cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2786
Views
0
Helpful
0
Comments
Meddane
VIP
VIP

 

Meddane_0-1727024635108.png

PaloAlto firewall uses the RADIUS Vendor-Specific Attributes (VSA) code 25461 to manage administration authorizations or admin roles with a Radius server such as Cisco ISE.

The attribute PaloAlto-Admin-Role 1 is used to define the administrator role, either the default prebuilt dynamic roles or a custom roles. The Cisco ISE returns the admin role you define in the VSA Code 25461 inside the Attribute Value Pairs of the Radius Access-Accept.

Meddane_1-1727024635111.png

On PaloAlto, create a Radius Server Profile with Cisco ISE as the Radius server.

Meddane_2-1727024635113.png

In the Management section, under the Authentication Settings, select the Radius Server Profile.

Meddane_3-1727024635117.png

Navigate to Cisco ISE, create two user identity group named full-admin and limited-admin.

Meddane_4-1727024635123.png

Create two users named pa-admin and pa-user, associate the user groups full-admin and limited-admin respectively.

Meddane_5-1727024635127.png

Add the PaloAlto firewall in the Network Devices and enable the Radius settings.

Meddane_6-1727024635131.png

Configure a dictionary attribute for paloalto firewall with the Vendor ID 2561 and The attribute PaloAlto-Admin-Role = 1.

Meddane_7-1727024635136.png

Meddane_8-1727024635138.png

Meddane_9-1727024635143.png

Create two Authorization Profiles and associate the PaloAlto Admin-Role attribute to the admin roles defined on paloalto. You can use the default or custom admin roles.

Meddane_10-1727024635147.png

Meddane_11-1727024635150.png

Create a dedicated policy set that handles all Radius requests coming from PaloAlto Firewall, use the Network Access Device IP Address as a condition and set the IP address of the firewall.

Meddane_12-1727024635153.pngFor authentication policy, use the default policy with internal users as the local database to authenticate admin users.

Meddane_13-1727024635157.png

Create two Authorization Policy for full and limited access, use the User Identity Groups as a condition and the appropriate Authorization Profile.

Meddane_14-1727024635163.png

Test for pa-admin with full access.

Meddane_15-1727024635165.png

Test with pa-user with limited access.

Meddane_16-1727024635166.png

Verify on Cisco ISE Radius Live Logs that the correct Authorization Policies are applied.

Meddane_17-1727024635172.png

 

 

 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: