To keep your applications and data safe, you must secure all users at all locations all the time. But how do you do this when your footprint is expanding globally, more and more of your users are mobile, and your applications and data are moving out of your network and into the cloud? Prisma Access enables this consistent security by safely enabling your users to access cloud and data center applications as well as the internet, whether they are at your headquarters, branch offices, or on the road. Prisma Access consistently inspects all traffic across all ports, enabling secure access to the internet, as well as to your sanctioned SaaS applications, public cloud environments, and data centers and headquarters. Threat prevention, malware prevention, URL filtering, SSL decryption, and application-based policy capabilities are built-in to provide you with the same level of security no matter where your users are or what resources they are accessing. All Prisma Access logs are stored in the Strata Logging Service, providing centralized analysis, reporting, and forensics across all users, applications, and locations.
Prisma Access delivers protection at scale with global coverage so you don’t have to worry about things like sizing and deploying hardware firewalls at your branches or building out and managing appliances in collocation facilities. Prisma Access provides the network infrastructure to connect all of your remote branches, your headquarter sites, data centers, and mobile users without requiring you to build out your own global security infrastructure and expand your operational capacity.
With Prisma Access, Palo Alto Networks deploys and manages the security infrastructure globally to secure your remote networks and mobile users. Prisma Access encrypts the data end-to-end between Mobile User Security Processing Nodes (MU-SPNs) and Remote Network Security Processing Nodes (RN-SPNs), between SPNs and Service Connection Corporate Access Nodes (SC-CANs), and between SC-CANs and the datacenter.
Even if you don’t require a service connection for your HQ or data center, we recommend that you create one to allow network communication between mobile users and remote network locations, and between mobile users in different geographical locations.
You can deploy the GlobalProtect app to your users (available for smartphones, tablets, or laptops running Microsoft Windows, Apple macOS and iOS, Android, Google Chrome OS, and Linux) so that they can tunnel the traffic to Prisma Access for policy enforcement and threat prevention. The GlobalProtect app also provides host information profile (HIP) reporting so that you can create granular policies based on device state to ensure that endpoints adhere to your security standards—for example, they are equipped with the most up-to-date patches, encryption, and virus definitions—in order to access your most sensitive applications. Or, to enable secure access to users on unmanaged devices, you can enable Clientless VPN . Prisma Access dynamically scales in and out per region based on where your users are at the moment.
If your organization’s existing network already uses explicit proxies and deploys PAC files on your client endpoints, you can smoothly migrate to Prisma Access to secure mobile users’ outbound internet traffic.
The Importance of Internet Security
Securing internet access has never been more important and more challenging. Existing legacy solutions struggle to detect evasive and targeted phishing and other web-based attacks while at the same time neglecting new threats posed by unsecured DNS traffic. Palo Alto Networks Prisma Access has internet security with industry-first ML-powered Advanced URL Filtering and DNS Security services. Using Prisma Access, you can prevent evasive and targeted phishing and fileless attacks in real-time, and protect against the latest sophisticated DNS-based attacks.
Prisma Access Cloud Secure Web Gateway (SWG)
A secure web gateway is a crucial element in today's digital landscape due to the escalating complexity and frequency of cyberthreats. Cybercriminals continually devise new tactics and techniques to breach security defenses, one of which is to camouflage malicious code in seemingly legitimate websites. As users access these compromised websites, they inadvertently leak credentials or expose organizations to harmful code, which can wreak havoc if left unnoticed.
In such a risk-laden environment, the absence of a robust security gateway significantly amplifies the risk to an organization's digital assets. Such risk could lead to unauthorized access, data theft and disruption of business operations, especially with the increasing prevalence of widespread phishing and ransomware attacks. Without the security barrier provided by SWG, a ransomware attack could effectively hold an organization hostage, leading to financial and reputational harm.
The use of encrypted traffic is now commonplace, with HTTPS constituting the majority of web traffic. An organization is at risk of security threats concealed within encrypted channels if it lacks a SWG that can effectively decrypt and inspect this traffic.
However, using multiple point products for SWG, private app access, and CASB only complicates matters. Siloed products stitched together as one offering results in feature parity gaps and poor security outcomes, leaving you vulnerable for attacks. With these solutions, you get inconsistent security for internet and private apps.
To address these challenges, Prisma Access offers a unified product, converging management, policy, and data for all users and apps across all capabilities including ZTNA, SWG, NG-CASB, FWaaS, DLP, and more.
Customers can easily migrate from legacy on-premises and cloud-based proxy solutions toPrisma Access to gain inline visibility and control of internet and SaaS app traffic with industry-leading AI-powered security protections.
Using Prisma Access to Secure Users and Endpoints
Prisma Access is designed to prevent successful cyberattacks, and that’s why it does more than just secure the web. To stop cyberattacks, it’s necessary to inspect all traffic. Anything short of a full inspection of all traffic introduces a significant gap in security. Prisma Access consistently protects all traffic on all ports and from all applications, enabling your organization to:
Read more about Prisma Access and its solutions.
There are two ways you can manage Prisma Access, but you can't switch between the management interfaces after you activate your Prisma Access license (with the exception of using the migration workflow to go from a Prisma Access (Managed by Panorama) to a Prisma Access (Managed by Strata Cloud Manager) deployment). So, you must decide how you want to manage Prisma Access before you get started:
To manage Prisma Access from the cloud, use Strata Cloud Manager. With cloud management, you can quickly onboard branches and mobile users through task-driven workflows that allow you to set up and test your environment in minutes. Cloud management with Strata Cloud Manager simplifies the onboarding process by providing predefined internet access and decryption policy rules based on best practices. Quickly set up IPSec tunnels using defaults suitable for the most common IPSec-capable devices and turn on SSL decryption for recommended URL categories.
Strata Cloud Manager Command Center
The Strata Cloud Manager Command Center page appears when you launch your Strata Cloud Manager. This command center helps you in assessing the health of your network, better visibility, and an overview of your data. The command center has different dashboards to view different types of reports.
Click any of these categories in your dashboards to filter results accordingly.
Use the Cloud Services plugin on Panorama to set up and manage Prisma Access. This is a good option if you're already using Panorama to manage next-generation firewalls and you have a common policy that you want to use for access to your corporate applications.
Even if you're using Panorama to manage Prisma Access, you can still use Strata Cloud Manager for many Prisma Access visibility and monitoring features. Learn more.
After you decide which management option you want to use, get started by following the licensing and activation workflow for you option you have selected:
There are two ways you can choose from to manage Prisma Access :
These two management interfaces are how you handle onboarding, configuration, and security policy enforcement for your Prisma Access environment. However, Prisma Access also includes robust visibility and monitoring for your Prisma Access environment, and these features are provided on Strata Cloud Manager.
Importantly:
Regardless of the management interface you're using for Prisma Access (Strata Cloud Manager or Panorama), you can use Strata Cloud Manager for many of your Prisma Access visibility features, and to interact with add-on subscriptions like AI-Powered Autonomous DEM.
Prisma Access Visibility and Monitoring Features on Strata Cloud Manager |
|
Provides native, end-to-end visibility and insights for all user traffic in your Secure Access Service Edge (SASE) environment. ADEM functionality is natively integrated into the GlobalProtect app and Prisma Access and therefore does not require you to deploy any additional appliances or agents. You can quickly isolate the source of digital experience problems, and simplify remediation. This feature requires the Autonomous DEM add-on license to use with Prisma Access (Managed by Panorama) Access. |
|
Visibility features in Strata Cloud Manager identify key findings that you can use to inform your policy updates and close enterprise security and user productivity gaps.
Explore data for the applications, threats, users, security subscriptions at work in your network
Many dashboards support reports, where you can share data offline and schedule for regular updates |
|
The Command Center is an interactive, visual summary of the IoT devices, users, hosts, and traffic on your network. Utilizing the data from your cloud-delivered security and ADEM subscriptions, the Command center surfaces important information on the threats, user experience, and security of data on your network. The Command Center allows you to interact with the data and visualize the relationships between events on the network, so that you can uncover anomalies or find ways to enhance your network security. |
Prisma Access uses a shared ownership model. Palo Alto Networks manages the underlying security infrastructure, ensuring it is secure, resilient, up-to-date and available to you when you need it. Your organization’s responsibility is to onboard locations and users, push policies, update them, query logs, and generate reports.
Palo Alto Networks manages the following parts of the security infrastructure. In addition to the security infrastructure, Prisma Access manages releases and upgrades :
Your organization manages the following components of the security infrastructure.
APIs for Prisma Access (Managed by Panorama)
In addition to the XML APIs that are available for configuration and management in Panorama , there are XML APIs for the Cloud Services plugin that you can use to perform tasks specific to Prisma Access. Use these APIs through a third-party service, application, or script to automate configuration and reporting tasks for Prisma Access.
Access the Prisma Access (Managed by Panorama) API Using the Browser and Web Interface
To access the API using the browser, log in to the Panorama that manages Prisma Access with administrator privileges, then enter /api at the end of the URL. The URL changes to the XML API browser interface.
