The article was written by testing the Terminal Server agent on the older PAN-OS versions (7.1 or below). Although the configuration information remains the same, one can refer to updated documentation at Configuring Terminal Server Agent for User Mapping specifically when using certificates between the TS agent and Firewall.
Before installing the Terminal Server (TS) Agent, make sure that the following requirements are met :
The TS Agent maintains a log file which is very useful for troubleshooting. In case there is an issue with the TS Agent, these logs should be collected and sent to the TAC Support Team. The log file can be viewed on the TS Agent using File > Show Logs.
Useful CLI commands
Configure terminal server agent:
# set ts-agent where include ip-address terminal server agent ip address port terminal server agent listening port ip-list terminal server alternative ip list
Show terminal server agent status:
> show user ts-agent statistics IP Address Port Vsys State Users ---------------------------------------------- 10.1.200.1 5009 vsys1 connected 8 10.16.3.249 5009 vsys1 connected 10 > show user ip-port-user-mapping all User IP-Address Vsys Port-Range ------------------------------------------------ test1 10.1.200.1 vsys1 20000-20500 test2 10.1.200.1 vsys1 20500-21000 21500-22000 test3 10.1.200.1 vsys1 21000-21500
TS Agent may need to lookup a Palo Alto Networks User-ID agent or group mapping data to get the group information for a specific domain user.
Other CLI commands
The User-ID Agent's “enable-user-identification” and “User Identification ACL” configuration command also apply to TS Agent. This means that if the user-identification feature is enabled, both User-ID Agent and TS Agent features will be enabled.