Prisma Access: Components Deep Dive

This document provides an in-depth look at the primary components of Prisma Access: Mobile Users (via GlobalProtect), Remote Networks, and Service Connections. Understanding the configuration, capabilities, and interactions of these components is essential for leveraging the Prisma Access SASE solution effectively.

Part 1: Mobile Users (GlobalProtect)

Prisma Access secures mobile users connecting from anywhere using the Palo Alto Networks GlobalProtect client. This provides secure VPN access combined with Zero Trust principles and the full suite of Prisma Access security services.

Connection Methods: GlobalProtect Client

The GlobalProtect client is the agent software installed on endpoint devices (laptops, mobile phones) that establishes a secure connection to Prisma Access.

Portal Configuration

The GlobalProtect Portal serves as the initial contact point for the GlobalProtect client. It authenticates the user, provides the client configuration (list of gateways, agent settings), and optionally pushes the client software.

High-Level Configuration Steps (Panorama-Managed Example):

  1. Navigate to Panorama > Cloud Services > Configuration > Mobile Users > GlobalProtect Portal .
  2. Define Portal Settings: Name, Interface (usually loopback within Prisma Access template), IP address.
  3. Configure Authentication: Create/select Authentication Profile(s) (e.g., SAML, LDAP) and Authentication Cookies for seamless gateway connection.
  4. Configure Agent Settings: Define client behavior (connect method - Always-On, User-Logon, Pre-Logon, On-Demand), external gateways list (auto-populated by Prisma Access), trusted root CAs, split tunnel settings (if defined here), HIP notification settings.
  5. Client Software Deployment (Optional): Upload and configure GP client versions to be deployed via the portal.
  6. Assign to Template Stack: Ensure the Portal configuration is part of the relevant Template Stack applied to Mobile Users.
  7. Commit and Push: Commit changes to Panorama and push to the Cloud Services plugin.

Cloud-Managed Configuration: Similar concepts apply but are configured within the Prisma SASE UI under Manage > Configuration > Mobile Users > GlobalProtect .

GlobalProtect Portal/Gateway Connection Flow

This diagram shows the typical sequence when a GlobalProtect client connects.

        sequenceDiagram
            participant Client as GP Client
            participant Portal as GP Portal (Prisma Access)
            participant IdP as SAML IdP (Optional)
            participant Gateway as GP Gateway (Prisma Access)

            Client->>Portal: 1. Connect to Portal Address
            activate Portal
            Portal->>Client: 2. Request Authentication
            Client->>IdP: 3. Redirect to IdP for Auth (if SAML)
            activate IdP
            Note over Client, IdP: User Authenticates (SSO/MFA)
            IdP-->>Client: 4. SAML Assertion
            deactivate IdP
            Client->>Portal: 5. Submit Auth Credentials/Assertion
            Portal->>Portal: 6. Validate Credentials / Assertion
            Portal-->>Client: 7. Send Agent Config (Gateway List, HIP settings etc.) & Auth Cookie
            deactivate Portal

            Client->>Client: 8. Select Best Gateway (Latency)
            Client->>Gateway: 9. Connect to Gateway
            activate Gateway
            Gateway->>Client: 10. Request Auth Cookie / Credentials
            Client->>Gateway: 11. Send Auth Cookie / Credentials
            Gateway->>Gateway: 12. Validate Cookie / Auth
            Gateway-->>Client: 13. Authentication Success
            Client->>Gateway: 14. Submit HIP Report (if configured)
            Gateway->>Gateway: 15. Evaluate HIP / Policies
            Gateway-->>Client: 16. Establish Secure Tunnel (SSL/IPSec)
            deactivate Gateway
            Note over Client, Gateway: Secure Connection Established
     

Gateway Configuration

GlobalProtect Gateways are the termination points for the GlobalProtect VPN tunnels. They enforce security policy and provide access to resources.

Split Tunneling

Split tunneling determines which traffic from the endpoint goes through the GlobalProtect tunnel (and thus through Prisma Access for inspection) and which traffic goes directly to the internet via the user's local network interface.

