Prisma Access: Implementation & Configuration

This document details the critical phases of implementing and configuring Prisma Access, covering planning, onboarding using both Panorama and Cloud Management, and the configuration of key security features like policies, NAT, decryption, and more.

Part 1: Planning and Design

Thorough planning and design are paramount for a successful Prisma Access deployment. Rushing this phase often leads to configuration challenges, performance issues, or security gaps later.

Network Assessment Prerequisites

IP Addressing Strategy

Critical Step: Avoiding IP address overlap is essential.

Authentication Design

Example SAML Authentication Flow (Mobile User)

        sequenceDiagram
            participant User as User (GP Client)
            participant Portal as GP Portal (Prisma Access)
            participant IdP as Identity Provider (e.g., Azure AD)
            participant Gateway as GP Gateway (Prisma Access)

            User->>Portal: Initiate Connection
            Portal->>User: Redirect to IdP for Authentication
            User->>IdP: Request Authentication
            activate IdP
            Note over User, IdP: User enters credentials, performs MFA
            IdP-->>User: SAML Assertion (Signed)
            deactivate IdP
            User->>Portal: POST SAML Assertion
            activate Portal
            Portal->>Portal: Validate Assertion Signature & Attributes
            Portal-->>User: Authentication OK, Send Agent Config & Cookie
            deactivate Portal
            User->>Gateway: Connect using Config & Cookie
            activate Gateway
            Gateway->>Gateway: Validate Cookie/Assertion Info
            Gateway-->>User: Tunnel Established
            deactivate Gateway
    

Bandwidth Sizing Considerations

Regional Deployment Strategy

Policy Migration Planning

Part 2: Onboarding Prisma Access (Panorama-Managed)

This section details the steps for onboarding and configuring Prisma Access using a customer-managed Panorama instance.

Installing and Configuring the Cloud Services Plugin

  1. Download Plugin: Obtain the compatible Cloud Services plugin version for your Panorama software version from the Palo Alto Networks Customer Support Portal.
  2. Install Plugin on Panorama: Navigate to Panorama > Plugins, upload the downloaded plugin file, and install it. Panorama will likely restart.
  3. Verify Installation: After restart, confirm the plugin is listed and running under Panorama > Plugins.
  4. Initial Plugin Configuration (Service Setup): Navigate to Panorama > Cloud Services > Service Setup. Click 'Authenticate'. This will redirect you to the Palo Alto Networks Hub portal to log in and authorize Panorama to manage cloud services for your account.
  5. Associate Prisma Access Instance: Once authenticated, select the Prisma Access tenant/instance you want this Panorama to manage from the dropdown list.

Initial Setup Wizard Walkthrough

The Cloud Services plugin provides a guided workflow for the initial Prisma Access setup.

  1. Navigate to Panorama > Cloud Services > Configuration. The initial view often presents a status dashboard and setup steps.
  2. Onboarding Workflow: Follow the guided steps which typically include:
    • Confirming Cortex Data Lake connection.
    • Defining basic infrastructure settings (e.g., Prisma Access infrastructure subnet - usually auto-populated).
    • Selecting compute locations (regions) for Mobile Users and Remote Networks.
    • Allocating IP address pools for Mobile Users.
    • Configuring initial templates/device groups (can be refined later).
  3. Review and Commit: The wizard helps stage the initial configuration required by Prisma Access.

Configuring Cortex Data Lake Connection

Template Stacks and Device Groups (Detailed)

This is the core of Panorama-managed configuration, providing structure and reusability.

