: Configure an IP Tag Cloud Connection
Focus
Focus

Configure an IP Tag Cloud Connection

Table of Contents

Configure an IP Tag Cloud Connection

Learn how to configure the Cloud Identity Engine to collect IP-Tags for policy enforcement.
IP tag cloud connection supports regions based in the United States.
To configure the Cloud Identity Engine to collect IP address-to-tag (also known as IP-tag) information for policy enforcement, configure a connection to your cloud-based identity management system to synchronize the mappings. The identity management system provides the IP-tag information to the edge service for processing, which then provides the information to the firewalls for policy enforcement.
If you want to collect IP address-to-tag (IP-tag) information from VM Series firewalls, you must grant the required permissions for your cloud-based identity management system.
  • For Azure, grant the
    read
    permissions as described in the Azure Monitoring section in the VM Series documentation.
  • For AWS, grant the Amazon Role Name (ARN)
    describe
    roles as described in the IAM Roles and Permissions for Panorama section as shown in the JSON example in the VM Series documentation. For more information on the ARN, refer to the AWS documentation.
If you use Strata Cloud Manager, you can view your IP-tag information using the unified interface and use it to create your tag-based security policy.
For each region, you can synchronize up to 20,000 IP-tag mappings from a cloud service in a monitoring configuration at one time. For instance, if you have 1,000 IP addresses, you will be able to synchronize them all if each IP address has equal to or fewer than 20 tags. After performing the initial synchronization, you can continue to add more IP-tag mappings in subsequent synchronizations, with each synchronization allowing up to an additional 20,000 mappings. Only the new or modified mappings will be synchronized each time.
  1. If you have not already done so, activate User Context and configure a segment to receive the mapping information.
  2. Select
    User Context
    IP-Tag Collection
    .
  3. Select the
    Credential Configuration
    tab if it is not already selected.
  4. To
    Set Up a New Credential Configuration
    , select the type of configuration.
    • AWS—Connect to an Amazon Web Services (AWS) instance.
    • Azure—Connect to a Microsoft Azure Active Directory instance.
  5. Enter a unique and descriptive
    Name
    for the configuration.
  6. (
    AWS only
    ) Configure your AWS connection.
    To open your AWS administrator portal in a new window so you can create or edit any necessary ARNs, click
    Open CFT
    and log in with your AWS credentials.
    1. Enter your
      Access Key ID
      .
      To learn how to obtain your access key ID and secret access key, refer to the AWS documentation.
    2. Enter your
      Secret Access Key
      .
    3. Reenter your secret access key to
      Confirm Secret Access Key
      .
    4. (Optional) Enter a
      Role ARN Name
      and
      Role ARN Value
      .
      To configure additional Role ARNs, click
      Add Role ARN
      for each Role ARN you want to include.
      If you specify an ARN, you cannot also specify a VPC.
  7. (
    Azure only
    ) Configure your Azure connection.
    1. Enter your
      Client ID
      .
      To learn how to obtain the client ID and client secret, refer to the Azure documentation.
    2. Enter your
      Client Secret
      .
    3. Enter your
      Tenant ID
      .
      To learn how to obtain the tenant ID and subscription ID, refer to the Azure documentation.
    4. Enter your
      Subscription ID
      .
  8. Verify the connection by clicking the
    Test Connection
    button.
    For AWS configurations, you can optionally select the
    Region
    before testing the connection. By default, the Cloud Identity Engine selects the
    US West
    region; if this region does not allow API requests, select a region that can allow API requests.
    Even if the connection test is not successful, you can still submit your configuration; until the connectivity issues are resolved, the configuration status is
    Not connected
    . You must resolve the connection issues for the configuration to successfully retrieve the IP-tag mappings.
  9. Submit
    the configuration.
  10. To configure a connection for monitoring purposes (such as audits) or to share the IP-tag mapping information using a segment, select the
    Monitor & Status
    tab.
    There are three states for the connection:
    • Connected
      —The Cloud Identity Engine has successfully established a connection.
    • Partially connected
      —The Cloud Identity Engine could successfully establish a connection to some aspects of the configuration, such as regions or VPCs for AWS, but not all of them.
    • Not connected
      —The Cloud Identity Engine could not successfully establish a connection with the current configuration.
    1. Set Up a New Monitor Configuration
      and select the type of monitor configuration.
    2. Enter a unique and descriptive
      Name
      for the configuration.
    3. Select the
      Credential Configuration
      that you configured.
    4. (
      AWS only
      ) Optionally select the
      Role ARN
      you want to use.
    5. Select if you want to configure the connection for
      All Regions
      ,
      All VPCs
      (AWS only), or both.
      To select a specific region or virtual private cloud (VPC), deselect the
      All Regions
      or
      All VPCs
      checkbox and allow the list of regions or VPCs to populate, then select the region or VPC you want to include. To select a specific VPC, you must select a region first.
    6. Define the
      Polling Interval (in seconds)
      to specify how frequently the Cloud Identity Engine checks for new data.
      The default is 60 seconds and the range is 60–1800 seconds.
    7. Select the segment you configured in Step 1.
      Because you cannot select another segment after you submit the configuration, ensure you select the correct segment before submitting the configuration. If you need to change the segment after you submit the configuration, you must create a new configuration and select the segment you want to use.
    8. Submit
      the configuration.
  11. (
    Strata Cloud Manager only
    ) If you are using Strata Cloud Manager, view the tags that the Cloud Identity Engine shares with Strata Cloud Manager by selecting an address group then select the
    Tags from CIE
    tab when you add match criteria.

Recommended For You