HIP (Host Information Profile)

HIP allows Prisma Access to assess the security posture of the connecting endpoint and enforce policy based on that posture. It's a core component of Zero Trust Network Access (ZTNA).

HIP Check and Enforcement Flow

This diagram illustrates how HIP information is collected and used in policy.









    
    
    Prisma Access: Components Deep Dive
    
    
    



    

Prisma Access: Components Deep Dive

This document provides an in-depth look at the primary components of Prisma Access: Mobile Users (via GlobalProtect), Remote Networks, and Service Connections. Understanding the configuration, capabilities, and interactions of these components is essential for leveraging the Prisma Access SASE solution effectively.

Part 1: Mobile Users (GlobalProtect)

Prisma Access secures mobile users connecting from anywhere using the Palo Alto Networks GlobalProtect client. This provides secure VPN access combined with Zero Trust principles and the full suite of Prisma Access security services.

Connection Methods: GlobalProtect Client

The GlobalProtect client is the agent software installed on endpoint devices (laptops, mobile phones) that establishes a secure connection to Prisma Access.

Portal Configuration

The GlobalProtect Portal serves as the initial contact point for the GlobalProtect client. It authenticates the user, provides the client configuration (list of gateways, agent settings), and optionally pushes the client software.

High-Level Configuration Steps (Panorama-Managed Example):

  1. Navigate to Panorama > Cloud Services > Configuration > Mobile Users > GlobalProtect Portal.
  2. Define Portal Settings: Name, Interface (usually loopback within Prisma Access template), IP address.
  3. Configure Authentication: Create/select Authentication Profile(s) (e.g., SAML, LDAP) and Authentication Cookies for seamless gateway connection.
  4. Configure Agent Settings: Define client behavior (connect method - Always-On, User-Logon, Pre-Logon, On-Demand), external gateways list (auto-populated by Prisma Access), trusted root CAs, split tunnel settings (if defined here), HIP notification settings.
  5. Client Software Deployment (Optional): Upload and configure GP client versions to be deployed via the portal.
  6. Assign to Template Stack: Ensure the Portal configuration is part of the relevant Template Stack applied to Mobile Users.
  7. Commit and Push: Commit changes to Panorama and push to the Cloud Services plugin.

Cloud-Managed Configuration: Similar concepts apply but are configured within the Prisma SASE UI under Manage > Configuration > Mobile Users > GlobalProtect.

GlobalProtect Portal/Gateway Connection Flow

This diagram shows the typical sequence when a GlobalProtect client connects.

        sequenceDiagram
            participant Client as GP Client
            participant Portal as GP Portal (Prisma Access)
            participant IdP as SAML IdP (Optional)
            participant Gateway as GP Gateway (Prisma Access)

            Client->>Portal: 1. Connect to Portal Address
            activate Portal
            Portal->>Client: 2. Request Authentication
            Client->>IdP: 3. Redirect to IdP for Auth (if SAML)
            activate IdP
            Note over Client, IdP: User Authenticates (SSO/MFA)
            IdP-->>Client: 4. SAML Assertion
            deactivate IdP
            Client->>Portal: 5. Submit Auth Credentials/Assertion
            Portal->>Portal: 6. Validate Credentials / Assertion
            Portal-->>Client: 7. Send Agent Config (Gateway List, HIP settings etc.) & Auth Cookie
            deactivate Portal

            Client->>Client: 8. Select Best Gateway (Latency)
            Client->>Gateway: 9. Connect to Gateway
            activate Gateway
            Gateway->>Client: 10. Request Auth Cookie / Credentials
            Client->>Gateway: 11. Send Auth Cookie / Credentials
            Gateway->>Gateway: 12. Validate Cookie / Auth
            Gateway-->>Client: 13. Authentication Success
            Client->>Gateway: 14. Submit HIP Report (if configured)
            Gateway->>Gateway: 15. Evaluate HIP / Policies
            Gateway-->>Client: 16. Establish Secure Tunnel (SSL/IPSec)
            deactivate Gateway
            Note over Client, Gateway: Secure Connection Established
     

Gateway Configuration

GlobalProtect Gateways are the termination points for the GlobalProtect VPN tunnels. They enforce security policy and provide access to resources.