The Prisma Access APIs are located in the following XML Path Language (XPath) nodes in the XML tree:
As you navigate in the XML tree, Prisma Access populates the tree in the XML area. You can enter required values in the XML area and click Submit to process an XML request. For example, to request the onboarding status of a job, navigate to XML APIOperational Commandsrequestpluginscloud_servicesprisma-accessjob-statusjobid , enter the Job id in the jobid field, enter the Service Type servicetype area, and click Submit to submit your request.
This XML only retrieves the onboarding status of a job. To retrieve the status of all commit operations, use the Prisma Access UI.
Prisma Access returns the output in XML format.
You can also use the web interface to find APIs in Panorama .
Use curl Commands to Retrieve Panorama Managed API Commands
If you prefer to use CLI to retrieve API command results, you can use APIs in conjunction with the API you use to retrieve public and infrastructure IP addresses for Prisma Access. To do so, use the following command:
Configuration Commands:
curl -k -X GET "https://<panorama-ip-address>/api/?key=<api-key>&type=config&cmd=<api-parameters></api-parameters>
Operational Commands:
curl -k -X GET "https://<panorama-ip-address>/api/?key=<api-key>&type=op&cmd=<api-parameters></api-parameters>
Where:
If you have a multi-tenant deployment, you add the name of the tenant for which you want to retrieve API information into the API.
For example, given a Prisma Access deployment that has the following parameters:
If you wanted to retrieve the number of active mobile users for that tenant, you would enter the following curl command:
curl -k -X GET "https://1.2.3.4/api/?key=12345abcde&type=op&cmd=<request><plugins><cloud_services><prisma-access><multi-tenant><tenant-name><entry%20name='tenant-1'></entry></tenant-name><remote-active-users-count/></multi-tenant></prisma-access></cloud_services></plugins></request>"
Use CLI Commands with Prisma Access (Managed by Panorama)
Prisma Access allows you to use CLI commands to retrieve Prisma Access data. To access the CLI , establish a SSH connection using the IP address of the Panorama that manages Prisma Access.
The CLI uses the same modes and has the same behavior as PAN-OS commands, with the exception of entering the tenant name for multi-tenant deployments; you enter the tenant name using the tenant-name tenant-name command. For example, given a tenant name of tenant-1 , enter the following command to retrieve to retrieve the active user count in a multi-tenant deployment:
admin-Panorama> request plugins cloud_services prisma-access multi-tenant remote-active-users-count tenant-name tenant-1
pass
Current User Count: 253
The Prisma Access Insights APIs allow you to query your Prisma Access Insights tenants for data resources. There are two versions of the APIs. The Prisma Access Insights 2.0 and 1.0 APIs both allow you to query your Prisma Access tenant for the health of your Prisma Access network deployment. The API calls are the same for both versions; however, each version uses different access tokens, and the mechanism by which you obtain an access token is different for each version.
To get started with Prisma Access Insights APIs, go to the Developer’s Guide at Welcome to Prisma SASE .
Prisma Access Insights API describes content specific to Prisma Access Insights APIs, as well as information about API version 2.0 , API version 1.0 , Prisma Access Insights API examples, and PAI FAQs .
About 2.0 APIs
Prisma Access Insights 2.0 APIs are intended for Prisma Access (Managed by Strata Cloud Manager) customers, where the tenants have been onboarded by Palo Alto Networks using a Tenant Service Group (TSG) identifier. To see whether your tenant uses TSG IDs, go to the Prisma Access hub , click on the Prisma Access Insights application name, and look in the Manage Apps section.
The 2.0 APIs can also be used by Prisma Access (Managed by Panorama) customers. In this case, if the Prisma Access (Managed by Panorama) deployment is multitenant, then only the supertenant has the TSG ID, and the subtenants are included in the header with the Strata Logging Service tenant ID.
API 2.0 Case
After supertenant migration to TSG ID, when querying for a subtenant:
The header needs the following information: Prisma-Tenant:tsg_id:sub_tenant_id
About 1.0 APIs
Prisma Access Insights 1.0 APIs are intended for all Prisma Access (Managed by Strata Cloud Manager)single tenant customers, as well as Prisma Access (Managed by Panorama) single-tenant and multitenant customers.
API 1.0 Case
Before supertenant migration to TSG ID, when querying for a subtenant information using the 1.0 APIs, include the supertenant ID on the endpoint:
/api/sase/v1.0/resource/tenant/{super_tenant_id}/
Include the following header on the call: Prisma-Tenant: {tenant_id}: {sub_tenant_id}
Migrate Prisma Access from Panorama to Strata Cloud Manager
Prisma Access Releases and Upgrades
Where Can I Use This? |
What Do I Need? |
|
To begin the migration from Prisma Access (Managed by Panorama) to Prisma Access (Managed by Strata Cloud Manager), reach out to your Palo Alto Networks account team. |
If you have an existing Prisma Access Deployment for which the configuration is managed by Panorama and want to migrate to Strata Cloud Manager for configuration management, Palo Alto Networks offers an in-product workflow that lets you migrate your existing Prisma Access configuration to Strata Cloud Manager.
Managing your Prisma Access configuration using Strata Cloud Manager instead of Panorama can offer you benefits such as:
Prepare to Migrate to Prisma Access (Managed by Strata Cloud Manager)
Before you start your migration, you should be aware of the minimum software requirements and the types of Prisma Access (Managed by Panorama) deployments you can migrate.
To migrate your Prisma Access (Managed by Panorama) to a Prisma Access (Managed by Strata Cloud Manager) deployment, complete the following steps.
At a high level, you:
If your deployment uses the default Master Key, this step isn't required.
This .xml file is required to upload to Strata Cloud Manager during the migration process. Don't upload a techsupport file or any other file except an .xml configuration file.
The migration program detects that you have a Panorama managed deployment.
The migration program begins.
Wait for all the steps to complete.
unsupported configuration
, you can Trim the above configurations and proceed or Cancel migration .
Some unsupported configurations (such as a multitenant configuration) cancel the migration and the migration program can't resolve the issue; in this case, Cancel Migration .
The migration program might make changes to your configuration to account for differences in the Panorama and the Strata Cloud Manager configuration or to fix unsupported functionality. If changes are required, the migration program shows those changes in a diff view with the new lines in green and the deleted lines in red.
Ignore any diffs that show the following object names; they don't affect your configuration:
Any changes you make are not committed to your configuration until you complete the migration and push your changes to Strata Cloud Manager.
For the example in the previous step, the migration program made a change to Backbone Routing (from no-asymmetric-routing to asymmetric-routing-only ). To change this setting back to your original configuration, go to WorkflowsPrisma Access SetupService ConnectionsAdvanced Settings and change the Backbone Routing configuration to Disable Asymmetric Routing for Service Connections .
While not required, it can be useful to acknowledge each change as you make them, so you can keep track of them.
While not required, you can also Acknowledge your changes.
After you Complete Migration, you can't go back to a Panorama managed deployment and your deployment permanently uses Strata Cloud Manager for its management.
Your migrated deployment displays.
This Push operation ensures that your migration has successfully completed and that Prisma Access has applied all changes to your migrated configuration.
Prisma Access (Managed by Strata Cloud Manager) automatically performs dataplane upgrades, without any intervention required from you.
Prisma Access performs dataplane upgrades on the service to provide new security features and capabilities to help protect your organization’s end-users, business assets, and digital transformation. When a new version of Prisma Access requires a dataplane upgrade, you need to understand how the upgrade process works and have the required prerequisites in place before upgrading.
You can expect your dataplane to be upgraded one to two times a year. Some releases might offer an optional dataplane upgrade in addition to the required dataplane upgrades to support Prisma Access features that require it.
Dataplane Upgrade Overview
Prisma Access upgrades your dataplane in two phases on two weekend dates, and keeps you informed about the upgrade using Strata Cloud Manager. On a high level, the following steps are taken during the upgrade process.
You may see a date populated in Strata Cloud Manager before the 21-day notification, but this date may not be final until you receive your 21-day notification.
You can change and submit the first locations to upgrade and time window multiple times for a given tenant. The last submission that occurred seven days before the scheduled start date will be chosen by the service for the upgrade. You will not be able to make any changes within seven days of the upgrade start date.
If you make changes, it might take up to 30 minutes for the changes you made to be displayed in the Upgrade Dashboard on Insights. You will be notified via email alert when the Prisma Access has processed and completed the changes.
Palo Alto Networks strongly suggests that you select locations that reflect your entire deployment. For example, if you have a mobile user, service connection, and remote network deployment, select a location or locations that have all deployment types.
The technical support team will investigate the issue and take corrective actions that may also include rolling back to the previous dataplane version. This decision will be communicated to you via the technical support case.
The following figure shows the timeline used for the upgrade and includes the tasks that you will need to perform for the dataplane upgrade (shown in green), as well as the steps that Prisma Access performs.
The following section provides more details about the dataplane upgrade process.
After you sign up for notifications , Prisma Access informs you of the two weekend dates that will be used for the upgrade process and sends these notifications 21 days, 14 days, 7 days, 3 days, and 24 hours before the first phase of the upgrade will occur. The upgrade process occurs in two phases:
Palo Alto Networks attempts to upgrade the locations during the four-hour window that you select through Strata Cloud Manager. However, completing the required upgrades during this window is best-effort and Palo Alto Networks cannot guarantee that the locations will be upgraded during that time. If there are any issues during the upgrade, Palo Alto Networks will attempt the upgrade 24 hours after the original four-hour window.
