Prisma Access: Implementation & Configuration
This document details the critical phases of implementing and configuring Prisma Access, covering planning, onboarding using both Panorama and Cloud Management, and the configuration of key security features like policies, NAT, decryption, and more.
Part 1: Planning and Design
Thorough planning and design are paramount for a successful Prisma Access deployment. Rushing this phase often leads to configuration challenges, performance issues, or security gaps later.
Network Assessment Prerequisites
- Current Topology Mapping: Document existing network segments, data centers, branch offices, user locations, and major application flows.
- Internet Egress Points: Identify current internet breakouts and associated security controls.
- Bandwidth Utilization: Analyze current bandwidth usage for internet traffic, VPN users, and site-to-site links. Identify peak usage patterns.
- Application Inventory: List critical internal and SaaS applications, their protocols, ports, and sensitivity.
- Existing Security Policies: Review current firewall rules, URL filtering categories, threat prevention profiles, and VPN configurations.
- Authentication Infrastructure: Document existing identity providers (e.g., Active Directory, Azure AD, Okta), user directories, and MFA solutions.
- Device Inventory: Understand the types and operating systems of devices that will connect (corporate managed vs BYOD).
IP Addressing Strategy
Critical Step: Avoiding IP address overlap is essential.
- Mobile User IP Pools: Allocate dedicated, non-overlapping private IP ranges (RFC1918 preferred) for mobile users connecting via GlobalProtect. Ensure pools are large enough for peak concurrency. Consider segmenting pools per region if needed. These pools MUST NOT overlap with any internal corporate subnets reachable via Service Connections or Remote Networks.
- Service Connection/Remote Network Subnets: Document all internal subnets that need to be reachable from Prisma Access. These will be advertised (typically via BGP) to Prisma Access.
- Prisma Access Infrastructure IPs: Be aware of the public IP ranges Palo Alto Networks uses for Prisma Access infrastructure (published in documentation). Ensure these are permitted through on-premises firewalls for tunnel establishment.
- Summarization Planning: Plan for route summarization where possible (especially for Service Connections) to minimize routing table size.
Authentication Design
- Primary Method Selection:
- SAML 2.0: Strongly recommended for Mobile User authentication. Integrates seamlessly with modern IdPs (Azure AD, Okta, Ping, etc.), supports SSO, and simplifies MFA enforcement via the IdP.
- LDAP/Kerberos: Can be used but often requires direct connectivity from Panorama/Cloud Identity Engine to Domain Controllers, which might need Service Connections established first. Less common for pure MU authentication than SAML.
- RADIUS: Useful for integrating with specific MFA providers or legacy authentication systems.
- Identity Provider (IdP) Integration: Configure trust relationships between Prisma Access (acting as Service Provider - SP) and your chosen IdP. This involves exchanging metadata, configuring assertion attributes (username, groups), and setting up signing certificates.
- Group Mapping Strategy: Plan how group memberships will be obtained for policy enforcement:
- Via SAML assertion attributes (sent by IdP).
- Via Panorama LDAP group mapping (Panorama queries AD/LDAP).
- Via Cloud Identity Engine (CIE) synchronization (Cloud service queries IdP/AD).
- Multi-Factor Authentication (MFA): Enforce MFA through the SAML IdP's conditional access policies or via RADIUS integration.
Example SAML Authentication Flow (Mobile User)
sequenceDiagram
participant User as User (GP Client)
participant Portal as GP Portal (Prisma Access)
participant IdP as Identity Provider (e.g., Azure AD)
participant Gateway as GP Gateway (Prisma Access)
User->>Portal: Initiate Connection
Portal->>User: Redirect to IdP for Authentication
User->>IdP: Request Authentication
activate IdP
Note over User, IdP: User enters credentials, performs MFA
IdP-->>User: SAML Assertion (Signed)
deactivate IdP
User->>Portal: POST SAML Assertion
activate Portal
Portal->>Portal: Validate Assertion Signature & Attributes
Portal-->>User: Authentication OK, Send Agent Config & Cookie
deactivate Portal
User->>Gateway: Connect using Config & Cookie
activate Gateway
Gateway->>Gateway: Validate Cookie/Assertion Info
Gateway-->>User: Tunnel Established
deactivate Gateway
Bandwidth Sizing Considerations
- Mobile Users: Estimate based on the number of concurrent users and average expected throughput per user (consider application mix - browsing, video, file transfers). Add buffer for peak usage.