Split Tunneling

Split tunneling determines which traffic from the endpoint goes through the GlobalProtect tunnel (and thus through Prisma Access for inspection) and which traffic goes directly to the internet via the user's local network interface.

HIP (Host Information Profile)

HIP allows Prisma Access to assess the security posture of the connecting endpoint and enforce policy based on that posture. It's a core component of Zero Trust Network Access (ZTNA).

HIP Check and Enforcement Flow

This diagram illustrates how HIP information is collected and used in policy.

flowchart TD
    A[GP Client Connects to Gateway] --> B{HIP Data Collection Enabled?}
    B -- Yes --> C[Client Collects HIP Data]
    B -- No --> G[Proceed without HIP Check]
    C --> D[Client Submits HIP Report to Gateway]
    D --> E{Gateway Evaluates HIP Report against HIP Profiles}
    E -- Match Compliant Profile --> F[Policy Rule Allows Access based on HIP Profile]
    E -- Match Non-Compliant Profile --> H[Policy Rule Blocks/Limits Access based on HIP Profile]
    E -- No Match --> I[Policy Rule Handles No Match - Default Allow/Deny]
    F --> J[User Granted Appropriate Access]
    H --> J
    I --> J
    G --> J
    

User-ID Integration

User-ID allows Prisma Access to enforce policy based on user identity and group membership, not just IP address. This is fundamental for Zero Trust and granular access control.

User-ID Acquisition and Group Mapping (Conceptual)

This shows how User-ID and Group info come together for policy.

        graph TD
            subgraph Authentication & ID Sources
                A[GP Login (SAML/LDAP etc.)] --> C{User Authenticates};
                B[SAML Assertion Attributes] --> C;
            end

            subgraph Group Information Sources
                D[Panorama LDAP Query] --> F{Group Mapping Service};
                E[Cloud Identity Engine (CIE)] --> F;
                G[SAML Group Attributes] --> F;
            end

            subgraph Prisma Access / Policy Engine
                C -- Username --> H(IP-to-User Mapping);
                F -- Groups --> I(User-to-Group Mapping);
                H --> K{Security Policy Engine};
                I --> K;
                J[User Traffic] --> K;
                K -- Matched Rule --> L[Allow/Deny/Apply Profiles];
            end
     

Clientless VPN

Clientless VPN provides access to specific internal web applications through the GlobalProtect Portal web interface without requiring the full GlobalProtect client installation.

Part 2: Remote Networks

Remote Networks connect entire branch offices or sites to Prisma Access using site-to-site VPN tunnels, typically IPSec. This allows all traffic from the branch to be secured by Prisma Access.

Onboarding Process

Adding a remote network involves configuring the connection parameters in Prisma Access and setting up the corresponding VPN tunnel on the branch office firewall or router.

High-Level Onboarding Steps (Panorama-Managed Example):

  1. Gather Site Information: Branch public IP address, internal subnets, BGP ASN (if using BGP), desired bandwidth.
  2. Panorama Configuration:
    • Navigate to Panorama > Cloud Services > Configuration > Remote Networks.
    • Click 'Add' to start the onboarding wizard.
    • Enter Site Name, Location (for latency/PoP selection), Bandwidth Allocation.
    • Configure Tunnel Settings: Select IKE/IPSec profiles (or use defaults), enter Pre-Shared Key (PSK) or configure certificate-based authentication. Define local and peer identification.
    • Configure Routing: Select BGP or Static routing. If BGP, configure BGP peering IPs (Prisma Access side often auto-assigned), Peer ASN, local ASN. If Static, define routes to be advertised from Prisma Access to the site (less common).
    • Define Subnets: Specify the internal subnets behind the branch device that Prisma Access needs to learn routes for (usually advertised via BGP).
    • Assign to appropriate Template Stack and Device Group.
  3. Branch Device Configuration: Configure a matching IPSec VPN tunnel on the branch firewall/router using the same parameters (PSK, crypto profiles, tunnel interface IPs, BGP settings).
  4. Commit and Push (Panorama): Save changes and push to Prisma Access.
  5. Verification: Monitor tunnel status in Prisma Access (Insights/Monitor tab) and on the branch device. Check BGP peering status and route propagation.

