN Plugin Enabling your SD-WAN plugin and Downgrading from PAN-OS 9.1 to
starting your device creates SD- an earlier version deletes any SD-
The SD-WAN plugin
WAN databases. WAN databases and removes any
provides intelligent,
SD-WAN specific configurations.
dynamic path selection on
Your subscription remains on the
top of the industry leading
device and is re-enabled if you
security provided by PAN-
upgrade.
OS
Option to Hold Web If you have this feature enabled, If you have this feature enabled,
Requests During URL upgrading to PAN-OS 9.1 from an downgrading from PAN-OS 9.1
Category Lookup earlier version disables this option. to an earlier version disables this
Configure URL Filtering to re- option.
enable this feature.
Enhanced Logging for When upgrading to PAN-OS 9.1, Any GlobalProtect logs collected
GlobalProtect any existing GlobalProtect logs stay after the upgrade will be lost when
When upgrading firewalls that you manage with Panorama or firewalls that are configured
to forward content to a WildFire appliance, you must first upgrade Panorama and its Log
Collectors and then upgrade the WildFire appliance before you upgrade the firewalls.
For manual upgrades, you must install the base image for a feature release before you
upload and install a maintenance release image.
Review the known issues and changes to default behavior in the Release Notes and
upgrade/downgrade considerations in the New Features Guide for each release through
which you pass as part of your upgrade path.
If Panorama is unable to connect directly to the update server, follow the procedure for
deploying updates to firewalls when Panorama is not internet-connected so that you can
manually download images to Panorama and then distribute the images to firewalls.
STEP 2 | Save a backup of the current configuration file on each managed firewall you plan to upgrade.
1. From the Panorama web interface, select Panorama > Setup > Operations and click Export
Panorama and devices config bundle to generate and export the latest configuration backup of
Panorama and of each managed appliance.
2. Save the exported file to a location external to the firewall. You can use this backup to restore the
configuration if you have problems with the upgrade.
STEP 3 | Update the content release version on the firewalls you plan to upgrade.
Refer to the Release Notes for the minimum content release version required for PAN-OS 9.1. Make
sure to follow the Best Practices for Application and Threat Updates when deploying content updates to
Panorama and managed firewalls.
1. Select Panorama > Device Deployment > Dynamic Updates and Check Now for the latest updates. If
an update is available, the Action column displays a Download link.
STEP 4 | (HA firewall upgrades only) If you will be upgrading firewalls that are part of an HA pair, disable
preemption. You need only disable this setting on one firewall in each HA pair.
1. Select Device > High Availability and edit the Election Settings.
2. If enabled, disable (clear) the Preemptive setting and click OK.
3. Commit your change. Make sure the commit is successful before you proceed with the upgrade.
If upgrading more than one firewall, streamline the process by determining upgrade paths
for all firewalls before you start downloading images.
STEP 8 | (HA firewall upgrades only) Upgrade the second HA peer in each HA pair.
1. (Active/passive upgrades only) Suspend the active device in each active/passive pair you are
upgrading.
1. Switch context to the active firewall.
2. In the High Availability widget on the Dashboard, verify that Local firewall state is Active and the
Peer is Passive).
3. Select Device > High Availability > Operational Commands > Suspend local device.
4. Go back to the High Availability widget on the Dashboard and verify that Local changed to
Passive and Peer changed to Active.
2. Go back to the Panorama context and select Panorama > Device Deployment > Software.
3. Click Install in the Action column that corresponds to the firewall models of the HA pairs you are
upgrading.
4. In the Deploy Software file dialog, select all firewalls that you want to upgrade. This time, select only
the peers of the HA firewalls you just upgraded.
5. Make sure Group HA Peers is not selected.
STEP 9 | Verify the software and content release version running on each managed firewall.
1. On Panorama, select Panorama > Managed Devices.
2. Locate the firewalls and review the content and software versions in the table.
For HA firewalls, you can also verify that the HA Status of each peer is as expected.