- Remote Networks: Analyze current site bandwidth usage. Decide between per-site allocation or an aggregate pool. If aggregate, sum the peak requirements of all sites and add a buffer (e.g., 20-30%). Over-subscription within the pool is possible but requires careful monitoring.
- Service Connections: Estimate peak traffic flow between Prisma Access users/sites and internal resources. This often requires significant bandwidth, especially if large file transfers or many users access internal apps simultaneously.
- Add-on Services Impact: Features like SSL decryption can increase processing load, which might indirectly influence perceived performance, though bandwidth itself is the primary licensed metric.
Regional Deployment Strategy
- User/Site Locations: Identify the geographic distribution of your mobile users and remote sites.
- Compute Location Selection: During onboarding, select Prisma Access compute locations (PoPs) that are geographically closest to your users/sites to minimize latency.
- Redundancy: For critical Remote Networks or Service Connections, consider establishing tunnels to multiple Prisma Access compute locations for geographic redundancy.
- Data Residency: Be aware of data residency requirements; choose regions accordingly for CDL storage and processing if applicable.
Policy Migration Planning
- Analyze Existing Policies: Review current firewall rules on edge firewalls, VPN concentrators, and branch firewalls. Identify rules relevant to traffic that will traverse Prisma Access.
- Identify Necessary Policies: Determine which existing rules need to be replicated or adapted for Prisma Access (e.g., internet access rules, VPN user access rules, site-to-site rules).
- Consolidate and Optimize: Use migration as an opportunity to clean up old/unused rules, consolidate rules using App-ID/User-ID, and align with Zero Trust principles (least privilege).
- Leverage Prisma Access Features: Plan to use App-ID, User-ID, Content-ID, URL Filtering categories, and HIP profiles instead of just L3/L4 rules.
- Staged Rollout Plan: Consider migrating users/sites in phases to minimize disruption and allow for testing.
Part 2: Onboarding Prisma Access (Panorama-Managed)
This section details the steps for onboarding and configuring Prisma Access using a customer-managed Panorama instance.
Installing and Configuring the Cloud Services Plugin
- Download Plugin: Obtain the compatible Cloud Services plugin version for your Panorama software version from the Palo Alto Networks Customer Support Portal.
- Install Plugin on Panorama: Navigate to
Panorama > Plugins
, upload the downloaded plugin file, and install it. Panorama will likely restart.
- Verify Installation: After restart, confirm the plugin is listed and running under
Panorama > Plugins
.
- Initial Plugin Configuration (Service Setup): Navigate to
Panorama > Cloud Services > Service Setup
. Click 'Authenticate'. This will redirect you to the Palo Alto Networks Hub portal to log in and authorize Panorama to manage cloud services for your account.
- Associate Prisma Access Instance: Once authenticated, select the Prisma Access tenant/instance you want this Panorama to manage from the dropdown list.
Initial Setup Wizard Walkthrough
The Cloud Services plugin provides a guided workflow for the initial Prisma Access setup.
- Navigate to
Panorama > Cloud Services > Configuration
. The initial view often presents a status dashboard and setup steps.
- Onboarding Workflow: Follow the guided steps which typically include:
- Confirming Cortex Data Lake connection.
- Defining basic infrastructure settings (e.g., Prisma Access infrastructure subnet - usually auto-populated).
- Selecting compute locations (regions) for Mobile Users and Remote Networks.
- Allocating IP address pools for Mobile Users.
- Configuring initial templates/device groups (can be refined later).
- Review and Commit: The wizard helps stage the initial configuration required by Prisma Access.
Configuring Cortex Data Lake Connection
- Automatic Detection: Usually, after authenticating the Cloud Services plugin, Panorama automatically detects the associated Cortex Data Lake instance for your tenant.
- Log Forwarding Configuration:
- Navigate to
Panorama > Managed Devices > Templates
(or a specific Template Stack).
- Select or create a template for Prisma Access logging.
- Go to the
Device > Log Settings
section within the template.
- Configure system, config, user-id, hip-match, and traffic log forwarding settings to use the detected Cortex Data Lake instance. Ensure appropriate log severity levels are captured.
- Assign this template to the relevant Template Stacks used by Prisma Access components (Service Connections, Remote Networks, Mobile Users).