Cloud-Managed Configuration: Similar concepts, configured via the Prisma SASE UI under Manage > Configuration > Remote Networks.

Remote Network Onboarding & Connection Flow

flowchart TD
    A[Start: Define RN in Panorama/Cloud] --> B(Specify Location, Bandwidth, Subnets)
    B --> C(Configure IPSec Parameters - PSK/Cert, Crypto)
    C --> D{Configure Routing}
    D -- BGP --> E(Define BGP Peer IP/ASN)
    D -- Static --> F(Define Static Routes - Less Common)
    E --> G[Assign to Template/Device Group]
    F --> G
    G --> H(Commit & Push to Prisma Access)
    H --> I{Prisma Access Provisions Tunnel Endpoint}
    J[Configure Matching IPSec/BGP on Branch Device] --> K{Branch Initiates Tunnel / Prisma Access Initiates}
    I --> K
    K --> L{IPSec Phase 1 IKE SA Negotiation}
    L -- Success --> M{IPSec Phase 2 IPSec SA Negotiation}
    M -- Success --> N{Tunnel Established}
    N -- BGP Configured --> O{BGP Peering Established}
    O -- Routes Exchanged --> P[End: Secure Connectivity Established]
    N -- Static Configured --> P

     

IPSec Tunnel Configuration

Establishing a stable and secure IPSec tunnel is critical for Remote Network connectivity.

Simplified IPSec Tunnel Establishment

        sequenceDiagram
            participant Initiator as Branch Device
            participant Responder as Prisma Access RN Endpoint

            Initiator->>Responder: 1. Initiate IKE Phase 1 (Propose Crypto, DH Key)
            activate Responder
            Responder->>Initiator: 2. Respond (Agree on Crypto, DH Key, Authenticate - PSK/Cert)
            activate Initiator
            Note over Initiator, Responder: IKE SA (Phase 1 Tunnel) Established
            Initiator->>Responder: 3. Initiate IKE Phase 2 (Propose IPSec Params, ProxyIDs/Selectors)
            Responder->>Initiator: 4. Respond (Agree on IPSec Params)
            deactivate Responder
            deactivate Initiator
            Note over Initiator, Responder: IPSec SA (Phase 2 Data Tunnel) Established
     

Routing: BGP vs Static

Routing determines how Prisma Access and the remote network site exchange information about reachable subnets.

Bandwidth Allocation

High Availability (HA)

Ensuring continuous connectivity for Remote Networks is critical.

Integration with SD-WAN

Part 3: Service Connections

Service Connections link your existing datacenters, headquarters, or IaaS environments (like AWS VPCs, Azure VNets) securely to the Prisma Access cloud fabric. They allow users connected to Prisma Access (Mobile Users, Remote Networks) to access internal corporate resources.

Purpose

Configuration

Configuration is very similar to Remote Networks but often involves higher bandwidth and redundancy requirements.

Routing Considerations

Service Connection Traffic Flow & Routing (Conceptual)

        graph LR
            subgraph Prisma Access User/Site
                A[MU/RN User Request for Internal IP]
            end
            subgraph Prisma Access Cloud Fabric
                B(SPN - Security Policy Applied)
                C{Routing Decision};
                D(CAN - Corporate Access Node);
                E[Service Connection IPSec Tunnel];
            end
            subgraph Corporate Datacenter
                F(Datacenter Edge Firewall/Router);
                G{Internal Routing};
                H[Internal Server/Resource];
                I(BGP Peer);
            end