For this reason, you should schedule a change request window for 72 hours starting at 8 p.m. local time on Friday and ending at 8 p.m. local time on Monday for each of the two weekends when the dataplane upgrade occurs. You will receive an email when the upgrade is complete.
Prisma Access makes the following changes to your deployment during Phase #1 of the upgrade.
Deployment Type |
What is Upgraded |
Mobile Users—GlobalProtect Deployments |
Prisma Access upgrades:
|
Mobile Users—Explicit Proxy Deployments |
Prisma Access upgrades the Explicit Proxy nodes for the Explicit Proxy location or locations you specify. |
Remote Network Deployments |
Prisma Access upgrades the backup (HA) remote network, also known as the Remote Network Security Processing Node (RN-SPN) , then makes the backup remote network the active node for the location or locations you specify. The backup remote network connection is not upgraded until the following weekend, when the active and backup nodes are upgraded for all locations. If there are multiple RN-SPNs in the selected location, all primary nodes are upgraded to the new dataplane version. |
Service Connections |
Prisma Access upgrades the backup (HA) service connection, also known as the Service Connection Corporate Access Node (SC-CAN), then makes the backup service connection the active node for the location or locations you specify. The backup service connection is not upgraded until the following weekend, when the active and backup nodes are upgraded for all locations. If there are multiple SC-CANs in the selected location, all backup nodes are upgraded to the new dataplane version. |
ZTNA Connectors |
ZTNA Connectors are not upgraded; you can upgrade the ZTNA Connectors on an as-needed basis. |
Between the first and second upgrades, monitor the first upgraded locations and perform connectivity, performance, routing, and logging testing to make sure that the locations upgraded successfully. If you encounter a service-impacting failure after the upgrade, open a Support Case with Palo Alto Networks Technical Support for assistance. Palo Alto Networks will attempt to resolve the issue by rolling back the dataplane to a previous dataplane version within 24 hours.
The upgrade window can be longer. For example, if Phase #2 occurs during a national holiday in the United States of America, the second phase of the upgrade happens 14 days after the first phase instead of 7. The notifications you receive in Strata Cloud Manager show you the specific timeline for the upcoming dataplane upgrade.
The following example shows a sample dataplane upgrade procedure for a Mobile Users deployment with five gateways (MU-SPNs) and three SC-CANs. The US West location has two MU-SPNs as the result of an autoscale event (an extra MU-SPN was added after a large number of mobile users logged in to that location).
In this example, you selected a single location (US West) to upgrade first, and requested a four-hour upgrade window of 8:00 a.m. to 12:00 noon Saturday for the upgrade.
On the first upgrade weekend (Phase #1), the upgrade occurs for the SC-CANs and MU-SPNs in the US West location takes place between 8:00 a.m. and 12:00 p.m. Pacific Time on Saturday.
Seven days after the first location is upgraded, Palo Alto Networks upgrades the remaining components (Phase #2) using the same four-hour time window as was used for the first phase of the upgrade (8:00 a.m. to 12:00 p.m. on Saturday).
In this example, Prisma Access uses the following time zone information when upgrading the dataplane:
Use the following recommendations and requirements when adding an infrastructure subnet:
The following example shows a Prisma Access infrastructure subnet, 10.10.1.0/24, that you assigned from an existing supernet, 10.0.0.0/8. After you assign 10.10.1.0/24 as the infrastructure subnet, your organization cannot use any IP addresses from that subnet. For example, you can assign 10.10.2.1 to an endpoint, but 10.10.1.1 is not allowed because that IP address is part of the infrastructure subnet.
Before you can use Prisma Access to secure your remote networks and mobile users, configure an infrastructure subnet. Prisma Access uses IP addresses within this subnet to establish a network between your remote network locations, mobile users, headquarters and data center (if applicable). Prisma Access also uses service connections to access internal resources from your headquarters or data center location.
This sub-network will be an extension to your existing network. Hence, it should not overlap with any existing IP subnets in your network. The following example shows a 172.16.54.0/23 subnet that is being used for the Prisma Access infrastructure subnet.
For small networks with less than 50 sites and 2500 mobile users, consider a /24 subnet. For medium sized networks with less than 100 sites and less then 5000 mobile users, consider a /23 subnet. In most cases a /23 subnet is sufficient. If there are more than 100 sites or 5000 mobile users or expected future growth, contact Palo Alto Networks to evaluate whether you need a larger subnet size.
Learn how to set up Prisma Access.
The following workflow provides you with the summary steps that you take to install and configure Prisma Access (Managed by Panorama) Access.
If you are setting up a deployment that includes multiple instances of Prisma Access on a single Panorama (multitenancy), see . Most organizations do not have a need to create and manage multiple tenants.
In addition, if your Panorama appliance uses a ( PanoramaSetupServiceProxy Server ), or if you use SSL forward proxy with Prisma Access, be sure to add the following URLs and ports to an allow list on the proxy or proxy server.
If there is a Palo Alto Networks next-generation firewall between the Panorama appliance and the internet, you must add a security policy rule on the firewall to allow the paloalto-logging-service and paloalto-shared-services App-IDs from the Panorama appliance to the internet. These applications allow SSL-secured communication to Prisma Access and to Strata Logging Service that the Panorama appliance uses to query logs. If the Panorama appliance is behind a legacy Layer 4 firewall, permit ports 443 and 444 outbound from the Panorama to allow this traffic from the Panorama. Note that opening layer 4 ports instead of using Palo Alto Networks App-IDs is less secure and not recommended.
In order to push configuration—such as security policy, authentication policy, server profiles, security profiles, address objects, and application groups—to Prisma Access, you must either create new templates and device groups with the configuration settings you want to push to Prisma Access, or leverage your existing device groups and templates by adding them to the template stacks and device group hierarchies that Prisma Access creates when you onboard the service.
Prisma Access creates the following templates and device groups, depending on what you have purchased (for example, if you do not purchase an Explicit Proxy license, you will not see the Explicit Proxy templates and device groups):
Configuration is simplified in Prisma Access because you do not have to configure any of the infrastructure settings, such as interfaces and routing protocols. This configuration is automated and pushed from Panorama in the templates and device groups that the service creates automatically. You can configure any infrastructure settings that are required by the service, such as settings required to create IPSec VPN tunnels to the IPSec-capable devices at your remote network locations, directly from the plugin. Optionally, you can add templates and device group hierarchies to the configuration to simplify the service setup.
To simplify the service setup, create or import the templates and device groups you need before you begin the setup tasks for using Prisma Access.
When creating templates and device groups for Prisma Access, you do not need to assign managed devices to it. Instead, you will add them to the template stacks and device group hierarchies that Prisma Access creates. Do not add any of the templates or device groups created by Prisma Access to any other template stacks or device groups.
Prisma Access provides you with notifications about the service, including any dataplane upgrades, using notifications from this app.
Palo Alto Networks recommends changing the master key in Panorama and in the Cloud Services plugin as a security best practice and that you change the master key monthly.
Because the Panorama and Prisma Access master keys do not synchronize, Palo Alto Networks recommends that you do not automatically rotate the master key in Panorama without also synchronizing the master key in Prisma Access. You can use the Panorama UI or API commands to change the master keys.
Be sure to keep track of the master key you deploy because master keys cannot be recovered. When a master key expires, you must enter the current master key in order to configure a new master key. You must reset your Panorama appliance to factory default if you cannot provide the current master key when it expires.
1. Change the master key in Panorama .
1. Select PanoramaMaster Key and Diagnostics .
Do not specify a Current Master Key .
2. Configure the New Master Key and Confirm Master Key .
Make a note of the master key you configured.
3. Configure the master key Lifetime and Time for Reminder .
4. Click OK .
2. Change the master key for Prisma Access by selecting PanoramaCloud ServicesConfigurationService OperationsEdit master key , then entering the same master key you entered for Panorama.
You can also change the master key by using API commands. This requires two steps–one to change the Panorama master key and one to change the Prisma Access master key. Use the following API commands to change the master key:
1. Plan to enable the service infrastructure and service connections.
2. Enable the service infrastructure .
3. Create a service connection to allow access to your corporate resources .
If you don’t require access to your corporate resources, you should still create a service connection to enable access between mobile users and remote networks.
To set up GlobalProtect on Prisma Access (Managed by Panorama):
1. Configure zones for mobile users by creating two zones in the Mobile_User_Template (for example, Mobile-Users and Internet) and mapping the zones . You should map any zone that is not Prisma Access connected users or HQ or branch offices to Untrust.
Under PanoramaCloud ServicesConfigurationMobile Users , map Internet to Untrust; Mobile-Users to Trust.
2. Configure authentication.
We recommend using local authentication as a first step to verify that the service is set up and your users have internet access. You can later switch to using your corporate authentication methods.
3. Configure Security policies for the device group.
To create a Security policy to allow traffic to the Internet, select the Mobile_User_Device_Group PoliciesSecurityPrerulesAdd a rule. For example: Mobile-Users to Internet.
4. Commit and push your changes to get started with the service.
5. Select PanoramaCloud ServicesStatusMonitorMobile Users to view the Status and verify that you can ping the Portal FQDN.