- Verification: After pushing configuration, verify logs appear in CDL via Panorama's Monitor tab or the CDL UI.
Template Stacks and Device Groups (Detailed)
This is the core of Panorama-managed configuration, providing structure and reusability.
Templates and Template Stacks (Network/Device Settings)
- Templates: Contain network settings (interfaces, routing protocols like BGP, zones, virtual routers), device settings (log forwarding, server profiles, SNMP, GlobalProtect Portal/Gateway settings, IPSec crypto profiles, IKE gateways).
- Prisma Access Specific Templates: You will typically create dedicated templates for different Prisma Access components:
- Mobile User Gateway Template: Contains GP Gateway settings, tunnel settings, client IP/DNS settings, assigned IP pools. Often includes a loopback interface for the gateway.
- Mobile User Portal Template: Contains GP Portal settings, authentication profiles, agent configurations, OS support. Often includes a loopback interface for the portal.
- Service Connection Template: Contains tunnel interface definitions, BGP routing configuration, IKE Gateway, IPSec Crypto profiles specific to the SC.
- Remote Network Template: Contains tunnel interface definitions, BGP/Static routing, IKE Gateway, IPSec Crypto profiles specific to RNs.
- Shared Settings Template (Optional): Can hold common settings like Log Forwarding Profiles, Server Profiles (LDAP, RADIUS, SAML), basic zone definitions.
- Template Stacks: Ordered collections of Templates. Settings in higher templates override lower ones. You create stacks and assign them to specific Prisma Access components during onboarding/configuration.
- Stack Example for Mobile Users: Might include [Shared Settings Template] -> [Mobile User Gateway Template] -> [Mobile User Portal Template].
- Stack Example for Service Connection: Might include [Shared Settings Template] -> [Service Connection Template].
- Variables: Use Template Variables (e.g., for IP addresses, PSKs where appropriate but discouraged for keys) to make templates reusable across different sites/connections with unique values.
Device Groups (Policy Settings)
- Device Groups: Contain policy objects: Security Policies, NAT Policies, QoS Policies, Decryption Policies, Application Override Policies, URL Filtering Profiles, Threat Prevention Profiles (AV, AS, VP, File Blocking), HIP Objects/Profiles, etc.
- Hierarchical Structure: Device Groups can be nested. Policies in parent groups (e.g., 'Shared') are inherited by child groups unless overridden.
Shared
(Top Level): Policies applicable to ALL devices/services managed by Panorama.
Prisma Access Parent DG
: Policies common to all Prisma Access components.
Mobile Users DG
: Policies specific to Mobile User traffic.
Remote Networks DG
: Policies specific to Remote Network traffic.
Service Connections DG
: Policies governing traffic over Service Connections.
- Policy Rulebase Strategy:
- Place broad, common rules (e.g., default block, baseline threat prevention) in higher-level DGs.
- Place specific access rules (e.g., MU access to internal app via SC) in lower-level DGs targeting the relevant source/destination zones.
- Use descriptive rule names and tagging.
- Targets: Device Groups target specific Prisma Access components based on the configuration in
Cloud Services > Configuration
.
Panorama Configuration Workflow (Conceptual)
flowchart TD
subgraph Panorama Objects
A[Define Shared Objects - Addresses, Services, Profiles]
B[Define Templates - Network/Device Settings]
C[Define Device Groups - Policies]
end
subgraph Prisma Access Configuration
D{Assign Templates/Stacks to Prisma Access Components}
E{Assign Device Groups to Prisma Access Components}
end
subgraph Commit & Push
F[Commit to Panorama]
G[Push to Cloud Services Plugin]
H[Plugin Deploys Config to Prisma Access Cloud]
end
A --> B
A --> C
B --> D
C --> E
D --> F
E --> F
F --> G
G --> H
%% Feedback Loop
H -- Status/Logs --> G
G -- Status/Logs --> F
Pushing Configuration and Verification
- Commit to Panorama: After making configuration changes in Templates, Device Groups, or Cloud Services setup, perform a 'Commit' operation in Panorama to save the candidate config. Review changes carefully.
- Push to Devices: Navigate to
Panorama > Commit > Push to Devices
.
- Select Cloud Services Plugin: In the Push scope, check the box for 'Cloud Services'. Do NOT select 'Managed Devices' unless pushing to physical/VM firewalls simultaneously.
- Select Configuration: Choose 'Include Device and Network Templates' and 'Include Policies and Objects'.