If your HA firewalls have local policy rules configured, upon upgrade to PAN-OS 9.1,
each peer independently assigns UUIDs for each rule. Because of this, the peers
will show as out of sync until you sync the configuration (Dashboard > Widgets >
System > High Availability > Sync to peer).
STEP 10 | (HA firewall upgrades only) If you disabled preemption on one of your HA firewalls before
you upgraded, then edit the Election Settings (Device > High Availability) and re-enable the
Preemptive setting for that firewall and then Commit the change.
If your firewalls are configured to forward samples to a WildFire appliance for analysis, you
must upgrade the WildFire appliance before upgrading the forwarding firewalls.
To avoid impacting traffic, plan to upgrade within the outage window. Ensure the firewall
is connected to a reliable power source. A loss of power during an upgrade can make the
firewall unusable.
1. Select Device > Setup > Operations and click Export named configuration snapshot.
3. Save the exported file to a location external to the firewall. You can use this backup to restore the
configuration if you have problems with the upgrade.
STEP 2 | If you have enabled User-ID, after you upgrade, the firewall clears the current IP address-
to-username and group mappings so that they can be repopulated with the attributes from
the User-ID sources. To estimate the time required for your environment to repopulate the
mappings, run the following CLI commands on the firewall.
• For IP address-to-username mappings:
• show user user-id-agent state all
• show user server-monitor state all
• For group mappings: show user group-mapping statistics
STEP 3 | Ensure that the firewall is running the latest content release version.
Refer to the Release Notes for the minimum content release version you must install for a PAN-OS 9.1
release. Make sure to follow the Best Practices for Application and Threat Updates.
1. Select Device > Dynamic Updates and see which Applications or Applications and Threats content
release version is Currently Installed.
2. If the firewall is not running the minimum required content release version or a later version required
for PAN-OS 9.1, Check Now to retrieve a list of available updates.
3. Locate and Download the desired content release version.
After you successfully download a content update file, the link in the Action column changes from
Download to Install for that content release version.
4. Install the update.
Review the known issues and changes to default behavior in the Release Notes and
upgrade/downgrade considerations in the New Features Guide for each release through
which you pass as part of your upgrade path.
If your firewall does not have internet access from the management port, you can
download the software image from the Palo Alto Networks Customer Support Portal and
then manually Upload it to your firewall.
1. Select Device > Software and click Check Now to display the latest PAN-OS updates.
2. Locate and Download PAN-OS 9.1.0.
3. After you download the image (or, for a manual upgrade, after you upload the image), Install the
image.
4. After the installation completes successfully, reboot using one of the following methods:
• If you are prompted to reboot, click Yes.
• If you are not prompted to reboot, select Device > Setup > Operations and click Reboot Device.
At this point, the firewall clears the User-ID mappings, then connects to the User-ID
sources to repopulate the mappings.
5. If you have enabled User-ID, use the following CLI commands to verify that the firewall has
repopulated the IP address-to-username and group mappings before allowing traffic.
• show user ip-user-mapping all
• show user group list
To avoid impacting traffic, plan to upgrade within the outage window. Ensure the firewalls are
connected to a reliable power source. A loss of power during an upgrade can make firewalls
unusable.
2. Select the XML file that contains your running configuration (for example, running-config.xml) and
click OK to export the configuration file.
STEP 2 | If you have enabled User-ID, after you upgrade, the firewall clears the current IP address-
to-username and group mappings so that they can be repopulated with the attributes from
the User-ID sources. To estimate the time required for your environment to repopulate the
mappings, run the following CLI commands on the firewall.
• For IP address-to-username mappings:
• show user user-id-agent state all
• show user server-monitor state all
• For group mappings: show user group-mapping statistics
STEP 3 | Ensure that each firewall in the HA pair is running the latest content release version.