6. Validate that Prisma Access is securing Internet traffic for mobile users by downloading and installing the GlobalProtect app , using the app to connect to the portal as a mobile user (local user), browsing to a few websites on the internet, and checking the traffic logs on Panorama.
To secure mobile users with an explicit proxy:
7. Read the Explicit Proxy Configuration Guidelines .
8. Configure SAML Authentication . SAML authentication is required for Explicit Proxy.
9. Set up Group Mapping using the Cloud Identity Engine .
10. Complete the Explicit Proxy configuration.
11. Commit and Push your changes.
1. Add one or more remote networks to Prisma Access.
You can onboard one location and then add additional locations using the bulk import capability.
2. Create a Security policy rule to allow traffic from the remote networks to HQ (For example: Trust to Trust).
3. Validate the connectivity between the service connection, remote network connection, and mobile users.
You add these addresses to an allow list on your organization’s network to limit inbound access to your enterprise network and applications.
1. Create an authentication profile that meets your organization’s requirements ( SAML , LDAP, RADIUS, etc).
2. If your organization uses an on-premises authentication server such as RADIUS or Active Directory, add the IP addresses that Prisma Access uses as its source IP address for internal requests ( Retrieve the IP Addresses for Prisma Access ) to allow lists in your network, or allow the IP addresses of the entire Infrastructure Subnet (Prisma Access takes the loopback IP address from this subnet).
3. Update the Authentication Profile for the Prisma Access portal and gateway to use this new authentication profile.
Prisma Access uses this subnet to create the network backbone for communication between your branch networks, mobile users and the Prisma Access security infrastructure, as well as with the HQ and data center networks you plan to connect to Prisma Access over service connections.
To enable communication between your remote network locations, mobile users, and the HQ or data centers that you plan on connecting to Prisma Access over service connections, set up the service infrastructure subnet. Prisma Access uses this subnet to create the network backbone for communication between your branch networks, mobile users and the Prisma Access security infrastructure, as well as with the HQ and data center networks you plan to connect to Prisma Access over service connections.
Before you can begin setting up Prisma Access to secure your remote networks and/or mobile users, you must configure an infrastructure subnet, which Prisma Access will use to create the network backbone for communication between your service connections, remote networks, and mobile users, as well as with the corporate networks you plan to connect to Prisma Access over service connections. Because a large number of IP addresses will be required to set up the infrastructure, you must use a /24 subnet (for example, 172.16.55.0/24) at a minimum. Be sure you follow all guidelines and requirements .
If you do not supply an AS number, the default AS number 65534 will be used.
When you enable a tenant as a pre-production or lab tenant, you can schedule upgrades for this tenant alone before upgrading other production tenants. The tenant receives notifications 24 to 48 hours before an upcoming upgrade.
When you disable the tenant from pre-production or lab tenant, it is considered as a production tenant.
Prisma Access for Clean Pipe does not support this functionality.
Use this step if you need Prisma Access to be able to resolve your internal domains to access services, such as LDAP servers, on your corporate network via service connections. For example, if you want a DNS lookup for your corporate domain to go exclusively to the corporate DNS server, specify the corporate domain and the corporate DNS servers here.
You can use a wildcard (*) in front of the domains in the domain list, for example *.acme.local or *.acme.com.
Do not enter a 127.0.0.1 address as it can cause Prisma Access internal routing issues.
The Cloud Services plugin automatically adds the following Log Settings ( DeviceLog Settings ) after a new installation or when removing non-Prisma Access templates from a Prisma Access template stack:
These Log Setting configurations automatically forward System, User-ID, HIP Match, and GlobalProtect logs to Strata Logging Service.
To apply log setting changes, perform the following steps, then commit and push your changes:
The way you enable log forwarding for other log types depends on the type. For logs that are generated based on a policy match, use a log forwarding profile. See the Strata Logging Service Getting Started Guide for more information.
If you use URLs in EDLs or custom URL categories and do not append a forward slash ( / ) to the URL, it is possible to allow more URLs than you intended. For example, entering example.com as a matching URL instead of example.com/ would also match example.com.website.info or example.com.br.
By selecting Append the ending token to the URLs in the URL filtering configuration , Prisma Access sets an ending token to URLs in EDLs or custom URL categories so that, if you enter example.com , Prisma Access treats it as it would treat example.com/ and only matches that URL.
If the majority of the traffic flows logged by the service connections are asymmetric, disabling service connection logging might be required to reduce the consumption of Strata Logging Service logging storage. If your deployment does not have asymmetric flows via the service connections, you do not need to disable logging.
Fast-Session Delete allows Prisma Access to reuse TCP port numbers before the TCP TIME_WAIT period expires, and can be useful for SSL decrypted sessions that may be short-lived.
For Mobile Users—Explicit Proxy deployments, Fast-Session delete is a key part of its functionality and you cannot disable it.
You can specify network preferences to use either your organization’s network, or the Prisma Access network, to process the service connection traffic.
Changing the Prisma Access service connection routing method requires a thorough understanding of your organization’s topology and routing devices, along with an understanding of how Prisma Access routing works. We recommend that you read Routing for Service Connection Traffic carefully before changing the routing method from default.
By default, the Prisma Access backbone requires that you have a symmetric network path for the traffic returning from the data center or headquarters location by way of a service connection. If you want to use ECMP or another load balancing mechanism for service connections from your CPE, you can enable asymmetric flows through the Prisma Access backbone.
Prisma Access removes the route in the following situations:
You cannot apply this change if tunnel monitoring is not enabled.
Prisma Access should automatically select the components that need to be committed.
If the status is Error , click the details link to view any errors.
After you set up your Prisma Access deployment, it is useful to know when IP addresses change so that you can pro-actively plan your infrastructure, retrieve the IP addresses, and add the required IP addresses to allow lists accordingly. The IP address changes can be the result of changes you made (for example, adding another mobile users location) or changes that Prisma Access performs automatically (for example, a large number of mobile users accesses a single Prisma Access gateway).
After you deploy Prisma Access for users for the first time, Prisma Access assigns two public and, if applicable, egress IP addresses for each portal and gateway. The public IP addresses are unique and not shared with any other Prisma Access deployment. If an IP address allocated to you by Palo Alto Networks remains unused for six months, it will be reclaimed. This includes IP addresses that were activated and then deactivated, and have remained deactivated for six months. For instance, if public IP addresses were allocated to your tenant for a specific location and that location was not enabled for six months, Prisma Access may reclaim those IP addresses. Similarly, if you onboarded and then deboarded a mobile user location, Palo Alto Networks can reclaim the IP address used for that location six months after deboarding.
If you have a multitenant setup, Prisma Access adds dedicated IP addresses for each tenant.
Since the public IP address is the source IP address used by Prisma Access for requests made to an internet-based destination, you may need to know what the public IP address are and add them to an allow list in your network to provide your users access to resources such as SaaS applications or publicly-accessible partner applications.
New public IP addresses can be added to the tenant if the following events occur:
To address the capacity requirement to service large number of users, Prisma Access may add one or more gateways, Prisma Access adds one or more gateways to accommodate the increased number of users, assigns one or more of the existing public IP addresses to the new gateway, and adds a new set of IP addresses to the mobile user locations to replace the ones that were used.
When you add more locations, Prisma Access adds another gateway and a new set of IP addresses for each new location you add.
Because Prisma Access enables more public IP addresses after a scaling event and after you add a location, you should add an IP change event notification URL , or use the API to retrieve mobile user addresses, to be notified of IP address changes in your Prisma Access infrastructure. You can then add any added or changed addresses to an allow list.
The following examples illustrate the mobile user public IP address allocation process that Prisma Access uses during a scaling event or when you add a new location.
In the following example, you specified two locations in the Asia Pacific region for a new mobile user deployment: Sydney and Seoul. Each location is given two gateway IP addresses.
Then a large number of users log in to the Seoul location. To accommodate these extra users, Prisma Access adds a second gateway for the Seoul location, takes one of the gateway addresses from the first Seoul gateway (51.1.1.4) and assigns it to the second Seoul gateway. It then adds two additional IP addresses (51.1.1.5 and 51.1.1.6 in this example) and adds them to the two Seoul gateways.
Then you add another location, Tokyo, in the Asia Pacific region. Prisma Access creates two new IP addresses for the new gateway (51.1.1.7 and 51.1.1.8).
Each time you add a location or have a scaling event, you should retrieve the new egress and gateway IP addresses that Prisma Access assigned and add them to an allow list in your network. Prisma Access keeps two sets of IP addresses at all times for all active gateways in each location.
Loopback addresses are IP addresses used by Prisma Access for requests made to an internal source and are assigned from the infrastructure subnet . Loopback IP addresses can change for mobile users during an infrastructure or dataplane upgrade.
Loopback IP addresses do not change for service connections or remote network connections during an infrastructure or dataplane upgrade; only mobile user loopback IP addresses can change.
Prisma Access allocates the loopback IP addresses from the infrastructure subnet that you specify when you enable the Prisma Access infrastructure . You can add the entire infrastructure subnet to an allow list and avoid planning for mobile user loopback IP changes during an infrastructure or dataplane upgrade. To find the infrastructure subnet, select:
Retrieve these addresses using the API used to retrieve public IP and loopback IP addresses.