Templates and Template Stacks (Network/Device Settings)

Device Groups (Policy Settings)

Panorama Configuration Workflow (Conceptual)

flowchart TD
    subgraph Panorama Objects
        A[Define Shared Objects - Addresses, Services, Profiles]
        B[Define Templates - Network/Device Settings]
        C[Define Device Groups - Policies]
    end

    subgraph Prisma Access Configuration
        D{Assign Templates/Stacks to Prisma Access Components}
        E{Assign Device Groups to Prisma Access Components}
    end

    subgraph Commit & Push
        F[Commit to Panorama]
        G[Push to Cloud Services Plugin]
        H[Plugin Deploys Config to Prisma Access Cloud]
    end

    A --> B
    A --> C
    B --> D
    C --> E
    D --> F
    E --> F
    F --> G
    G --> H

    %% Feedback Loop
    H -- Status/Logs --> G
    G -- Status/Logs --> F


    

Pushing Configuration and Verification

  1. Commit to Panorama: After making configuration changes in Templates, Device Groups, or Cloud Services setup, perform a 'Commit' operation in Panorama to save the candidate config. Review changes carefully.
  2. Push to Devices: Navigate to Panorama > Commit > Push to Devices.
  3. Select Cloud Services Plugin: In the Push scope, check the box for 'Cloud Services'. Do NOT select 'Managed Devices' unless pushing to physical/VM firewalls simultaneously.
  4. Select Configuration: Choose 'Include Device and Network Templates' and 'Include Policies and Objects'.
  5. Push: Initiate the push operation. Panorama sends the relevant configuration bundles to the Cloud Services plugin.
  6. Monitor Push Status: Observe the push status in Panorama's Task Manager. The plugin then takes over and applies the configuration to the Prisma Access backend. Monitor status in Cloud Services > Status.
  7. Verification:
    • Check status dashboards in Cloud Services > Status for Mobile Users, Remote Networks, Service Connections. Look for green status indicators.
    • Verify tunnel status (IPSec, BGP peering) for RNs and SCs.
    • Test connectivity for mobile users and remote networks.
    • Check logs in Panorama's Monitor tab (querying CDL).

Part 3: Onboarding Prisma Access (Cloud-Managed)

This approach uses the dedicated Prisma SASE cloud management UI, often appealing to new customers or those preferring a fully cloud-based experience.

Navigating the Prisma SASE Management UI

Step-by-Step Configuration Workflows

While specific clicks vary, the conceptual workflow mirrors Panorama but within the cloud UI:

  1. Initial Setup: Activate the service, connect to Cortex Data Lake (often automatic).
  2. Configure Identity & Authentication: Integrate with Cloud Identity Engine or configure SAML/LDAP/RADIUS profiles directly under Settings or Objects. Define Authentication Policies.
  3. Configure Mobile Users:
    • Define IP Pools.
    • Select Regions.
    • Configure GlobalProtect settings (Portal/Gateway behaviors, Split Tunneling, HIP).
  4. Configure Remote Networks:
    • Add site, specify location, bandwidth.
    • Define IPSec settings (PSK/Cert, Crypto).
    • Configure BGP/Static routing.
  5. Configure Service Connections: Similar to Remote Networks, focusing on datacenter/HQ connectivity.
  6. Define Objects: Create Address Objects, Service Objects, Custom URL Categories, HIP Objects/Profiles, Security Profiles (AV, URL, etc.).
  7. Configure Policies: Create Security, NAT, Decryption, QoS rules under the Policies section, leveraging defined objects and User/Group information from CIE/SAML.
  8. Commit and Deploy: The Cloud UI typically uses a 'Commit' or 'Save & Deploy' mechanism to push changes to the Prisma Access backend. Status monitoring is available within the UI.

Part 4: Security Policy Configuration

Security policies are the core of Prisma Access, defining what traffic is allowed or denied and what security inspections are applied.

Creating Security Policy Rules

Basic Security Policy Evaluation Flow

flowchart TD
    A[Traffic Received by SPN] --> B{Match Security Rule? Top-Down}
    B -- Yes --> C{Action = Allow?}
    B -- No --> Z[Default Rule: Implicit Deny unless overridden]
    C -- Yes --> D{Apply Security Profiles}
    C -- No --> E{Action = Deny/Drop/Reset}
    D --> F[Forward Allowed Traffic]
    E --> G[Block/Reset Traffic]
    Z --> G

    

Leveraging User-ID and HIP Context

Best Practice: Base policies on User/Group and Application (App-ID) rather than just IP addresses and ports whenever possible. Enforce Zero Trust.