Refer to the release notes for the minimum content release version you must install for a PAN-OS 9.1
release. Make sure to follow the Best Practices for Application and Threat Updates.
1. Select Device > Dynamic Updates and check which Applications or Applications and Threats to
determine which update is Currently Installed.
2. If the firewalls are not running the minimum required content release version or a later version
required for PAN-OS 9.1, Check Now to retrieve a list of available updates.
3. Locate and Download the desired content release version.
After you successfully download a content update file, the link in the Action column changes from
Download to Install for that content release version.
4. Install the update. You must install the update on both peers.
STEP 4 | Disable preemption on the first peer in each pair. You only need to disable this setting on one
firewall in the HA pair but ensure that the commit is successful before you proceed with the
upgrade.
1. Select Device > High Availability and edit the Election Settings.
2. If enabled, disable (clear) the Preemptive setting and click OK.
Review the known issues and changes to default behavior in the Release Notes and
upgrade/downgrade considerations in the New Features Guide for each release through
which you pass as part of your upgrade path.
If you want to test that HA is functioning properly before the upgrade, consider upgrading
the active peer in an active/passive configuration first to ensure that failover occurs
without incident.
1. On the first peer, select Device > Software and click Check Now for the latest updates.
2. Locate and Download PAN-OS 9.1.0.
If your firewall does not have internet access from the management port, you can
download the software image from the Palo Alto Networks Support Portal and then
manually Upload it to your firewall.
3. After you download the image (or, for a manual upgrade, after you upload the image), Install the
image.
4. After the installation completes successfully, reboot using one of the following methods:
• If you are prompted to reboot, click Yes.
• If you are not prompted to reboot, select Device > Setup > Operations and Reboot Device.
5. After the device finishes rebooting, view the High Availability widget on the Dashboard and
verify that the device you just upgraded is still the passive or active-secondary peer in the HA
configuration.
If your HA firewalls have local policy rules configured, upon upgrade to PAN-OS 9.1,
each peer independently assigns UUIDs for each rule. Because of this, the peers
will show as out of sync until you sync the configuration (Dashboard > Widgets >
System > High Availability > Sync to peer).
If you enabled HA2 keep-alive, the hardware interface counters on the passive
peer will show both transmit and receive packets. This occurs because HA2
keep-alive is bi-directional, which means that both peers transmit HA2 keep-alive
packets.
• In an active/active configuration, you will see packets received and packets transmitted on both
peers.
Always downgrade into a configuration that matches the software version. Unmatched
software versions and configurations can result in failed downgrades or force the system into
maintenance mode. This only applies to a downgrade from one feature release to another
(for example 9.0.0 to 8.1.3), not to downgrades to maintenance releases within the same
feature release version (for example, 8.1.3 to 8.1.1).
If you have a problem with a downgrade, you may need to enter maintenance mode and
reset the device to factory default and then restore the configuration from the original config
file that was exported prior to the upgrade.
If your firewall does not have internet access from the management port, you can
download the software update from the Palo Alto Networks Support Portal. You can then
manually Upload it to your firewall.
STEP 2 | Select Computer Management > Services and Applications > Services and double-click User-
ID Agent.
STEP 3 | Select Log On, select This account, and specify the username for the User-ID agent account.
25
26 PAN-OS ® NEW FEATURES GUIDE | SD-WAN Features
© 2019 Palo Alto Networks, Inc.
Secure SD-WAN
Software-Defined Wide Area Network (SD-WAN) is a technology that allows you to use multiple internet
and private services to create an intelligent and dynamic WAN, which helps lower costs and maximize
®
application quality and usability. Beginning with PAN-OS 9.1, Palo Alto Networks offers strong security
with an SD-WAN subscription in a single management system. Instead of using costly and time-consuming
MPLS with components such as routers, firewalls, WAN link controllers, and WAN optimizers to connect
®
your WAN to the internet, SD-WAN on a Palo Alto Networks firewall allows you to use less expensive
internet services and fewer pieces of equipment. You don’t need to purchase and maintain other WAN
components.