The following example shows a Prisma Access deployment that has an infrastructure subnet of 172.16.0.0/16. Prisma Access has assigned loopback IP addresses 172.16.0.1 and 172.16.0.3 for mobile users from the infrastructure subnet.
After in infrastructure or dataplane upgrade (for example, to prepare for a new release of the Cloud Services plugin), Prisma Access assigns two different IP addresses for mobile users from the infrastructure subnet (172.16.0.1 is changed to 172.16.0.2 and 172.16.0.3 is changed to 172.16.0.4).
When you onboard a remote network , you associate it with an IPSec Termination Node , and each IPSec termination node has a Service IP Address associated with it. You use this address as the peer IP address for your CPE when you set up the IPSec tunnel for the remote network connection. Each termination node can provide you up to 1,000 Mbps of bandwidth. Associating more than 1,000 Mbps of bandwidth to a compute location provides you with more than one Service IP Address .
When you onboard a remote network in an Ireland compute location, you are given a choice of two IPSec termination nodes, because the total bandwidth is more than 1,000 Mbps.
Each IPSec termination node has its own Service IP Address , as can be seen in PanoramaCloud ServicesStatusNetwork DetailsRemote Networks .
This section applies if you have a legacy Prisma Access deployment that allocates bandwidth by location. Any new deployments allocate bandwidth by compute location; to learn about how Prisma Access allocates those IP addresses, see Remote Networks: IPSec Termination Nodes and Service IP Addresses .
The public IP addresses are unique and not shared with any other Prisma Access deployment. If an IP address allocated to you by Palo Alto Networks remains unused for six months, it will be reclaimed. This includes IP addresses that were activated and then deactivated, and have remained deactivated for six months. For instance, if public IP addresses were allocated to your tenant for a specific location and that location was not enabled for six months, Prisma Access may reclaim those IP addresses. Similarly, if you onboarded and then deboarded a mobile user location, Palo Alto Networks can reclaim the IP address used for that location six months after deboarding.
Take care when increasing the bandwidth of an existing connection, because the IP address of a remote network can change if that increase causes the bandwidth in a location to exceed 500 Mbps.
In addition, egress IP addresses can change if Prisma Access creates a new Prisma Access compute location and you decide to use this new compute location with locations you have already onboarded.
These bandwidth guidelines apply only when you upgrade an existing connection. A single remote network connection, even a 1000 Mbps (Preview) connection, always receives a single Service IP Address , regardless of its size.
The 1000 Mbps bandwidth option is in preview mode. The throughput during preview is delivered on a best-effort basis and the actual performance will vary depending upon the traffic mix.
The following example shows three remote network connections in the same location, each with a bandwidth of 150 Mbps. Since the total bandwidth is 500 Mbps, Prisma Access assigns a single IP address for all connections in the location.
The following example shows the bandwidth of remote network connection A being increased from 150 Mbps to 300 Mbps. Since the total bandwidth of all connections is now more than 500 Mbps, Prisma Access assigns a new service IP address for the connection with the additional bandwidth. The other service IP addresses remain unchanged.
Conversely, given four remote networks with a bandwidth of 100 Mbps, if you increase the bandwidth of one of the remote networks to 100 Mbps, the Service IP Address of that remote network does not change because the total bandwidth is now 500 Mbps.
If you reduce the bandwidth of a remote network connection, the Service IP Address does not change.
To find the service IP addresses in Panorama, select PanoramaCloud ServicesStatusNetwork Details tab and click the Remote Networks radio button to display the Service IP Address for the remote networks, or use the API script.
Prisma Access has more than 100 locations available to accommodate worldwide deployments and provide a localized experience. Two locations might map to the same , which you use as the peer IP address when you set up the IPSec tunnel for the remote network connection. However, the locations might use different egress IP addresses to make sure that the user gets the correct default language for the region.
Service connections do not support language localization because egress to the internet is not supported over service connections. Prisma Access allocates only one service IP address per service connection, and that IP address is geographically registered to the compute location that corresponds to the location you specify during onboarding.
The following example shows a customer deployment with two remote network locations deployed in Canada: Central Canada and Canada East. Prisma Access assigned the same Service IP Address to both locations. When you configure the remote network tunnel, use this IP address as the peer IP address when you create the IPSec tunnel for the remote network connection.
However, Canada East uses a different default language (French) than Central Canada (English). For this reason, Prisma Access assigns them different egress IP addresses. If you run the API script for egress IP addresses, you will receive two different IP addresses for these two locations.
If you are manually adding IP addresses of your Prisma Access infrastructure to an allow list in your network, or if you're using an automation script to enforce IP-based restrictions to limit inbound access to enterprise applications, you should understand what these addresses do and why you need to allow them, as well as the tasks you perform to retrieve them.
Prisma Access does not provision these IP addresses until after you complete your Prisma Access configuration. After your deployment is complete, you retrieve these IP addresses using an API script. The API script uses an API key that you obtain from the Prisma Access UI and a .txt file you create which specifies the addresses you want to retrieve.
While you don't perform these tasks until after you complete your Prisma Access configuration, it's useful to understand these concepts in advance, so you understand what to do after your deployment is complete.
The public IP addresses are unique and not shared with any other Prisma Access deployment. If an IP address allocated to you by Palo Alto Networks remains unused for six months, it will be reclaimed. This includes IP addresses that were activated and then deactivated, and have remained deactivated for six months. For instance, if public IP addresses were allocated to your tenant for a specific location and that location was not enabled for six months, Prisma Access may reclaim those IP addresses. Similarly, if you onboarded and then deboarded a mobile user location, Palo Alto Networks can reclaim the IP address used for that location six months after deboarding.
If you are manually adding IP addresses of your Prisma Access infrastructure to an allow list in your network, or if you are using an automation script to enforce IP-based restrictions to limit inbound access to enterprise applications, you should understand what these addresses do and why you need to allow them, as well as the tasks you perform to retrieve them.
Prisma Access does not provision these IP addresses until after you complete your Prisma Access configuration. After your deployment is complete, you retrieve these IP addresses using an API script. The API script uses an API key that you obtain from the Prisma Access UI and a .txt file you create which specifies the addresses you want to retrieve.
If you have a Mobile Users—GlobalProtect deployment, you can use the Prisma Access UI instead of this API to manage public IP address allocation and confirm that the IP addresses have been added to your allow lists before Prisma Access releases the IP addresses. In this way, Prisma Access only provisions the IP addresses that you have allow listed.
The following table provides you with a list of the IP address that Prisma Access uses for each deployment type, along with the keyword you use when you run the API script to retrieve the IP addresses, and describes whether or not you should add them to your organization’s allow lists.
Deployment Type |
IP Address Type |
Description |
Mobile Users—GlobalProtect |
Prisma Access gateway ( gp_gateway ) |
Gateway IP addresses. You must add both gateway and portal IP addresses to allow lists for your mobile user deployments. Mobile users connect to a Prisma Access gateway to access internal or internet resources, such as SaaS or public applications, for which you have provided access. For mobile users, during initial deployment, Prisma Access assigns two IP addresses for each location you deploy. |
Prisma Access portal ( gp_portal ) |
Portal IP addresses. You must add both gateway and portal IP addresses to allow lists for your mobile user deployments. Mobile users log in to the Prisma Access portal to receive their initial configuration and gateway location. |
|
Network Load Balancer ( network_load_balancer ) |
Ingress IP addresses ( IP Optimization deployments only). |
|
Loopback IP addresses |
The source IP address used by Prisma Access for requests made to an internal source, and is assigned from the Configure the Prisma Access Service Infrastructure (Panorama) . Add the loopback IP address to an allow list in your network to give Prisma Access to internal resources such as RADIUS or Active Directory authentication servers. Palo Alto Networks recommends that you allow all the IP addresses of the entire infrastructure subnet in your network, because loopback IP addresses can change. To find the infrastructure subnet, select PanoramaCloud ServicesStatusNetwork DetailsService Infrastructure . The subnet displays in the Infrastructure Subnet area. To retrieve loopback IP addresses, use the legacy API script . |
|
Mobile Users—Explicit Proxy |
Authentication Cache Service (ACS) |
The address for the Prisma Access service that stores the authentication state of the explicit proxy users. This address is only used for explicit proxy for mobile users . |
Network Load Balancer |
The address that Prisma Access uses for the network load balancer. |
|
Remote Network |
Remote Network IP addresses ( remote_network ) |
The Service IP Addresses that Prisma Access assigns for the Prisma Access remote network connection, and Remote Networks: Service IP Address and Egress IP Address Allocation that Prisma Access uses to make sure that remote network users get the correct default language for their region. Add these addresses to allow lists in your network to give Prisma Access to internet resources. |
Loopback IP addresses |
The source IP address used by Prisma Access for requests made to an internal source, and is assigned from the Configure the Prisma Access Service Infrastructure (Panorama) . Add the loopback IP address to an allow list to give Prisma Access to internal resources such as RADIUS or Active Directory authentication servers. To retrieve loopback IP addresses, use the legacy API script . |
|
Clean Pipe |
Clean Pipe IP Addresses ( clean_pipe ) |
Add these IP addresses to an allow list to give the Clean Pipe service access to internet resources. |
Loopback IP addresses |
The source IP address used by Prisma Access for requests made to an internal source, and is assigned from the Configure the Prisma Access Service Infrastructure (Panorama) . Add the loopback IP address to an allow list to give Prisma Access to internal resources such as RADIUS or Active Directory authentication servers. To retrieve loopback IP addresses, use the legacy API script . |
Prisma Access provides an API script that you can use to retrieve the public and private IP addresses it uses in its infrastructure. If you need to add public IP addresses to allow lists in your organization’s network, use the following steps to retrieve these IP addresses with the API script.