Best Practices for Policy Structure

URL Filtering Policy Configuration

Threat Prevention Profile Configuration

Part 5: NAT Policy Configuration

Network Address Translation (NAT) is used to modify source or destination IP addresses, primarily for enabling outbound internet access from private IP spaces.

Source NAT (SNAT)

Destination NAT (DNAT)

Part 6: Decryption Policy

Much of today's traffic is encrypted (SSL/TLS). Decryption allows Prisma Access to inspect the content of this traffic for threats, URL categories, sensitive data (DLP), and accurate App-ID identification.

Configuring SSL Forward Proxy Decryption

This is the most common decryption method used for outbound traffic from users/sites to the internet/SaaS.

  1. Certificate Authority (CA) Setup:
    • Prisma Access needs to act as a "man-in-the-middle" to decrypt. It needs a CA certificate that endpoints trust.
    • **Option A (Recommended):** Use an Enterprise Subordinate CA certificate signed by your internal Root CA. Generate a CSR on Panorama/Prisma Access, get it signed by your internal CA, and import the signed certificate back.
    • **Option B:** Generate a Self-Signed Root CA directly on Panorama/Prisma Access (simpler setup, but requires distributing this CA to *all* endpoints as a trusted root).
  2. Distribute CA Certificate to Endpoints: The Root CA certificate (either your internal Root or the self-signed one from Option B) MUST be installed in the trusted root certificate store of all endpoints whose traffic will be decrypted (e.g., via Group Policy for Windows, MDM for mobile). **If this step is missed, users will receive browser certificate errors.**
  3. Create Decryption Profile (Optional): Define parameters for SSL/TLS handling (e.g., supported protocol versions, block sessions with broken certificates, unsupported modes).
  4. Create Decryption Policy Rule:
    • Define source/destination zones, addresses, users, URL categories, etc., to match traffic you want to decrypt.
    • Action: Set to 'Decrypt'.
    • Type: Set to 'SSL Forward Proxy'.
    • Certificate: Select the Forward Trust CA certificate configured in Step 1.
    • Attach the Decryption Profile (optional).
  5. Place Rule Appropriately: Decryption policy is evaluated before Security policy. Place decryption rules logically.

SSL Forward Proxy Decryption Flow

        sequenceDiagram
            participant User as User's Browser
            participant PA as Prisma Access (SPN)
            participant Server as Web Server (e.g., google.com)

            User->>PA: 1. TCP Handshake (SYN to Server IP)
            PA->>Server: 2. TCP Handshake (SYN with PA IP)
            Server-->>PA: 3. SYN/ACK
            PA-->>User: 4. SYN/ACK
            User->>PA: 5. ACK (TCP Established)
            PA->>Server: 6. ACK (TCP Established)

            User->>PA: 7. Client Hello (TLS Handshake)
            activate PA
            PA->>PA: 8. Decryption Policy Match? (Action=Decrypt)
            PA->>Server: 9. Client Hello (from PA)
            activate Server
            Server-->>PA: 10. Server Hello, Certificate, Server Key Exchange
            PA->>PA: 11. Verify Server Cert. Generate **Impersonation Cert** (signed by Forward Trust CA)
            PA-->>User: 12. Server Hello (from PA), **Impersonation Cert**, Server Key Exchange
            deactivate Server
            activate User
            User->>User: 13. Verify Impersonation Cert (Trusts Root CA?)
            User->>PA: 14. Client Key Exchange, Change Cipher Spec, Finished (Encrypted with Impersonation Cert Session Key)
            deactivate User
            PA->>PA: 15. Decrypt Finished message using its key
            PA->>Server: 16. Client Key Exchange, Change Cipher Spec, Finished (Encrypted with Original Server Session Key)
            activate Server
            Server-->>PA: 17. Change Cipher Spec, Finished (Encrypted)
            deactivate Server
            PA->>PA: 18. Decrypt Finished message
            Note over PA, Server: Secure session PA <-> Server established
            PA-->>User: 19. Change Cipher Spec, Finished (Encrypted)
            deactivate PA
            Note over User, PA: Secure session User <-> PA established
            Note over User, PA: PA now decrypts app data User->PA, inspects, re-encrypts PA->Server (and vice-versa)
    

Certificate Management and Deployment

Decryption Exclusions and Best Practices

Best Practice: Aim to decrypt as much traffic as possible, but exclude categories that cause technical issues or raise privacy concerns. Document all exclusions.