You install the SD-WAN plugin on the Panorama™ management server, so that you get the security
features of a PAN-OS management and firewall, and SD-WAN functionality from a single vendor. The SD-
WAN subscription supports dynamic, intelligent link selection based on applications and services and the
conditions of links that each application or service is allowed to use. The path health monitoring for each
link includes latency, jitter, and packet loss. Granular application and service controls allow you to prioritize
applications based on whether the application is mission-critical, latency-sensitive, or meets certain health
criteria, for example. Dynamic path selection avoids brownout and node failure problems because sessions
fail over to a better performing path in less than one second.
The SD-WAN subscription works with all PAN-OS security features, such as User-ID™ and App-ID™, to
provide complete security control to branch offices. The App-ID capabilities identify applications (App-ID
decoder, App-ID cache, and source/destination external dynamic list [EDL] IP address lists) for application-
based control. You can deploy the firewall with Zero Trust segmentation of traffic. You can configure and
manage SD-WAN centrally from the Panorama web interface or the Panorama REST API.
You may have cloud-based services and instead of having your internet traffic flow from branches to the
hub to the cloud, you want the internet traffic to flow directly from branches to the cloud using a directly
connected ISP. Such access from a branch to the internet is Direct Internet Access (DIA). You don’t need to
spend your hub bandwidth and money on internet traffic. The branch firewall is already doing security, so
you don’t need the hub firewall to enforce security on internet traffic. Use DIA on branches for SaaS, web
browsing, or heavy-bandwidth applications that shouldn’t be backhauled to a hub.
STEP 1 | Read about SD-WAN to learn more about SD-WAN and the SD-WAN configuration elements.
STEP 2 | Plan your SD-WAN configuration. This includes planning the hub and branch firewall locations,
link requirements, IP addresses and link bundles, as well as determining which applications will
use SD-WAN and QoS optimization, and determining when and how you want links to fail over
in the event the original link degrades or fails.
STEP 4 | Create your link tags to identify one or more physical links that you want applications and
services to use in specific order during SD-WAN traffic distribution and failover protection.
STEP 5 | Configure an SD-WAN interface profile to define the characteristics of ISP connections and to
specify the speed of links and how frequently the firewalls monitor the link.
STEP 7 | Configure a virtual SD-WAN interface to specify one or more physical, SD-WAN-capable
ethernet interfaces that go to the same destination.
STEP 8 | Create a path quality profile for each set of applications, application filters, application groups,
service objects, and service group objects that has unique network health requirements. The
health requriements are based on latency, jitter, and packet loss percentage.
STEP 9 | Create a traffic distribution profile to instruct the firewall how to select a new link in the event
of link degradation to ensure users experience the best performance. The traffic distribution
profile is applied to SD-WAN policy rules.
STEP 10 | Configure an SD-WAN policy rule to specify application(s) or service(s) and a traffic
distribution profile to determine how the firewall selects the preferred path for incoming
traffic.
STEP 11 | Add SD-WAN devices to Panorama. You can add a single managed firewall as an SD-WAN
firewall or bulk import multiple managed firewalls.
STEP 12 | Create a VPN cluster to determine which branch firewalls communicate with which hub
firewalls and create a secure connection between those branch and hub firewalls.
STEP 13 | Monitor your SD-WAN apps and links to troubleshoot and generate reports as needed.
29
30 PAN-OS ® NEW FEATURES GUIDE | App-ID Features
© 2019 Palo Alto Networks, Inc.
Streamlined Application-Based Policy
You can now safely enable a broad set of applications with common attributes using a single policy rule (for
example, you can allow your users broad access to web-based applications or safely enable all enterprise
VoIP applications). Palo Alto Networks takes on the task of researching applications with common
attributes and delivers this through tags in dynamic content updates. This:
• Minimizes errors and saves time.
