Vigyata.AI
Is this your channel?

#paloaltofirewalltraining | Day 35 | What is User-ID | Detailed Explanation | Lab

2.7K views· 44 likes· 16:39· Apr 13, 2025

🛍️ Products Mentioned (2)

Join this channel to get access to perks: https://www.youtube.com/channel/UCBujQdd5rBRg7n70vy7YmAQ/join Please checkout my new video on understanding of user-id in palo alto firewall. If you like this video give it a thumps up and subscribe my channel for more video. Have any question put it on comment section Recommend Video https://youtu.be/i_3UCXy_T0g Recommend Link (Playlist for EVE-NG LAB Setup) https://www.youtube.com/playlist?list=PLaUiizP3D7fPMmUQqS5QKX_FVSoMP68Z5 Palo Alto Certification information URL: https://www.paloaltonetworks.com/services/education For Palo Alto Documentation https://docs.paloaltonetworks.com/ Please follow me Instagram : https://www.instagram.com/bikashtech Twitter : https://twitter.com/Bikashshaw82 E-mail ID : bikashshaw261@gmail.com #Paloaltotraining ##bikashtech #paloaltofirewalltraining #paloaltonetworks #url #sslcertificate #user #paloaltotraining #userid

About This Video

Hello friends, welcome back—this is Day 35 of my PCNSA series. In this session I explained User-ID in Palo Alto Firewall: what it is, why we need it, and how it gives you more granular control compared to old-style IP-based policies. I used a simple “building with multiple floors” example to show the real problem: when a user moves around (or works from home), the IP keeps changing, so policies based only on IP don’t really represent the actual user. With User-ID, I can match traffic to the actual username/user group and enforce access consistently. Then I connected User-ID with Windows Server/Active Directory, because to understand User-ID you must understand where the user information comes from. I walked through the traffic flow: when a user logs into a domain PC, the PC sends login details (username + IP) to the Windows server. An agent reads those logs and shares the mapping with the Palo Alto firewall, so the firewall builds a table of IP-to-username (and group). When traffic hits the firewall, it looks up the source IP, finds the username, checks the user/group-based policy, and then allows or blocks. I also clarified why username is not carried in normal OSI layers—sending it in every packet would be risky—so this mapping approach is how it works in real environments.

Frequently Asked Questions

🎬 More from Bikash's Tech