            A --> B;
            B --> C;
            C -- Route Learned via BGP --> D;
            D --> E;
            E --> F;
            F -- Decrypt & Route --> G;
            G --> H;

            %% Link BGP components
            D -. BGP Peering .- I;
            I --> F; %% BGP runs on the FW/Router

            %% Return Path (Simplified)
             H --> G;
             G --> F;
             F --> E;
             E --> D;
             D --> C;
             C --> B;
             B --> A;
     

Use Cases

Important: Proper IP address planning is critical. Ensure Mobile User IP pools do not overlap with internal corporate subnets advertised over Service Connections.

Part 4: Clean Pipe Service (Optional)

The Clean Pipe service is a specific Prisma Access offering targeted primarily at **Service Providers (SPs)**.

User-ID Integration

User-ID allows Prisma Access to enforce policy based on user identity and group membership, not just IP address. This is fundamental for Zero Trust and granular access control.

User-ID Acquisition and Group Mapping (Conceptual)

This shows how User-ID and Group info come together for policy.

graph TD
    subgraph Authentication_ID_Sources
        A[GP Login SAML/LDAP etc.] --> C{User Authenticates};
        B[SAML Assertion Attributes] --> C;
    end

    subgraph Group_Information_Sources
        D[Panorama LDAP Query] --> F{Group Mapping Service};
        E[Cloud Identity Engine CIE] --> F;
        G[SAML Group Attributes] --> F;
    end

    subgraph Prisma_Access_Policy_Engine
        C -- Username --> H(IP-to-User Mapping);
        F -- Groups --> I(User-to-Group Mapping);
        H --> K{Security Policy Engine};
        I --> K;
        J[User Traffic] --> K;
        K -- Matched Rule --> L[Allow/Deny/Apply Profiles];
    end

     

Clientless VPN

Clientless VPN provides access to specific internal web applications through the GlobalProtect Portal web interface without requiring the full GlobalProtect client installation.

Part 2: Remote Networks

Remote Networks connect entire branch offices or sites to Prisma Access using site-to-site VPN tunnels, typically IPSec. This allows all traffic from the branch to be secured by Prisma Access.

Onboarding Process

Adding a remote network involves configuring the connection parameters in Prisma Access and setting up the corresponding VPN tunnel on the branch office firewall or router.

High-Level Onboarding Steps (Panorama-Managed Example):

  1. Gather Site Information: Branch public IP address, internal subnets, BGP ASN (if using BGP), desired bandwidth.
  2. Panorama Configuration:
    • Navigate to Panorama > Cloud Services > Configuration > Remote Networks .
    • Click 'Add' to start the onboarding wizard.
    • Enter Site Name, Location (for latency/PoP selection), Bandwidth Allocation.
    • Configure Tunnel Settings: Select IKE/IPSec profiles (or use defaults), enter Pre-Shared Key (PSK) or configure certificate-based authentication. Define local and peer identification.
    • Configure Routing: Select BGP or Static routing. If BGP, configure BGP peering IPs (Prisma Access side often auto-assigned), Peer ASN, local ASN. If Static, define routes to be advertised from Prisma Access to the site (less common).
    • Define Subnets: Specify the internal subnets behind the branch device that Prisma Access needs to learn routes for (usually advertised via BGP).
    • Assign to appropriate Template Stack and Device Group.
  3. Branch Device Configuration: Configure a matching IPSec VPN tunnel on the branch firewall/router using the same parameters (PSK, crypto profiles, tunnel interface IPs, BGP settings).
  4. Commit and Push (Panorama): Save changes and push to Prisma Access.
  5. Verification: Monitor tunnel status in Prisma Access (Insights/Monitor tab) and on the branch device. Check BGP peering status and route propagation.

Cloud-Managed Configuration: Similar concepts, configured via the Prisma SASE UI under Manage > Configuration > Remote Networks .