• Helps you to create policies that automatically update to handle newly released applications.
• Simplifies the transition toward an App-ID based rule set using Policy Optimizer.
Your firewall can then use your tag-based application filter to dynamically enforce new and updated
App-IDs, without requiring you to review or update policy rules whenever new applications are added.
This reduces the chances that new or updated App-IDs will impact application availability or that a risky
application is misclassified. You aren't required to know and assess every single application and can create
policy rules based on the tag. For categories with higher risk, this also makes policy rules more precise as
content updates keep the policy rules current.
If you choose to exclude applications from a specific tag, new content updates honor those exclusions. You
can also use your own tags to define applications types based on your policy requirements.
Apply Tags to an Application Filter and Create Custom Application Tags provide detailed steps for using the
new tags.
STEP 2 | Specify the application that the rule will allow or block.
33
34 PAN-OS ® NEW FEATURES GUIDE | Panorama Features
© 2019 Palo Alto Networks, Inc.
Automatic Panorama Connection Recovery
Recovering isolated firewalls can be painful as it can result in unintended downtime and a loss in
productivity. PAN-OS 9.1.0 introduces the ability for managed firewalls to check for connectivity to the
Panorama™ management server and automatically revert to the last running configuration when the firewall
is unable to communicate with Panorama. This helps you quickly resolve any configuration or connectivity
issues without the need for manual intervention.
Automatic commit recovery allows you to configure the firewall to attempt a specified number of
connectivity tests after you push a configuration from Panorama or commit a configuration change locally
on the firewall. Additionally, the firewall checks connectivity to Panorama every hour to ensure consistent
communication in the event unrelated network configuration changes have disrupted connectivity between
the firewall and Panorama or if implications to a pushed committed configuration may have affected
connectivity. If an hourly connectivity check fails, the firewall generates a system log to alert admins of
potential configuration or network connectivity issues. Additionally, a system log is generated when you
disable the setting, a connectivity test fails, or when a firewall configuration reverts to the last running
configuration.
In high availability (HA) firewall configurations, each HA peer performs connectivity tests independently of
each other, and HA config syncs may only occur after each HA successfully tests connectivity to Panorama
and verifies their connection.
STEP 3 | In the Template context drop-down, select the template or template stack that manages the
devices for which you would like to configure the automated commit recovery parameters.
STEP 6 | Select Commit and Commit and Push your configuration changes.
37
38 PAN-OS ® NEW FEATURES GUIDE | User-ID Features
© 2019 Palo Alto Networks, Inc.
Include Username in HTTP Header Insertion
Entries
You can now dynamically add the user’s domain and username to the HTTP header for the user’s outgoing
traffic to allow any secondary appliances that you use with your Palo Alto Networks firewall to receive the
user’s information and enforce user-based policy.
To include the username and domain in the header, the firewall requires the IP address-to-
username mapping for the user. If the user is not mapped, the firewall inserts unknown for
both the domain and username in Base64 encoding in the header.
When you configure a secondary enforcement appliance with your Palo Alto Networks firewall to enforce
user-based policy, the secondary appliance may not have the IP address-to-username mapping from the
firewall. Transmitting user information to downstream appliances may require deployment of additional
appliances such as proxies or negatively impact the user’s experience (for example, users having to log
in multiple times). By sharing the user's identity in the HTTP headers, you can enforce user-based policy
without negatively impacting the user's experience or deploying additional infrastructure.
When you configure this feature, apply the URL profile to your security policy, and commit your changes,
the firewall:
1. Populates the user and domain values with the format of the primary username in the group mapping for
the source user.
2. Encodes this information using Base64.
3. Adds the Base64-encoded header to the payload.
4. Routes the traffic to the downstream appliance.
If you want to include the username and domain only when the user accesses specific domains, configure
a domain list and the firewall inserts the header only when a domain in the list matches the Host header of
the HTTP request.