Part 7: QoS Policy Configuration

Quality of Service (QoS) allows you to prioritize critical applications and manage bandwidth allocation within Prisma Access, ensuring important traffic gets preferential treatment during congestion.

Part 8: DNS Security

Provides protection against DNS-based threats by inspecting DNS requests and leveraging threat intelligence.

Part 9: Enterprise DLP

Cloud-delivered Data Loss Prevention (DLP) helps detect and prevent sensitive data exfiltration through Prisma Access.

  • Prerequisites: Requires Enterprise DLP subscription license.
  • Mechanism: Scans traffic content (including decrypted SSL/TLS traffic) for patterns matching sensitive data (e.g., credit card numbers, social security numbers, custom patterns, keywords, specific file types/properties).
  • Configuration (Often via dedicated DLP Portal/App):
    • Define Data Patterns & Profiles:** Configure predefined patterns (PII, Financial, Health) or create custom patterns (regex, keywords, file properties). Group patterns into Data Profiles.
    • Create DLP Policy Rules:** Define rules that specify the Data Profiles to look for, source/destination, users/groups, applications, and the action to take (alert, block).
    • Integration with Prisma Access:** Link the DLP policy to Prisma Access within the Cloud Services plugin (Panorama) or Prisma SASE UI (Cloud-Managed). This typically involves applying a 'Data Filtering' profile (which references the DLP policy) to relevant Security Policy rules.
  • Policy Enforcement: When sensitive data matching a policy is detected in allowed traffic, the configured action (alert or block) is taken.
  • Requires Decryption: DLP is most effective when traffic is decrypted, as it needs to inspect the content payload.

Part 10: Explicit Proxy

Prisma Access can function as an explicit forward proxy, where clients (browsers, applications) are manually configured to send web traffic directly to Prisma Access.

  • Use Cases:
    • Environments where deploying GlobalProtect clients to all devices is not feasible (e.g., specific server segments, some BYOD scenarios).
    • Gradual migration from existing on-premises explicit proxy solutions.
    • Securing specific application traffic that supports explicit proxy configuration.
  • Mechanism: Clients are configured (via PAC file, WPAD, or manual settings) with the address and port of the Prisma Access explicit proxy service. Prisma Access receives web requests (HTTP/HTTPS), applies security policies (URL Filtering, Threat Prevention, DLP), and forwards allowed traffic to the internet.
  • Configuration Steps (High-Level):
    1. Enable Explicit Proxy within the Prisma Access configuration (Mobile Users section in Panorama/Cloud UI).
    2. Prisma Access provides dedicated FQDNs/IPs and ports for the explicit proxy service per region.
    3. Configure Authentication (Optional but Recommended): Use SAML, Kerberos, LDAP, or RADIUS to authenticate proxy users for User-ID based policy. Requires specific authentication policy configuration for proxy.
    4. Deploy Proxy Settings to Clients: Use PAC (Proxy Auto-Config) files, WPAD (Web Proxy Auto-Discovery Protocol), GPOs, MDM, or manual configuration to point clients to the Prisma Access proxy address/port.
    5. Configure Security Policies: Create specific Security Policy rules matching traffic received via the explicit proxy service (often identified by a dedicated zone or interface). Apply URL Filtering, Threat Prevention, etc.
    6. Decryption: SSL decryption policies can be applied to explicit proxy traffic, but certificate deployment challenges might be greater if clients are unmanaged.
  • Limitations Compared to GlobalProtect:
    • Typically only secures HTTP/HTTPS traffic (unless proxy supports CONNECT tunneling for other protocols, which has limitations).
    • No HIP checking capabilities.
    • Relies on client-side proxy configuration being correct and tamper-proof.
    • May require separate authentication setup compared to GlobalProtect SAML flow.