Remote Network Onboarding & Connection Flow

        graph TD
            A[Start: Define RN in Panorama/Cloud] --> B(Specify Location, Bandwidth, Subnets);
            B --> C(Configure IPSec Parameters - PSK/Cert, Crypto);
            C --> D{Configure Routing (BGP/Static)};
            D -- BGP --> E(Define BGP Peer IP/ASN);
            D -- Static --> F(Define Static Routes - Less Common);
            E --> G[Assign to Template/Device Group];
            F --> G;
            G --> H(Commit & Push to Prisma Access);
            H --> I{Prisma Access Provisions Tunnel Endpoint};
            J[Configure Matching IPSec/BGP on Branch Device] --> K{Branch Initiates Tunnel / Prisma Access Initiates};
            I --> K;
            K --> L{IPSec Phase 1 (IKE SA) Negotiation};
            L -- Success --> M{IPSec Phase 2 (IPSec SA) Negotiation};
            M -- Success --> N{Tunnel Established};
            N -- BGP Configured --> O{BGP Peering Established};
            O -- Routes Exchanged --> P[End: Secure Connectivity Established];
            N -- Static Configured --> P;
     

IPSec Tunnel Configuration

Establishing a stable and secure IPSec tunnel is critical for Remote Network connectivity.

Simplified IPSec Tunnel Establishment

        sequenceDiagram
            participant Initiator as Branch Device
            participant Responder as Prisma Access RN Endpoint

            Initiator->>Responder: 1. Initiate IKE Phase 1 (Propose Crypto, DH Key)
            activate Responder
            Responder->>Initiator: 2. Respond (Agree on Crypto, DH Key, Authenticate - PSK/Cert)
            activate Initiator
            Note over Initiator, Responder: IKE SA (Phase 1 Tunnel) Established
            Initiator->>Responder: 3. Initiate IKE Phase 2 (Propose IPSec Params, ProxyIDs/Selectors)
            Responder->>Initiator: 4. Respond (Agree on IPSec Params)
            deactivate Responder
            deactivate Initiator
            Note over Initiator, Responder: IPSec SA (Phase 2 Data Tunnel) Established
     

Routing: BGP vs Static

Routing determines how Prisma Access and the remote network site exchange information about reachable subnets.

Bandwidth Allocation

High Availability (HA)

Ensuring continuous connectivity for Remote Networks is critical.

Integration with SD-WAN

Part 3: Service Connections

Service Connections link your existing datacenters, headquarters, or IaaS environments (like AWS VPCs, Azure VNets) securely to the Prisma Access cloud fabric. They allow users connected to Prisma Access (Mobile Users, Remote Networks) to access internal corporate resources.

Purpose

Configuration

Configuration is very similar to Remote Networks but often involves higher bandwidth and redundancy requirements.

Routing Considerations

Service Connection Traffic Flow & Routing (Conceptual)

 graph TD
    subgraph Prisma Access User/Site
        A[MU/RN User Request for Internal IP]
    end
    subgraph Prisma Access Cloud Fabric
        B(SPN - Security Policy Applied)
        C{Routing Decision}
        D(CAN - Corporate Access Node)
        E[Service Connection IPSec Tunnel]
    end
    subgraph Corporate Datacenter
        F(Datacenter Edge Firewall/Router)
        G{Internal Routing}
        H[Internal Server/Resource]
        I(BGP Peer)
    end

    A --> B
    B --> C
    C -- Route Learned via BGP --> D
    D --> E
    E --> F
    F -- Decrypt & Route --> G
    G --> H

    %% Link BGP components
    D -. BGP Peering .- I
    I --> F

    %% BGP runs on the FW/Router
    %% Return Path (Simplified)
    H --> G
    G --> F
    F --> E
    E --> D
    D --> C
    C --> B
    B --> A

     

Use Cases

Important: Proper IP address planning is critical. Ensure Mobile User IP pools do not overlap with internal corporate subnets advertised over Service Connections.

Part 4: Clean Pipe Service (Optional)

The Clean Pipe service is a specific Prisma Access offering targeted primarily at **Service Providers (SPs)**.

Next Page →