The firewall supports header insertion for HTTP/1.x traffic only. HTTP/2 is not supported.
STEP 3 | (Optional) To include the username and domain in headers for HTTPS traffic, create a
decryption profile to decrypt HTTPS traffic.
The firewall does not insert headers if the action for the URL filtering profile is block for
the domain.
Do not use the same dynamic token (either ($user) or ($domain)) more than once
per value.
Each value can be up to 512 characters. The firewall populates the ($user) and ($domain)
dynamic tokens using the primary username in the group mapping profile. For example:
• If the primary username is the sAMAccountName, the value for ($user) is the
sAMAccountName and the value for ($domain) is the NetBios domain name.
• If the primary username is the UserPrincipalName, the ($user) the user account name (prefix)
and the ($domain) is the Domain Name System (DNS) name.
7. (Optional) Select Log to enable logging for the header insertion.
Allowed traffic is not logged, so header insertions are not logged for allowed traffic.
8. Select OK twice to confirm the HTTP header configuration.
STEP 6 | Apply the URL filtering profile to the security policy rule for HTTP or HTTPS traffic.
1. Select Policies > Security and select a rule to which to apply the URL filtering profile that you
justenabled for header insertion.
2. On the Actions tab, select the URL Filtering profile.
3. Click OK to save the security policy rule.
STEP 8 | To verify the firewall includes the username and domain in the HTTP header:
• Use the show user user-ids all command to verify the group mapping is correct.
• Use the show counter global name ctd_header_insert command to view the number of
HTTP headers inserted by the firewall.
• If you configured logging in Step 3.7, check the logs for the inserted Base64 encoded
payload (for example, corpexample\testuser would appear in the logs as
Y29ycGV4YW1wbGVcdGVzdHVzZXI=).
To support redistribution for dynamic user group tags, all firewalls must use PAN-OS 9.1 to
receive the tags from the registration sources.
The firewall redistributes the tags for the dynamic user group to the next hop and you can configure log
forwarding to send the logs to a specific server. Log forwarding also allows you to use auto-tagging to
automatically add or remove members of dynamic user groups based on events in the logs.
Because the dynamic user group itself is static, but the group’s membership is dynamic, this allows flexibility
with policy creation. For example, if you want the members of the group to return to their original groups
after a specific duration of time, configure a timeout for the group. It also allows you to implement
information about user behavior from other applications by tagging information from these sources, which
updates the dynamic user group membership.
The following example demonstrates how to configure a dynamic user group to deny traffic to users when
the firewall detects traffic to questionable sites and use the dynamic user group in a policy to automatically
deny traffic to users accessing these sites. The example workflow shows how to configure a dynamic user
group that includes users based on their questionable activity and enforce a Security policy for those users
that denies access, regardless of the user’s device or location, so that when user behavior matches the tags
you specify, the firewall adds the user to the dynamic user group and applies the associated policy to deny
access.
When you enable this option, Panorama shares the match criteria of the dynamic user
group; Panorama does not share the group members.
4. (Panorama only) To prevent administrators from overriding the settings of this dynamic user group in
device groups that inherit the object, enable the Disable override option.
5. Add Match Criteria using dynamic tags to define the members in the dynamic user group.
For this example, enter questionable-activity.
6. (Optional) Use the And or Or operators with the tags that you want to use to filter for or match
against.
7. Click OK.
8. (Optional) Select the Tags you want to assign to the group itself.
This tag displays in the Tags column in the Dynamic User Group list and defines the
dynamic group object, not the members in the group.
9. Click OK and Commit your changes.
If you update the user group object filter, you must commit the changes to update the
configuration.
STEP 3 | Depending on the log information that you want to use as match criteria, create a log
forwarding profile or configure the log settings.
• For Authentication, Data, Threat, Traffic, Tunnel Inspection, URL, and WildFire logs, create a log
forwarding profile. This performs the user-to-tag mapping at the device level so that the firewall
applies the policy before the firewall detects the traffic.
