©
Palo
Alto
Networks,
Inc.
Panorama
6.1
Administrator’s
Guide
•
81
Set
Up
Panorama
Set
Up
Administrative
Access
to
Panorama
For
detailed
instructions
on
setting
up
authentication
using
RADIUS
VSAs,
refer
to
the
following
documents:
On
Windows
2003
Server,
Windows
2008
(and
later),
and
Cisco
ACS
4.0:
.
On
Cisco
ACS
5.2:
.
Use
RADIUS
Vendor
‐
Specific
Attributes
for
Account
Authentication
Step
1
Configure
Panorama.
1.
Configure
a
RADIUS
server
profile:
select
Panorama > Server
Profiles > RADIUS
.
2.
Create
an
authentication
profile
that
specifies
RADIUS
as
the
protocol
for
authentication
and
attach
the
RADIUS
server
profile
(
Panorama > Authentication Profiles
).
3.
Create
an
custom
administrative
role
profile
with
a
Device
Group
and
Template
role
(
Panorama > Admin Roles
).
4.
Configure
Panorama
to
use
the
authentication
profile
for
authentication
(
Setup > Management > Authentication
Settings > Authentication Profile
).
5.
(Required
only
if
using
the
vendor
‐
specific
attribute
PaloAlto
‐
Panorama
‐
Admin
‐
Access
‐
Domain)
If
you
want
to
restrict
administrative
access
to
specific
managed
firewalls,
templates,
and/or
device
groups,
define
an
access
domain
(
Panorama > Access Domains
).
Step
2
Configure
the
RADIUS
server.
1.
Add
the
Panorama
IP
address
or
hostname
as
the
RADIUS
client.
2.
Define
the
VSAs
supported
by
Panorama.
To
define
an
attribute,
use
the
vendor
code
(25461),
attribute
name
(ensure
it
matches
the
name
of
the
admin
role
profile/access
domain
defined
on
Panorama;
it
is
case
sensitive),
number,
and
format
(string):
•
PaloAlto
‐
Panorama
‐
Admin
‐
Role,
attribute
#3
•
PaloAlto
‐
Panorama
‐
Admin
‐
Access
‐
Domain,
attribute
#4