Panorama with ISE admin authentication


Scenario:

Panorama (192.168.1.252) manages Chicago-FW (192.168.1.254) and Burlin-FW (192.168.1.253)

Device Group:



Template:



Goal:
AD user chicago-fw-admin (in AD group Chicago-FW-Admins) login Panorama can only configure HQ-DG and US-Stack.
AD user berlin-fw-admin (in AD group Berlin-FW-Admins) login Panorama can only configure Branch-DG and Germany-Stack.


Create Amdin Role
This example created two admin roles, but here they are same.



Create Access Domain


















Create Access Domain











































Create ISE Server Profile



Create Authentication Profile



Apply Authentication Settings
Panorama > Setup >






























ISE settings:

Add PaloAlto dictionary
Policy > Policy Elements >Dictionaries > System > radius > RADIUS Vendors
https://docs.paloaltonetworks.com/resources/radius-dictionary.html


















































Created Network device Profile





























Add Panorama as a network device:











Create two Authorization Profiles:































































Authorization Policies
























===============

Packet capture























Comments

Popular posts from this blog

Firepower FMC and FTD troubleshooting

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.