- Push: Initiate the push operation. Panorama sends the relevant configuration bundles to the Cloud Services plugin.
- Monitor Push Status: Observe the push status in Panorama's Task Manager. The plugin then takes over and applies the configuration to the Prisma Access backend. Monitor status in
Cloud Services > Status
.
- Verification:
- Check status dashboards in
Cloud Services > Status
for Mobile Users, Remote Networks, Service Connections. Look for green status indicators.
- Verify tunnel status (IPSec, BGP peering) for RNs and SCs.
- Test connectivity for mobile users and remote networks.
- Check logs in Panorama's Monitor tab (querying CDL).
Part 3: Onboarding Prisma Access (Cloud-Managed)
This approach uses the dedicated Prisma SASE cloud management UI, often appealing to new customers or those preferring a fully cloud-based experience.
Navigating the Prisma SASE Management UI
- Access: Log in via the Palo Alto Networks Hub portal and launch the Prisma SASE application.
- Dashboard: Provides an overview of connectivity status, security events, bandwidth usage (Prisma Access Insights).
- Main Navigation (Typical Areas):
Manage > Configuration
: Where most setup occurs (Mobile Users, Remote Networks, Service Connections, Policies, Objects).
Manage > Monitor
: Access logs, reports, and detailed status.
Manage > Panorama Insights
: Detailed analytics and troubleshooting dashboards.
Manage > Settings
: Account settings, licensing, Cloud Identity Engine configuration.
- Workflow-Oriented: The UI often uses guided workflows and a more abstract layout compared to Panorama's direct PAN-OS mapping.
Step-by-Step Configuration Workflows
While specific clicks vary, the conceptual workflow mirrors Panorama but within the cloud UI:
- Initial Setup: Activate the service, connect to Cortex Data Lake (often automatic).
- Configure Identity & Authentication: Integrate with Cloud Identity Engine or configure SAML/LDAP/RADIUS profiles directly under Settings or Objects. Define Authentication Policies.
- Configure Mobile Users:
- Define IP Pools.
- Select Regions.
- Configure GlobalProtect settings (Portal/Gateway behaviors, Split Tunneling, HIP).
- Configure Remote Networks:
- Add site, specify location, bandwidth.
- Define IPSec settings (PSK/Cert, Crypto).
- Configure BGP/Static routing.
- Configure Service Connections: Similar to Remote Networks, focusing on datacenter/HQ connectivity.
- Define Objects: Create Address Objects, Service Objects, Custom URL Categories, HIP Objects/Profiles, Security Profiles (AV, URL, etc.).
- Configure Policies: Create Security, NAT, Decryption, QoS rules under the Policies section, leveraging defined objects and User/Group information from CIE/SAML.
- Commit and Deploy: The Cloud UI typically uses a 'Commit' or 'Save & Deploy' mechanism to push changes to the Prisma Access backend. Status monitoring is available within the UI.
Part 4: Security Policy Configuration
Security policies are the core of Prisma Access, defining what traffic is allowed or denied and what security inspections are applied.
Creating Security Policy Rules
- Targeting Traffic: Rules match based on:
- Source/Destination Zones: Predefined zones exist for Prisma Access (e.g.,
trust
for MU/RN LAN-side, untrust
for internet-side, zones related to SCs).
- Source/Destination Addresses: IP addresses, address objects, regions.
- Source User: Usernames or Group names (requires User-ID integration).
- HIP Profiles: Endpoint posture (for GP traffic).
- Application: App-ID (e.g.,
ssl
, web-browsing
, facebook
, ms-office365
).
- Service: L4 Port/Protocol (e.g.,
service-https
, service-http
, or custom).
- URL Category: For web traffic.
- Actions: Allow, Deny, Drop, Reset.
- Security Profiles: Attach profiles to 'Allow' rules for inspection: Antivirus, Anti-Spyware, Vulnerability Protection, URL Filtering, File Blocking, WildFire Analysis, DNS Security, DLP.
- Log Settings: Configure logging at session start/end, log forwarding profiles.