1. Select Objects > Log Forwarding and Add a log forwarding profile.
2. Enter a Name for the log forwarding profile then Add the Built-in Actions you want the firewall to
take.
3. Select User as the Target.
4. (Optional) To return dynamic user group members to their original groups after a specific duration
of time, enter a Timeout value in minutes (default is 0, range is 0-43200).
5. Specify the Tags that define the criteria for the members of the dynamic user group. For this
example, enter questionable-activity.
• For User-ID, HIP Match, GlobalProtect, and IP-Tag logs, configure the log settings. This performs
the user-to-tag mapping at the traffic level so that the firewall applies the policy when it detects the
user’s traffic.
1. Select Device > Log Settings.
2. Select the type of log that contains the information you want to use for the match criteria and
Add it.
STEP 4 | Use the dynamic user group in a policy to regulate traffic for the members of the group.
You will need to configure at least two rules: one to allow initial traffic to populate the dynamic user
group and one to deny traffic for the activity you want to prevent (in this case, questionable-
activity). To tag users, the rule to allow traffic must have a higher rule number in your rulebase than
the rule that denies traffic.
1. Select Policies > Security.
2. Click Add and enter a Name and optionally add the Tags the policy uses.
3. Add the Source Zone to specify the zone where the traffic originates.
4. For the Source User, select the dynamic user group from Step 1.
5. Add the Destination Zone where the traffic terminates.
6. Select the Service/URL Category for the type of traffic you want to prevent.
For this example, select questionable for the rule that denies the traffic.
7. Specify the Action.
For the rule that denies traffic to the dynamic user group members, select Deny.
8. Clone this rule and Delete the questionable Service/URL Category, then select Allow as the Action
to create the rule that allows the traffic to populate the dynamic user group members.
9. If you configured a Log Forwarding profile in Step 3, select it to add it to the policy.
10.Commit your changes.
STEP 5 | (Optional) Refine the group’s membership and define the registration source for the user-to-tag
mapping updates.
If the initial user-to-tag mapping retrieves users who should not be members or if it does not include
users who should be, modify the members of the group to include the users for whom you want to
enforce the policy and specify the source for the mappings.
1. In the Users column, select more.
2. Register Users to add them to the group and select the Registration Source for the tags and user-to-
tag mappings.
• Local (Default)—Register the tags and mappings for the dynamic user group members locally on
the firewall.
• Panorama User-ID Agent—Register the tags and mappings for the dynamic user group members
on a User-ID agent connected to Panorama. If the dynamic user group originates from Panorama,
the row displays in yellow and the group name, description, match criteria, and tags are read-only.
However, you can still register or unregister users from the group.
• Remote device User-ID Agent—Register the tags and mappings for the dynamic user group
members on a remote User-ID agent. To select this option, you must first configure an HTTP
server profile.
3. Select the Tags you want to register on the source using the tags you used to configure the group.
4. (Optional) To return dynamic user group members to their original groups after a specific duration of
time, enter a Timeout value in minutes (default is 0, range is 0-43200).
5. Add or Delete users as necessary.
6. (Optional) Unregister Users to remove their tags and user-to-tag mappings.
STEP 7 | Monitor the users in your dynamic user groups to track user activity.
1. In the Application Command Center (ACC), create a global or local filter to track the dynamic user
group (Add > User > Dynamic User Group).
2. Generate user activity reports for members of dynamic user groups (Monitor > PDF Reports > User
Activity Report) to determine if more malicious activity occurs.
45
46 PAN-OS ® NEW FEATURES GUIDE | GlobalProtect Features
© 2019 Palo Alto Networks, Inc.
