: Enhanced Authentication for Dedicated Log Collectors and WildFire Appliances
Focus
Focus

Enhanced Authentication for Dedicated Log Collectors and WildFire Appliances

Table of Contents
End-of-Life (EoL)

Enhanced Authentication for Dedicated Log Collectors and WildFire Appliances

Create enhanced authentication for Dedicated Log Collectors and WildFire appliances to address authentication security gaps.
Bridge the security gap in your infrastructure for Dedicated Log Collector (
Panorama
Managed Collectors
Authentication
) and WildFire (
Panorama
Managed WildFire Appliance
Authentication
) deployments by leveraging enhanced authentication for your appliances. PAN-OS
®
10.0 introduces the ability to create multiple local administrators with granular authentication parameters, as well as leverage LDAP, RADIUS, or TACACS+ for remote authorization and authentication from the Panorama™ management server. Local administrators are configured directly on the CLI of the Dedicated Log Collector and WildFire appliances. Pushing new configuration changes to a Dedicated Log Collector or WildFire appliance overwrites existing local administrators with the administrators configured for the Dedicated Log Collector.
This example shows how to configure the authentication for a Dedicated Log Collector.
  1. Configure an authentication profile to define the authentication service that validates the login credentials of the administrators who access the Dedicated Log Collector CLI.
  2. Configure the authentication for the Dedicated Log Collector.
    1. Select
      Panorama
      Managed Collectors
      and select a Dedicated Log Collector that you added in Step 2.
    2. Select the
      Authentication Profile
      you configured in Step 5.
    3. Configure the authentication
      Timeout Configuration
      for the Dedicated Log Collector.
      1. Enter the number of
        Failed Attempt
        s before a user is locked out of the Dedicated Log Collector CLI.
      2. Enter the
        Lockout Time
        , in minutes, for which the Dedicated Log Collector locks out a user account after that user reaches the configured number of
        Failed Attempt
        s.
      3. Enter the
        Idle Timeout
        , in minutes, before the user account is automatically logged out due to inactivity.
      4. Enter the
        Max Session Count
        to set how many user accounts can simultaneously access the Dedicated Log Collector.
      5. Enter the
        Max Session Time
        the administrator can be logged in before being automatically logged out.
    4. Add the Dedicated Log Collector administrators.
      You must add the administrator (
      admin
      ) as either a local administrator or as an imported Panorama administrator—but not both. The push to managed firewalls fails if an administrator is not added or if the administrator is added as both a local administrator and as an imported Panorama administrator.
      1. Add
        and configure new administrators unique to the Dedicated Log Collector. These administrators are specific to the Dedicated Log Collectors for which they are created and you manage these administrators from this table.
      2. Add
        any administrators configured on Panorama. These administrators are created on Panorama and imported to the Dedicated Log Collector.
    5. Click
      OK
      to save the Dedicated Log Collector authentication configuration.
  3. Commit
    and then
    Commit and Push
    your configuration changes.
  4. Log in to the CLI of the Dedicated Log Collector.

Recommended For You