Basic Security Policy Evaluation Flow
flowchart TD
A[Traffic Received by SPN] --> B{Match Security Rule? Top-Down}
B -- Yes --> C{Action = Allow?}
B -- No --> Z[Default Rule: Implicit Deny unless overridden]
C -- Yes --> D{Apply Security Profiles}
C -- No --> E{Action = Deny/Drop/Reset}
D --> F[Forward Allowed Traffic]
E --> G[Block/Reset Traffic]
Z --> G
Leveraging User-ID and HIP Context
Best Practice: Base policies on User/Group and Application (App-ID) rather than just IP addresses and ports whenever possible. Enforce Zero Trust.
- Source User Field: Populate with specific usernames (e.g.,
domain\admin_user
) or group names (e.g., domain\Finance Users
, Okta_Contractors_Group
) obtained via Group Mapping.
- HIP Profiles Field: Select predefined HIP Profiles (e.g., "Compliant Windows Devices", "Non-Compliant BYOD") as match criteria for GlobalProtect traffic.
- Use Cases:
- Allow 'Developers Group' access to specific SaaS tools (App-ID) and internal servers (Destination Address).
- Allow 'Compliant Devices' (HIP Profile) access to sensitive internal resources.
- Block 'Non-Compliant BYOD' (HIP Profile) from accessing anything except remediation portals.
- Apply stricter Threat Prevention profiles to rules matching 'Untrusted User Group'.
Best Practices for Policy Structure
- Top-Down Evaluation: Remember rules are matched from top to bottom; the first match determines the outcome. Place specific rules above general rules.
- Explicit Deny Rules: Include explicit 'Deny' rules for known bad traffic or unwanted applications before broader 'Allow' rules.
- Default Rule: Rely on the implicit deny-all rule at the bottom, or create an explicit deny-any-any rule at the end with logging enabled for visibility into dropped traffic.
- Zone Strategy: Use appropriate source/destination zones (trust, untrust, custom zones for SCs) to segment traffic logically.
- Naming and Tagging: Use clear, descriptive rule names and leverage tags for organization and filtering (e.g., tag rules by site, function, compliance requirement).
- Regular Review: Periodically review and audit the policy rulebase to remove unused rules and ensure continued alignment with security posture.
- Use App-ID, Not Just Service: Define rules based on Layer 7 App-ID instead of just L4 service/port whenever possible for greater accuracy and security.
- Shared vs Specific Rules (Panorama): Place truly global rules in the 'Shared' DG. Place rules common to all Prisma Access components in a parent Prisma Access DG. Place specific MU/RN/SC rules in their respective child DGs.
URL Filtering Policy Configuration
- URL Filtering Profiles: Create profiles defining actions (allow, alert, block, continue, override) for predefined URL categories (e.g., Malware, Phishing, Social Networking, Streaming Media) and custom categories.
- Applying Profiles: Attach URL Filtering profiles to Security Policy rules (typically rules allowing web-browsing, ssl).
- Best Practices:
- Block known malicious categories (Malware, Phishing, Command-and-Control).
- Alert or block high-risk categories (Questionable, Parked Domains).
- Carefully consider blocking/allowing productivity-impacting categories (Social Media, Streaming). Use 'Continue' pages for user awareness if allowing potentially risky categories.
- Implement Credential Phishing Prevention features (blocking corporate credential submission to untrusted sites).
- Leverage Advanced URL Filtering features (real-time detection via ML) if licensed.
- Create custom URL categories for specific internal sites or exceptions.
Threat Prevention Profile Configuration
- Profile Types: Antivirus, Anti-Spyware, Vulnerability Protection, File Blocking.
- Configuration: Define actions (default, alert, block, sinkhole for AS) for various threat signatures/types. Select appropriate decoders and application/file type settings.
- WildFire Analysis: Configure WildFire profiles to send unknown files/email links for cloud-based sandboxing and analysis. Set actions based on WildFire verdicts (malicious, grayware, benign).
- Applying Profiles: Attach profiles to Security Policy rules allowing traffic where threats might exist (e.g., internet access, inter-zone traffic).
- Best Practices:
- Use Palo Alto Networks recommended default actions as a starting point.
- Ensure profiles are attached to relevant 'Allow' rules. A profile does nothing if not applied.
- Keep content packs (signatures) updated regularly (usually automatic).
- Consider stricter profiles for traffic from less trusted sources (e.g., untrust zone, non-compliant devices).
- Enable packet captures for threat logs to aid analysis.
Part 5: NAT Policy Configuration
Network Address Translation (NAT) is used to modify source or destination IP addresses, primarily for enabling outbound internet access from private IP spaces.