This command does not retrieve loopback addresses; to retrieve loopback IP addresses, use the legacy API .
You need this key to authenticate to Prisma Access and retrieve the list of IP addresses using the API command. Only a Panorama administrator or Superuser can generate or access this API key.
If you have already generated an API key, the Current Key displays. If you haven’t yet generated a key or want to replace the existing key to meet audit or compliance check for key rotation, click Generate New API Key for a new key.
Using the API the command to use is a two-step process. First, you create a .txt file, specifying the parameters for the IP addresses to retrieve, and save the file in a folder that is reachable from the location where you run the command. Then, you run the API and specify the name and location of the .txt file you created in the command.
Specify the following keywords and arguments in the .txt file. See API Examples for Retrieving Prisma Access IP Addresses for examples. The examples in this document use a file name of option.txt but you can specify any file name, as long as you reference it in the command.
Argument |
Possible choices (keywords) |
Comments |
serviceType |
all remote_network gp_gateway gp_portal clean_pipe swg_proxy rbi |
all —Retrieves IP addresses you need to add to an allow list for all service types (Remote Networks, Mobile Users (both gateways and portals), and Clean Pipe, as applicable to your deployment). remote_network —Retrieves IP addresses you need to add to an allow list for remote network deployments. gp_gateway —Retrieves the Mobile Users—GlobalProtect gateway IP addresses you need to add to an allow list for mobile user deployments. gp_portal —Retrieves the Mobile Users—GlobalProtect portal IP addresses you need to add to an allow list for mobile user deployments. clean_pipe —Retrieves the IP addresses you need to add to an allow list for clean pipe deployments. swg_proxy —Retrieves the egress IP addresses for each deployed Explicit Proxy location and the authentication cache service (ACS). rbi —Retrieves the egress IP addresses you need to add to an allow list for Remote Browser Isolation (RBI) deployments to connect to SaaS Applications. |
addrType |
all active service_ip auth_cache_service network_load_balancer |
all or active —Retrieves all the IP addresses you need to add to an allow list. This API does not retrieve loopback IP addresses. To retrieve loopback IP addresses, use the legacy API . service_ip —Retrieves the Service IP Address , which you use as the peer IP address when you set up the IPSec tunnel for the remote network connection. auth_cache_service —Retrieves the IP address for the explicit proxy ACS (applicable to Explicit Proxy deployments only). network_load_balancer —Retrieves the IP addresses for the network load balancer (applicable to Mobile Users—GlobalProtect with IP Optimization enabled and Mobile Users—Explicit Proxy deployments). If you have implemented IP Optimization (available with Prisma Access 5.0 and later), be sure you review the allow listing considerations and how to implement the gp_gateway and network_load_balancer IP addresses in your Mobile Users—GlobalProtect deployment. |
actionType |
pre_allocate |
Mobile User deployments only —An actionType of pre_allocate allows you to retrieve IP addresses or subnets for Prisma Access gateways and portals for mobile user deployments. Use this with a serviceType of gp_gateway to retrieve pre-allocated gateway IP addresses and a serviceType of gp_portal to retrieve pre-allocated portal IP addresses. Retrieving the pre-allocated IP addresses lets you add the gateway and portal IP addresses to your organization’s allow lists before you onboard mobile user locations, which in turn gives mobile users access to external SaaS apps immediately after you onboard the locations. |
location |
all deployed |
all —Retrieves the IP addresses from all locations. For mobile user deployments, this keyword retrieves the IP addresses for both locations you added during onboarding, and locations you did not add. deployed —Retrieves IP addresses in all locations that you added during mobile user onboarding. This keyword is applicable to mobile user deployments only. Prisma Access associates IP addresses for every mobile user location during provisioning, even if you didn’t select that location during mobile user onboarding . If you specify all , the API command retrieves the IP addresses for all mobile user locations, including ones you didn’t select for the deployment. If you specify deployed , the API command retrieves only the IP addresses for the locations you selected during onboarding. |
Specify the options in the .txt file in the following format:
 {
  "serviceType": "service-type", Â
  "addrType": "address-type",
  "location": "location"
  }
 curl -X POST --data @option.txt -H header-api-key:Current-API-Key "https://api.prod.datapath.prismaaccess.com/getPrismaAccessIP/v2"
As of May 2023, some Panorama managed deployments use https://api.prod6.datapath.prismaaccess.com/getPrismaAccessIP/v2 (note the prod6 in the URL instead of prod).
 curl -X POST --data @option.txt -k -H header-api-key:Current-API-Key "https://api.gpcloudservice.com/getPrismaAccessIP/v2"
If the API returns multiple IP addresses, Prisma Access summarizes the IP addresses in the addresses field.
If there are any problems with the options in the .txt file, the API returns an error similar to the following:
 {"status": "error","result": "Invalid json format in the request. trace_id: xxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx "}
IP Optimization is a set of architectural enhancements that reduce the overall number of IP addresses in your deployment, simplifying your allow listing workflows while improving resiliency and enabling faster onboarding of Prisma Access tenants.
It's a best practice to
retrieve the egress and ingress IP addresses
that Prisma Access assigns and in your network to avoid SaaS application or corporate firewall disruption. This can result in a situation where you're managing a large number of IP addresses. IP Optimization reduces the number of IP addresses you have to manage.
Make a note of the following additional requirements for IP Optimization:
Allow Listing Considerations for IP Optimization Deployments
When you use the API to retrieve Prisma Access IP addresses for IP Optimization, there are two sets of IP addresses you need to add:
On a firewall, zones are associated with interfaces. But within Prisma Access, the networking infrastructure is automatically set up for you. This means that you no longer need to worry about configuring interfaces and associating them with the zones your create. However, to enable consistent security policy enforcement, you must create zone mappings so that Prisma Access will know whether to associate a zone with an internal (trust) interface or an external (untrust) interface. This will ensure that your security policy rules are enforced properly. By default, all of the zones you push to Prisma Access are set to untrust. You should leave any zones associated with internet-bound traffic, including your sanctioned SaaS applications, set to untrust. However, for all zones that enable access to applications on your internal network or in your data center, you must map them to trust. Notice in the example below, all sanctioned SaaS applications—Office 365 and Salesforce in this case—are segmented into the sanctioned-saas zone to enable visibility and policy enforcement over the use of these applications. To enable Prisma Access to associate the sanctioned-saas zone with an external-facing interface, you must map this zone to untrust. Similarly, the eng-tools and dc-apps zones provide access to applications in the corporate office and you must therefore designate them as trusted zones.
Prisma Access supports three zones (trust, untrust, and Clientless VPN) and simplifies policy creating by setting them up for you.
Zone |
Description |
Trust |
Zone containing all trusted and on-boarded IP addresses, service connections, or mobile users within the corporate network. |
Untrust |
All untrusted IP addresses, service connections, or mobile users outside of the corporate network. By default, any IP address or mobile user that is not trusted is inherently untrusted. |
Clientless VPN |
Secure remote access to common enterprise web applications that use HTML, HTML5, and Javascript technologies. Users have the advantage of secure access from SSL-enabled web browsers without installing client software. This is useful when you need to enable partner or contractor access to applications, and to safely enable unmanaged assets, including personal devices. The zone for Clientless VPN is mapped to the trust zone by default; this setting cannot be changed. |
Prisma Access logs that display a zone of inter-fw are logs used for communication within the Prisma Access infrastructure.
When creating zones, do not use any of the following names for the zones, because these are names used for internal zones:
Prisma Access logs that display a zone of inter-fw are logs used for communication within the Prisma Access infrastructure.
Prisma Access allows you to specify DNS servers to resolve both domains that are internal to your organization and external domains. Do this to provide access to services on your corporate network—like LDAP and DNS servers—especially if you plan to set up service connections to provide access to these type of resources at HQ or in data centers. Prisma Access supports DNS resolution for mobile users- Global Protect and remote networks deployments . DNS queries for domains in the Internal Domain List are sent to your local DNS servers to ensure that resources are available to Prisma Access remote network users and mobile users.
For example, if you want a DNS lookup for your corporate domain to go exclusively to the corporate DNS server, specify the corporate domain and the corporate DNS servers here. To ensure that endpoints use the DNS Proxy IP Address , they must be configured to resolve DNS via the IP address shown in WorkflowPrisma Access SetupPrisma AccessPrisma Access DNS Proxy IP Address .
Set up Prisma Access to resolve internal domains.
You can use a wildcard (*) in front of the domains in the domain list, for example *.acme.local or *.acme.com.
