This site requires JavaScript to be enabled
An updated version of this article is available

bSecure User Specific Firewall Security Policy With User-ID

1532 views

6.0 - Last modified on 2026-02-27 Revised by Sean Schluntz

5.0 - Last modified on 2022-11-01 Revised by Sean Schluntz

4.0 - Last modified on 2021-08-09 Revised by Sean Schluntz

3.0 - Last modified on 2021-05-05 Revised by Sean Schluntz

2.0 - Last modified on 2020-07-27 Revised by Sean Schluntz

1.0 - Created on 2020-07-27 Authored by Sean Schluntz

By default security policy in the Palo Alto Firewalls supports configuration based on source and destination address, type of application or port used as part of the default service. This can be extended to support rules based on a users CalNet ID in some situations.

User-ID is enabled on all bSecure VSYS and can be used at any time.

User-ID

The system used by the Palo Alto Networks equipment to connects source IP addresses to user names. This allows firewall policy to be written allowing only known users access.

How it Works

  1. Security policy including a list of users matches other requirements (such as source/destination address and service)
  2. The VSYS queries the User-ID database with the source network address of the connection
  3. If there is a username matching the source address in the database the name is returned to the VSYS
  4. The username returned is compared to the allowed list specified in the policy and the VSYS takes the appropriate action

Limitations

Using User-ID

An administrator starts by configuring security policy that will be used specifically for User-ID. After configuring the other required fields (source and destination, application, etc.) you then manually enter a list of CalNet ID's twice in the Users tab. Commit the policy to Panorama and then push to the firewall.

Please note that this example image only contains a single entry for each name. You are now required to enter users in two different formats as described above.

Security Policy User Tab

Logging must be enabled on the policy entry for you to verify results in the log. Commit your policy and then push it to your VSYS.

Once it is in place you can see the matched usernames in the Monitor tab for your log entries.

Monitor Tab Log Entries

If you do not see the Source User column you need to configure the system to display it by clicking on the pull-down next to any existing column, select columns, and then selecting Source User.

Modifying Display Columns