Source NAT (SNAT)
- Purpose: Translates private source IP addresses (from Mobile Users, Remote Networks) to a public IP address usable on the internet. Prisma Access handles the allocation of these public IPs.
- Configuration:
- Create NAT Policy rules matching traffic from internal/trust zones destined for the untrust/internet zone.
- Source Address: Specify the internal IP pools/subnets to be translated (e.g., MU IP pools, RN subnets).
- Destination Zone: Typically 'untrust'.
- Translated Packet (Source): Usually set to 'Dynamic IP and Port' (DIPP). Prisma Access manages the pool of available public IPs for translation. Specify the Egress IP address (provided by Prisma Access during setup) or leave as default if applicable.
- Common Use Case: Allow mobile users and remote network sites using private IPs to browse the internet via Prisma Access.
Destination NAT (DNAT)
- Purpose: Translates a public destination IP address (often on the 'untrust' side) to a private internal IP address.
- Use Cases (Less Common in Prisma Access):
- Exposing an internal service *through* Prisma Access to the internet (rare, usually handled by on-prem firewalls or cloud load balancers).
- Specific routing scenarios involving IP overlap resolution (advanced).
- Configuration: Create NAT Policy rules matching traffic destined for the public IP. Set the 'Translated Packet (Destination)' to the internal private IP address. Requires careful planning of routing and security policies.
Part 6: Decryption Policy
Much of today's traffic is encrypted (SSL/TLS). Decryption allows Prisma Access to inspect the content of this traffic for threats, URL categories, sensitive data (DLP), and accurate App-ID identification.
Configuring SSL Forward Proxy Decryption
This is the most common decryption method used for outbound traffic from users/sites to the internet/SaaS.
- Certificate Authority (CA) Setup:
- Prisma Access needs to act as a "man-in-the-middle" to decrypt. It needs a CA certificate that endpoints trust.
- **Option A (Recommended):** Use an Enterprise Subordinate CA certificate signed by your internal Root CA. Generate a CSR on Panorama/Prisma Access, get it signed by your internal CA, and import the signed certificate back.
- **Option B:** Generate a Self-Signed Root CA directly on Panorama/Prisma Access (simpler setup, but requires distributing this CA to *all* endpoints as a trusted root).
- Distribute CA Certificate to Endpoints: The Root CA certificate (either your internal Root or the self-signed one from Option B) MUST be installed in the trusted root certificate store of all endpoints whose traffic will be decrypted (e.g., via Group Policy for Windows, MDM for mobile). **If this step is missed, users will receive browser certificate errors.**
- Create Decryption Profile (Optional): Define parameters for SSL/TLS handling (e.g., supported protocol versions, block sessions with broken certificates, unsupported modes).
- Create Decryption Policy Rule:
- Define source/destination zones, addresses, users, URL categories, etc., to match traffic you want to decrypt.
- Action: Set to 'Decrypt'.
- Type: Set to 'SSL Forward Proxy'.
- Certificate: Select the Forward Trust CA certificate configured in Step 1.
- Attach the Decryption Profile (optional).
- Place Rule Appropriately: Decryption policy is evaluated before Security policy. Place decryption rules logically.
SSL Forward Proxy Decryption Flow
sequenceDiagram
participant User as User's Browser
participant PA as Prisma Access (SPN)
participant Server as Web Server (e.g., google.com)
User->>PA: 1. TCP Handshake (SYN to Server IP)
PA->>Server: 2. TCP Handshake (SYN with PA IP)
Server-->>PA: 3. SYN/ACK
PA-->>User: 4. SYN/ACK
User->>PA: 5. ACK (TCP Established)
PA->>Server: 6. ACK (TCP Established)
User->>PA: 7. Client Hello (TLS Handshake)
activate PA
PA->>PA: 8. Decryption Policy Match? (Action=Decrypt)
PA->>Server: 9. Client Hello (from PA)
activate Server
Server-->>PA: 10. Server Hello, Certificate, Server Key Exchange
PA->>PA: 11. Verify Server Cert. Generate **Impersonation Cert** (signed by Forward Trust CA)
PA-->>User: 12. Server Hello (from PA), **Impersonation Cert**, Server Key Exchange
deactivate Server
activate User
User->>User: 13. Verify Impersonation Cert (Trusts Root CA?)
