Palo Alto User-ID and Cisco Wireless LAN controller (WLC) configuration (with SNMP traps)

2. Install CentOS 7

First step, you need to download the last CentOS 7 minimal ISO file and create a virtual machine (specs can be tiny, only snmptrapd and rsyslog will run):

I know that a lot of network and security administrators hate system task, so I will be nice and give you a step by step guide to prepare CentOS 7. 🤓

  • On the pre-install screen, choose “Install CentOS 7”, then press Enter


  • On the first Installation screen, choose the appropriate language and press “Continue”


2.1 Configure the keyboard

  • At the top left of the Installation Summary, choose “Keyboard”
  • Click the “+” and search for your keyboard and click “Add”
  • Remove the English keyboard if not needed
  • Click “Done” at the top left when your keyboard is configured and tested


2.2 Configure the network

  • Next, choose “Network & Host Name” at the bottom
  • Click the “Configure” button


  • Choose the “General” tab
    • Select “Automatically connect to this network when it is available”


  • Go to the “IPv4 Settings”
    • Change the method to “Manual” and configure the IP address clicking the “Add” button
    • Enter your DNS servers separated by a comma
    • Enter your search domain
    • Control your settings and click save


  • If your settings are correct, the “Host name” field will be filled by the correct hostname using a reverse lookup
    • If not, control your DNS entry for this virtual machine and your network settings


  • Click “Done” at the top left when your network seems to be operational

2.3 Configure the date and time

  • Next, click on the “Date & Time” menu at the top left
  • Choose the appropriate time zone and edit the settings at the right of the option the enable the Network Time


  • Wait for all servers become with a green status and then click “OK”


  • Now you can set the “Network Time” option “ON”
  • Click “Done” at the top left when your Date & Time seems to be operational

2.4 Configure the storage

  • Select the “Installation destination” option
  • Check the box “I will configure partitioning” and then click the “Done” button at top left
    • A new window appears where you can choose to configure the storage


  • Click on “Click here to create them automatically” to edit the storage settings


  • First, if you choose a drive bigger than 50GB, you can safely remove the “home” partition. Not really relevant in our installation only to pass SNMP traps to Syslog messages. If your drive is smaller the home partition wasn’t created automatically.
  • If you’re not an LVM expert, it’s better to change the minimal settings here. My recommendations are :
    • Change the swap partition to a minimal of 4GB
    • Change the volume group and logical volume names to something more comprehensive :
      • vg_group1
        • lv_swap
        • lv_root


  • When you’ve done these basic LVM configurations, you can click “Done” at the top left
  • Accept the changes to format the drive

2.5 Start the installation

  • Verify that you’ve not missed a step and control your settings
  • Click on the “Begin Installation” to … start the installation
  • During the installation process, you need to set the “root” password.
    • Click on “Root Password”
    • Enter a password, confirm it and then click “Done” at the top left


  • When the installation is finished, you can reboot and access your server through SSH

2.6 Final steps

  • Update your system
yum update
  • Install the VMware Tools (if you’re using VMware)
yum install open-vm-tools
  • Reboot

2 Replies to “Palo Alto User-ID and Cisco Wireless LAN controller (WLC) configuration (with SNMP traps)”

  1. Thanks for this great article. Did you already have time to create your new article avoiding the CentOS server?

    • Didn’t plan a new article ;-). On the WLC you only need to enable the logging syslog facility client associate option, and on the Palo Alto side you need to create a new Syslog receiver for User-ID.

Leave a Reply

Your email address will not be published.