Prisma Access has a predefined rule to resolve *.amazonaws.com domains using the Cloud Default server. If you want your internal DNS servers to resolve a more-specific *.amazonaws.com domain (for example, *.s3.amazonaws.com), enter the URL in the Domain List. Prisma Access evaluates the domain names from longest to shortest, then from top to boom in the list.
The DNS proxy in Prisma Access sends the requests to the DNS servers you specify. The source address in the DNS request is the first IP address in the IP pool you assign to the region. To ensure that your DNS requests can reach the servers you will need to make sure that you allow traffic from all addresses in your mobile user IP address pool to your DNS servers.
Deploying Panorama appliances in a high availability (HA) configuration provides redundancy in case of a system or network failure and ensures that you have continuous connectivity to Prisma Access. In an HA configuration, one Panorama appliance peer is the active-primary and the other is the passive-secondary. In the event of a failover, the secondary peer becomes active and takes over the role of managing Prisma Access.
To simplify the HA set up, configure the Panorama appliances in HA after you purchase Prisma Access and Strata Logging Service auth codes and components and associate the serial number of the primary Panorama appliance on which you plan to install the Cloud Services plugin with the auth codes, but before you activate and install Panorama Managed Prisma Access . However, you can also use this process to configure existing Panorama appliances that already have the plugin installed.
Whether you are just getting started with a new pair of Panorama appliances, or you have already set up your standalone Panorama appliance and completed the licensing and installation procedures, make sure to check the prerequisites before you enable HA:
If you disable HA for a Panorama pair and revert to a configuration where a single Panorama manages Prisma Access, you must re-verify your account to prevent errors when retrieving the status of Prisma Access components.
To set up your Panorama appliances in an HA configuration, complete the following steps.
Set the primary Panorama appliance as Primary and the secondary Panorama appliance as Secondary and be sure that the serial number of your primary Panorama appliance is tied to your Prisma Access and Strata Logging Service auth codes.
tail follow yes mp-log plugin_cloud_services.log
2017-11-06 15:14:17.596 -0800 INFO: [hainfo] Cached HA Peer's serial number <varname>Y</varname>
The Auth Code, Model Name, License Description, and Expiration Date fields should be the same for the primary and secondary Panorama appliance, because Palo Alto Networks has associated the Prisma Access license automatically to the secondary Panorama appliance.
When you log in to the Customer Support Portal (CSP) to generate the OTP, make sure that you specify the serial number for the secondary Panorama appliance.
Prisma Access includes predefined IPSec templates for common third-party IPSec and SD-WAN devices. These profiles expedite and simplify the onboarding of service connections and remote network connections that use one of these devices to terminate the connection.
Sharing a common template also allows you to onboard multiple remote connections of the sane type with commonly-shared cryptos, pre-shared keys, and Peer identifiers.
Prisma Access provides you with the following predefined templates that you can use to set up IPSec tunnels between your on-premises device and Prisma Access:
Currently, templates for the following vendors are available:
In addition to the following templates, we provide a Generic template that you can use with any on-premises device that is not listed here.
To onboard a service connection or remote network connection using the templates provided by Prisma Access, complete the following task.
When you upgrade the Cloud Services plugin, the new templates do not automatically display. Complete this step once after upgrading to have the templates permanently display. New installations perform this initial configuration as part of their first-time setup and this extra step is not required.
You can also complete this step if you delete these templates and need to retrieve them.
creating a remote network connection
or Service_Conn_Template if you are creating a service connection).
If your SD-WAN or IPSec device is not on the list, use the generic profiles.
You can use the IPSec crypto and IKE crypto profiles with no changes; however, you must make specific changes to the IKE gateway profile to match the network settings.
Be sure that you match the settings you specify here when you configure the device used to terminate the other side of the IPSec tunnel.
Configuring a Secondary WAN is not supported in the following deployments:
3. Create a new IKE Gateway for the backup tunnel, copying the settings from the predefined template you want to duplicate.
The following example creates a backup tunnel configuration for generic networking devices.
4. Under Advanced Options , specify the IKE Crypto Profile for the predefined template you want to use.
Palo Alto Networks recommends that you use GCM ciphers instead of CBC ciphers for IPSec tunnels.
If you are onboarding a Prisma SD-WAN, select Enable Passive Mode .
5. Create a new IPSec Tunnel , specifying the new IKE gateway you created, but copying all the other settings from the default template.
6. When you onboard the service connection or remote network connection, Enable Secondary WAN and specify the tunnel you created for the backup WAN.
A service connection, also known as a Corporate Access Node (CAN), allows mobile users and users at remote networks access to private apps and resources and lets your mobile users and remote networks communicate with each other.
In addition to Service Connections, Palo Alto Networks provides you with other services you can use to access private apps:
Palo Alto Networks recommends always creating a service connection in your Prisma Access deployment. All service connections have these characteristics:
Expand all
Collapse all
The number of service connections you receive depends on your Prisma Access license.
Expand all
Collapse all
Before you can start configuring your service connections, review what information you need to gather first .
Create service connections to allow Prisma Access to perform the following tasks:
Expand all
Collapse all
Gather this HQ or Data Center Information
Before you begin to configure a service connection , gather the following information for each of your HQ or data centers to which you want Prisma Access to be able to connect.
No need to gather this information if you are creating a service connection only to allow mobile users to access remote network locations.
For Prisma Access (Managed by Strata Cloud Manager) and Prisma Access (Managed by Panorama) Service Connections:
If you have an existing template that contains IPSec tunnel, Tunnel Monitoring, and IPSec Crypto Profile configurations, you can add that template to the template stack to simplify the process of creating the IPSec tunnels. Or, you can edit the Service_Conn_Template that gets created automatically and create the IPSec configurations required to create the IPSec tunnel back to the corporate site. Prisma Access also provides you with a set of predefined IPSec templates for some commonly-used network devices, and a generic template for any device that is not included in the predefined templates.
Make sure that this address is reachable by ICMP from the entire Prisma Access infrastructure subnet.
Make the entire service infrastructure subnet reachable from the HQ or data center. Prisma Access uses IP addresses for all control plane traffic from this subnet.
For Prisma Access Panorama Service Connections Only:
This information is only required when planning Service Connections in Prisma Access (Managed by Panorama) .
In order for Prisma Access (Managed by Panorama) to route users to the resources they need, you must provide the routes to the resources. You can do this in one or more of the following ways:
Configure a Service Connection in Prisma Access
Use a Service Connection to Enable Access between Mobile Users and Remote Networks
Where Can I Use This? |
What Do I Need? |
|
|
Create service connections to allow Prisma Access to perform the following tasks:
Expand all
Collapse all
To configure a service connection for Prisma Access Panorama to allow access to private apps or internal corporate resources, complete the following steps.
Do not use CLI to onboard and configure service connections. If you require the use of CLI to onboard service connections, reach out to your Palo Alto Networks team.
See this section for a list of Prisma Access locations.
Locations denoted with two asterisks are Local Zones . These locations place compute, storage, database, and infrastructure services close to large population and industry centers; however, they also have some limitations . To add a local zone, reach out to your Palo Alto Networks representative.
Expand all
Collapse all
You can select any service connection that you have already added. Prisma Access uses the Backup SC you select as the preferred service connection in the event of a link failure. Selecting a backup service connection can prevent asymmetric routing issues if you have onboarded more than two service connections. This choice is available in hot potato routing mode only.
If the primary WAN link goes down, Prisma Access detects the outage and establishes a tunnel to the headquarters or data center location over the secondary WAN link. If the primary WAN link becomes active, the link switches back to the primary link.
Configuring a secondary WAN isn't supported in the following deployments:
If you use static routes, tunnel failover time is less than 15 seconds from the time of detection, depending on your WAN provider.
If you configure BGP routing and have enabled tunnel monitoring, the shortest default hold time to determine that a security parameter index (SPI) is failing is the tunnel monitor, which removes all routes to a peer when it detects a tunnel failure for 15 consecutive seconds. In this way, the tunnel monitor determines the behavior of the BGP routes. If you do not configure tunnel monitoring, the hold timer determines the amount of time that the tunnel is down before removing the route. Prisma Access uses the default BGP HoldTime value of 90 seconds as defined by RFC 4271, which is the maximum wait time before Prisma Access removes a route for an inactive SPI. If the peer BGP device has a shorter configured hold time, the BGP hold timer uses the lower value.
When the secondary tunnel is successfully installed, the secondary route takes precedence until the primary tunnel comes back up. If the primary and secondary are both up, the primary route takes priority.
If you use a different BGP peer for the secondary (backup) connection, Prisma Access does not honor the Multi-Exit Discriminator (MED) attributes advertised by the CPE. This caveat applies if you use multiple BGP peers on either remote network connections or service connections.
You can specify a subnet at one or more service connections that are used to NAT traffic between Prisma Access GlobalProtect mobile users and private applications and resources at a data center.
User-ID Redistribution Management —Sometimes, granular controls are needed for user-ID redistribution in particularly large scale Prisma Access deployments. User-ID Redistribution Management lets you manually disable the default identity redistribution behavior for certain service connections by removing the check mark in the User ID column, and then select specific service connections to be used for identity redistribution. It's not necessary to do this for most configurations. Contact Palo Alto Networks support to activate this functionality.