User->>PA: 14. Client Key Exchange, Change Cipher Spec, Finished (Encrypted with Impersonation Cert Session Key)
deactivate User
PA->>PA: 15. Decrypt Finished message using its key
PA->>Server: 16. Client Key Exchange, Change Cipher Spec, Finished (Encrypted with Original Server Session Key)
activate Server
Server-->>PA: 17. Change Cipher Spec, Finished (Encrypted)
deactivate Server
PA->>PA: 18. Decrypt Finished message
Note over PA, Server: Secure session PA <-> Server established
PA-->>User: 19. Change Cipher Spec, Finished (Encrypted)
deactivate PA
Note over User, PA: Secure session User <-> PA established
Note over User, PA: PA now decrypts app data User->PA, inspects, re-encrypts PA->Server (and vice-versa)
Certificate Management and Deployment
- Forward Trust CA: As described above, requires signing by a trusted root (internal or self-signed) and deployment of that root to clients.
- Forward Untrust Certificate: Used for websites with invalid/untrusted certificates. Prisma Access presents this cert to the user, typically resulting in a browser warning page configurable in the Decryption Profile. Does not require client deployment.
- Deployment Methods for Root CA: Group Policy Objects (GPO) for Windows, MDM profiles (Intune, Jamf, Workspace ONE) for macOS/iOS/Android, manual installation.
Decryption Exclusions and Best Practices
Best Practice: Aim to decrypt as much traffic as possible, but exclude categories that cause technical issues or raise privacy concerns. Document all exclusions.
- Reasons for Exclusion ('No Decrypt' Rules):
- Privacy Concerns: Categories like Financial Services, Health and Medicine often contain sensitive personal data that organizations choose not to decrypt.
- Technical Issues: Applications using certificate pinning (where the app expects a specific server certificate, not the impersonation cert), mutual authentication, or non-standard TLS implementations may break if decrypted.
- Unsupported Ciphers/Protocols: While rare, some legacy protocols might not be decryptable.
- Creating Exclusions: Create specific 'No Decrypt' Decryption Policy rules placed *before* the main 'Decrypt' rule. Match based on:
- URL Category (most common: Financial, Health).
- Destination IP/Address Object.
- Source User/Group.
- Application (App-ID).
- Logging: Ensure TLS Handshake errors and other decryption failures are logged for troubleshooting.
- Performance: Decryption consumes additional processing resources on the SPNs. Monitor resource utilization in Prisma Access Insights, although Prisma Access infrastructure is generally sized to handle significant decryption loads.
Part 7: QoS Policy Configuration
Quality of Service (QoS) allows you to prioritize critical applications and manage bandwidth allocation within Prisma Access, ensuring important traffic gets preferential treatment during congestion.
- Purpose: Guarantee performance for latency-sensitive or business-critical applications (e.g., VoIP, video conferencing, SAP) over less important traffic (e.g., large file transfers, recreational browsing).
- Mechanism: Prisma Access supports policy-based QoS, classifying traffic into different priority classes (typically 8 classes, 1 being highest priority, 4 being default).
- Configuration:
- Define QoS Profile:** Under `Objects > QoS Profile`, define guaranteed bandwidth and maximum bandwidth limits for each QoS class.
- Define QoS Policy Rule:** Under `Policies > QoS`, create rules to classify traffic into specific QoS classes. Match criteria include: App-ID, User/Group, Source/Destination IP, Service, URL Category. Assign a QoS Class (1-8) to matching traffic.
- Apply QoS Profile to Interface:** QoS is typically applied egress on the virtual interfaces handling outbound traffic within the Prisma Access templates (e.g., the tunnel interface for RN/SC, or the external interface for MU internet traffic). This is configured within the Template settings (`Network > Network Profiles > QoS Profile`).
- Bandwidth Management: QoS helps manage the bandwidth allocated to Mobile Users or Remote Networks, ensuring fair usage and prioritization within those licensed limits.
- Best Practices:
- Identify truly critical applications needing prioritization.
- Assign highest priority (Class 1-3) sparingly to essential, real-time apps (VoIP, Video Conferencing).
- Assign lower priority (Class 5-8) to bulk traffic or non-critical apps.
- Leave most standard business traffic in the default class (Class 4).
- Monitor QoS statistics to ensure policies are having the desired effect.
Part 8: DNS Security
Provides protection against DNS-based threats by inspecting DNS requests and leveraging threat intelligence.