Enhanced Logging for GlobalProtect
To help you monitor and troubleshoot issues with your GlobalProtect deployment, PAN-OS now provides
the following logging enhancements for GlobalProtect:
• GlobalProtect Activity Charts and Graphs on the ACC
• New GlobalProtect Log Category
• New GlobalProtect Admin Role
• Log Forwarding for GlobalProtect Logs
• Custom Reports for GlobalProtect
These features are available for any Palo Alto Networks next-generation firewall deployed as a
GlobalProtect gateway or portal.
The ACC displays a graphical view of user activity in your GlobalProtect deployment on the GlobalProtect
Activity tab. The following charts are available:
• Successful GlobalProtect Connection Activity—Chart view of GlobalProtect connection activity over the
selected time period. Use the toggle at the top of the chart to switch between connection statistics by
users, portals and gateways, and location.
• Unsuccessful GlobalProtect Connection Activity—Chart view of unsuccessful GlobalProtect connection
activity over the selected time period. Use the toggle at the top of the chart to switch between
connection statistics by users, portals and gateways, and location. To help you identify and troubleshoot
connection issues, you can also view the reasons chart or graph. For this chart, the ACC indicates the
error, source user, public IP address and other information to help you identify and resolve the issue
quickly.
Compare these to the authentication-related logs that are in Monitor > Logs > System.
• LSVPN/satellite events.
STEP 1 | Configure a server profile for each external service that will receive log information.
You can also add or remove tags from a source or destination IP address in a log entry.
STEP 2 | Click Add and then enter a Name for the report.
STEP 3 | To base a report on an predefined template, click Load Template and choose the template. You
can then edit the template and save it as a custom report.
STEP 5 | Select the Scheduled check box to run the report each night. The report is then available for
viewing in the Reports column on the side.
STEP 6 | Define the filtering criteria. Select the Time Frame, the Sort By order, Group By preference,
and select the columns that must display in the report.
STEP 7 | (Optional) Select the Query Builder attributes if you want to further refine the selection criteria.
To build a report query, specify the following and click Add. Repeat as needed to construct the
full query.
• Connector—Choose the connector (and/or) to precede the expression you are adding.
• Negate—Select the check box to interpret the query as a negation. If, for example, you choose to
match entries in the last 24 hours and/or are originating from the untrust zone, the negate option
causes a match on entries that are not in the past 24 hours and/or are not from the untrust zone.
• Attribute—Choose a data element. The available options depend on the choice of database.
• Operator—Choose the criterion to determine whether the attribute applies (such as =). The available
options depend on the choice of database.
• Value—Specify the attribute value to match.
For example, to build a report for GlobalProtect portal users with unsuccessful login attempts, use a
query similar to the following:
((eventid eq 'portal-prelogin') or (eventid eq 'portal-auth') or (eventid
eq 'portal-gen-cookie') or (eventid eq 'portal-getconfig')) and (status eq
'failure')
53
54 PAN-OS ® NEW FEATURES GUIDE | Virtualization Features
© 2019 Palo Alto Networks, Inc.
VM-Series Firewall on VMware NSX-T (East-
West)
You can now deploy the VM-Series firewall on VMware NSX-T as a partner service to provide
comprehensive visibility and safe application enablement of all East-West traffic in your NSX-T software-
defined data center. The VM-Series firewall as a partner service enables micro-segmentation that allows
you to protect your data center, enable granular access control inter-tier application traffic.
The VM-Series firewall on VMware NSX-T (East-West) requires the Panorama plugin for VMware NSX
3.1.0 or later.
• Service Cluster—Multiple instances of the VM-Series firewall are deployed on a single ESXi cluster.
NSX-T manager redirects traffic between VMs and security groups to the VM-Series firewall before it
continues to the intended destination.
• Host-Based—The VM-Series firewall is deployed on each ESXi hosts in your software-defined data
center. Traffic between guests on the same host is inspected by the local firewall, so it does not need
to leave the host for inspection. Traffic leaving the host is inspected by the firewall before reaching the
vSwitch.