[隨筆] Aruba Controller & Palo Alto User-ID 整合筆記
Pre-configurations on the Palo Alto Networks Firewall
1. Create New Device Admin Account (For Aruba)
An Device Admin account must be created on the Palo Alto Networks firewall to allow the controller to send data to it.
The built-in Admin account can be used for this purpose but that is not recommended.
It is better to create a new Admin account used solely for the purpose of communications between the controller and Palo Alto
Aruba Controller Configuration on AOS 6.4
1. Creating the Server Profile for Palo Alto Network on the Controller
To configure a new Palo Alto Networks profile
- Navigate to Configuration > Advanced Services > All Profiles > Other Profiles > Palo Alto Networks Servers
- Type the name of the profile and click Add
- Click on the name of the profile created to open the Profile Details window
- Enter the Host (IP address or hostname) of the Palo Alto Networks firewall
- Enter the Port (1 – 65535) of the Palo Alto Networks Firewall
Note: The port used by default is 443- Enter the Username of the Palo Alto Networks firewall.
The user name is between 1 and 255 bytes in length and must match the Admin Account previously created on the Palo Alto Networks firewall.
Note: Refer to section 3.3- Enter the Password of the username in Palo Alto Networks Firewall. The password is between 6 and 100 bytes in length and must match the password of the Admin account previously created on the Palo Alto Networks firewall.
- Re-enter the Password entered in the previous step
- Click Add
- Click Apply
2. Activating the Palo Alto Networks profile
To apply a Palo Alto Networks Server profile on the local controller, complete the following steps:
- Navigate to Configuration > Advanced Services > All Profiles > Other Profiles > Palo Alto Networks Active.
- Select Active Palo Alto Networks. To the right of this link, the name of the active profile is displayed.
- Other configured profile can be selected from the Active Palo Alto Networks Profile > drop-down menu.
To configure a new profile, select NEW from the drop down menu and complete the configuration details.- Once a profile is selected from the drop-down menu or a new profile is created, click Apply.
3. Enabling the Palo Alto Networks Firewall Integration
To enable a Palo Alto Netwokrs firewall integration in the AAA profile:
- Navigate to Configuration > Security > Authentication > AAA Profiles page
- In the AAA Profiles Summary, select the desired profile
- Check the PAN firewalls Integration check box
- Click Apply
Troubleshooting
Q1. Timeout / Ping 不通
1 | (Aruba7210) #ping <pa_ip_addr> |
1 | (Aruba7210) #show pan state |
1 | (Aruba7210) # show log system all | include |pan| |
檢查 PA 是否放行 Controller IP 訪問管理介面
Device > Setup > Interfaces > Management > Add Permitted IP Addresses
Q2. 憑證問題
1 | (Aruba7210) # show log system all | include |pan| |
從 PA 上匯出憑證至 Aruba Controller
Palo Alto:
Device > Certificate Management > Certificate > Export Certificate
1 | Export Certificate |
Aruba Controller:
Configuration > Management > Certificates > Upload
1 | Upload a Certificate |
信任 CA 後依然顯示憑證有問題,嘗試以下做法
Palo Alto 重新產生自簽證書
Generate a Self-signed Root CA Certificate
- Select Device > Certificate Management > Certificates > Device Certificates.
- If the firewall has more than one virtual system (vsys), select a Location (vsys or Shared) for the certificate.
- Click Generate.
- Enter a Certificate Name, such as GlobalProtect_CA. The name is case-sensitive and can have up to 31 characters. It must be unique and use only letters, numbers, hyphens, and underscores.
- In the Common Name field, enter the FQDN (recommended) or IP address of the interface where you will configure the service that will use this certificate.
- If the firewall has more than one vsys and you want the certificate to be available to every vsys, select the Shared check box.
- Leave the Signed By field blank to designate the certificate as self-signed.
- (Required) Select the Certificate Authority check box.
- Leave the OCSP Responder field blank; revocation status verification doesn’t apply to root CA certificates.
- Click Generate and Commit.
Palo Alto 證書替換管理流量證書(HTTPS)
Replace the Certificate for Inbound Management Traffic
- Configure an SSL/TLS Service Profile.
1 | Select Device > Certificate Management > SSL/TLS Service Profile > |
- Apply the SSL/TLS Service Profile to inbound management traffic.
1 | Select Device > Setup > Management and edit the General Settings. |
重新匯出剛剛新產生的憑證至 Aruba Controller 並測試
1 | (Aruba7210) #show pan state |