- Mechanism: Intercepts DNS queries going through Prisma Access SPNs. Compares requested domains against a database of malicious domains (malware, C&C, phishing) using threat intelligence and predictive analytics (machine learning).
- Configuration:
- Enable DNS Security:** Requires the appropriate subscription license.
- Create Anti-Spyware Profile:** DNS Security settings are integrated within Anti-Spyware profiles under `Objects > Security Profiles > Anti-Spyware`.
- Configure DNS Policies:** Within the profile, define actions (alert, block, sinkhole) for various malicious domain categories. Enable DNS Sinkhole action to redirect compromised clients attempting to reach C&C servers to an internal "sinkhole" IP for identification.
- Apply Profile:** Attach the Anti-Spyware profile (with DNS Security configured) to relevant Security Policy rules (typically rules allowing DNS traffic or broad internet access).
- Policy Enforcement: Actions are taken based on the matched domain category and configured policy (block, sinkhole, allow, alert).
- Visibility: DNS Security logs provide visibility into malicious DNS activity.
Part 9: Enterprise DLP
Cloud-delivered Data Loss Prevention (DLP) helps detect and prevent sensitive data exfiltration through Prisma Access.
- Prerequisites: Requires Enterprise DLP subscription license.
- Mechanism: Scans traffic content (including decrypted SSL/TLS traffic) for patterns matching sensitive data (e.g., credit card numbers, social security numbers, custom patterns, keywords, specific file types/properties).
- Configuration (Often via dedicated DLP Portal/App):
- Define Data Patterns & Profiles:** Configure predefined patterns (PII, Financial, Health) or create custom patterns (regex, keywords, file properties). Group patterns into Data Profiles.
- Create DLP Policy Rules:** Define rules that specify the Data Profiles to look for, source/destination, users/groups, applications, and the action to take (alert, block).
- Integration with Prisma Access:** Link the DLP policy to Prisma Access within the Cloud Services plugin (Panorama) or Prisma SASE UI (Cloud-Managed). This typically involves applying a 'Data Filtering' profile (which references the DLP policy) to relevant Security Policy rules.
- Policy Enforcement: When sensitive data matching a policy is detected in allowed traffic, the configured action (alert or block) is taken.
- Requires Decryption: DLP is most effective when traffic is decrypted, as it needs to inspect the content payload.
Part 10: Explicit Proxy
Prisma Access can function as an explicit forward proxy, where clients (browsers, applications) are manually configured to send web traffic directly to Prisma Access.
- Use Cases:
- Environments where deploying GlobalProtect clients to all devices is not feasible (e.g., specific server segments, some BYOD scenarios).
- Gradual migration from existing on-premises explicit proxy solutions.
- Securing specific application traffic that supports explicit proxy configuration.
- Mechanism: Clients are configured (via PAC file, WPAD, or manual settings) with the address and port of the Prisma Access explicit proxy service. Prisma Access receives web requests (HTTP/HTTPS), applies security policies (URL Filtering, Threat Prevention, DLP), and forwards allowed traffic to the internet.
- Configuration Steps (High-Level):
- Enable Explicit Proxy within the Prisma Access configuration (Mobile Users section in Panorama/Cloud UI).
- Prisma Access provides dedicated FQDNs/IPs and ports for the explicit proxy service per region.
- Configure Authentication (Optional but Recommended): Use SAML, Kerberos, LDAP, or RADIUS to authenticate proxy users for User-ID based policy. Requires specific authentication policy configuration for proxy.
- Deploy Proxy Settings to Clients: Use PAC (Proxy Auto-Config) files, WPAD (Web Proxy Auto-Discovery Protocol), GPOs, MDM, or manual configuration to point clients to the Prisma Access proxy address/port.
- Configure Security Policies: Create specific Security Policy rules matching traffic received via the explicit proxy service (often identified by a dedicated zone or interface). Apply URL Filtering, Threat Prevention, etc.
- Decryption: SSL decryption policies can be applied to explicit proxy traffic, but certificate deployment challenges might be greater if clients are unmanaged.
- Limitations Compared to GlobalProtect:
- Typically only secures HTTP/HTTPS traffic (unless proxy supports CONNECT tunneling for other protocols, which has limitations).
- No HIP checking capabilities.
- Relies on client-side proxy configuration being correct and tamper-proof.
- May require separate authentication setup compared to GlobalProtect SAML flow.