Use a private IP (RFC 1918) subnet or a suitable subnet that is routable in your routing domain, and does not overlap with the Mobile Users—GlobalProtect IP address pool or the Infrastructure subnet. Enter a subnet between /25 and /32.
Prisma Access uses this information to route requests to the appropriate site. The networks at each site can't overlap with each other or with IP address pools that you designated for the service infrastructure or for the Prisma Access for Users IP pools. You can configure Static Routes , BGP , or a combination of both.
To configure Static Routes :
1. On the Static Routes tab, click Add and enter the subnetwork address (for example, 172.168.10.0/24) or individual IP address of a resource, such as a DNS server (for example, 10.32.5.1/32) that your remote users will need access to.
2. Repeat for all subnets or IP addresses that Prisma Access will need access to at this location.
To configure BGP :
3. On the BGP tab, select Enable .
When you enable BGP, Prisma Access sets the time-to-live (TTL) value for external BGP (eBGP) to 8 to accommodate any extra hops that might occur between the Prisma Access infrastructure and your customer premises equipment (CPE) that terminates the eBGP connection.
Prisma Access does not accept BGP default route advertisements for either service connections or remote network connections.
4. ( Optional ) Select from the following choices:
Don't use this capability in hot potato routing mode.
By default, Prisma Access advertises all BGP routing information, including local routes and all prefixes it receives from other service connections, remote networks, and mobile user subnets. Select this check box to prevent Prisma Access from sending any BGP advertisements, but still use the BGP information it receives to learn routes from other BGP neighbors.
Since Prisma Access does not send BGP advertisements if you select this option, you must configure static routes on the on-premises equipment to establish routes back to Prisma Access.
By default, Prisma Access advertises the mobile users IP address pools in blocks of /24 subnets ; if you summarize them, Prisma Access advertises the pool based on the subnet you specified. For example, Prisma Access advertises a public user mobile IP pool of 10.8.0.0/20 using the /20 subnet, rather than dividing the pool into subnets of 10.8.1.0/24, 10.8.2.0/24, 10.8.3.0/24, and so on, before advertising them. Summarizing these advertisements can reduce the number of routes stored in CPE routing tables. For example, you can use IP pool summarization with cloud VPN gateways (Virtual Private Gateways (VGWs) or Transit Gateways (TGWs)) that can accept a limited number of routes.
If you have hot potato routing enabled and you enable route summarization, Prisma Access no longer prepends AS-PATHs, which might cause asymmetric routing. Be sure that your return traffic from the data center or headquarters location has guaranteed symmetric return before you enable route summarization with hot potato routing.
5. ( Optional ) Select an MRAI timer value.
BGP routing offers a timer you can use to tailor BGP routing convergence in your network called the Minimum Route Advertisement Interval (MRAI) . MRAI acts to rate-limit updates on a per-destination basis, and the BGP routers wait for at least the configured MRAI time before sending an advertisement for the same prefix. A smaller number gives you faster convergence time but creates more advertisements in your network. A larger number decreases the number of advertisements that can be sent, but can also make routing convergence slower. You decide the number to put in your network for the best balance between faster routing convergence and fewer advertisements.
Configure an MRAI range of between 1 and 600 seconds, with a default value of 30 seconds.
6. Enter the IP address assigned as the Router ID of the eBGP router on the data center/HQ network for which you're configuring this service connection as the Peer Address .
7. Enter the Peer AS , which is the autonomous system (AS) to which the firewall virtual router or BGP router at your data center/HQ network belongs.
8. ( Optional ) Enter an address that Prisma Access uses as its Local IP address for BGP.
Specifying a Local Address is useful where the device on the other side of the connection (such as an Amazon Web Service (AWS) Virtual Private Gateway) requires a specific local IP address for BGP peering to be successful. Make sure that the address you specify does not conflict or overlap with IP addresses in the Infrastructure subnet or subnets in the service connection.
You must configure a static route on your CPE to the BGP Local Address .
If you use IPV6 support for your service connection , you can configure IPv6 addresses as well as IPv4 addresses. You also need to enable IPv6 networking globally in your Prisma Access infrastructure before you can use IPv6 addressing.
9. ( Optional ) Enter and confirm a Secret passphrase to authenticate BGP peer communications.
In some deployments (for example, when using BGP to peer with an AWS VPN gateway ), the BGP peer for the primary and secondary WAN might be different. In those scenarios, you can choose to set a different BGP peer for the secondary WAN.
For BGP deployments with secondary WANs, Prisma Access sets both the primary and secondary tunnels in an UP state, but follows normal BGP active-backup behavior for network traffic. Prisma Access sets the primary tunnel as active and sends and receives traffic through that tunnel only; if the primary tunnel fails, Prisma Access detects the failure using BGP rules, sets the secondary tunnel as active, and uses only the secondary tunnel to send and receive traffic.
You can create QoS Profiles to shape QoS traffic for remote network and service connections and apply those profiles to traffic that you marked with PAN-OS security policies, traffic that you marked with an on-premises device, or both PAN-OS-marked and on-premises-marked traffic. See QoS for Remote Networks for details.
1. ( Optional ) Disable Traffic Logging on Service Connections to disable logging on the service connections for your Prisma Access deployment.
If the majority of the traffic flows logged by the service connections are asymmetric, disabling service connection logging might be required to reduce the consumption of Strata Logging Service logging storage. If your deployment does not have asymmetric flows via the service connections, you don't need to disable logging.
1. Click CommitCommit and Push .
2. Edit Selections and, in the Prisma Access tab, make sure that Service Setup is selected in the Push Scope , then click OK .
3. Click Commit and Push .
1. To determine the IP address of the tunnel within Prisma Access, select PanoramaCloud ServicesStatusNetwork Details , click the Service Connection radio button, and note the Service IP Address for the site.
The Service IP Address is the public-facing address that you will need to connect to when you create the tunnel from your IPSec-capable device back to the service connection.
2. On your IPSec-capable device at the corporate location, configure an IPSec tunnel that connects to the Service IP Address within Prisma Access and commit the change on that device so that the tunnel can be established.
To verify that the service connection has been successfully set up, select Panorama > Cloud Services > Status > Status and check that the Status is OK .
If you created a service connection with placeholder values to enable communication between mobile users and users at remote networks, you do not need to verify the service connection status.
The Deployment Status area allows you to view the progress of onboarding and deployment jobs before they complete, as well as see more information about the status of completed jobs.
If the status is not OK , hover over the Status icon to view any errors.
To see a graphical representation of the service connection along with status details, select Service Connection on the Monitor tab.
Select a region to get more detail about that region.
Click the tabs below the map to see additional information about the service connections.
Status tab:
This number does not reflect the available service connection bandwidth.
While each service connection provides approximately 1 Gbps of throughput, the actual throughput is dependent on several factors, including:
This field will also show if the BGP connection is in an error state:
Statistics tab:
If you configured BGP, you can check its status by selecting PanoramaCloud ServicesStatusNetwork DetailsService ConnectionShow BGP Status .
The BGP Status dialog displays. This table provides you with the following information:
Note that only the first 256 entries are shown. To view additional entries, enter a subnet or IP address in the Filter field and click Apply Filter to view a subset of the routing entries up to a maximum of 256.
To configure a service connection to connect mobile users and remote networks, Add a service connection using the following values:
Since Prisma Access doesn’t route any traffic through this tunnel, any value that does not conflict or overlap with other configured subnets is valid.
The following example shows a Prisma Access deployment with mobile users in different geographical areas and remote networks. The remote network connections are connected in a mesh network in the Prisma Access infrastructure, but the mobile users cannot connect to the remote networks. In addition, the mobile users in different geographic areas cannot connect to each other without a service connection.
After you add a service connection, the service connection connects the mobile users and the remote networks in a hub-and-spoke network.
Another case where a service connection of this type is useful is when the service connection is far from the mobile users. The following figure shows an example of this network deployment.
Adding a second service connection that is closer to the mobile users creates a more efficient network between the mobile users and remote networks.
How It Works — Routing Service Connection Traffic
Prisma Access uses BGP for dynamic routing, and uses BGP path selection to install routes in the route table. When Prisma Access routes traffic to your headquarters or data center using service connections, it uses routing methods that direct that traffic effectively. Prisma Access uses a default routing model that was designed to fit the majority of network deployments; however, not all organization’s networks are the same. To fit a wider range of deployments, Prisma Access allows you choose another mode for service connection routing. The following sections describe the BGP routing methods that Prisma Access uses, along with the factors you need to consider in your organization’s network before changing Prisma Access’ default method of service connection routing.
Changing the Prisma Access service connection routing method requires a thorough understanding of your organization’s topology and routing devices, along with an understanding of how Prisma Access routing works as described in this section. We recommend that you read this section carefully before changing the routing method from the default setting.
Prisma Access supports static routing and dynamic routing using BGP for service and remote network connections; this section assumes that you use BGP routing for your Prisma Access deployments. When you select BGP routing, your organization’s network learns BGP information from Prisma Access.
Routing Modes for Service Connections
You can choose from the following routing modes with Prisma Access:
Use this routing mode if you want Prisma Access to use BGP best path-selection mechanisms without adjusting any of the BGP attributes. In this mode, Prisma Access will honor any attribute advertised by the customer premises equipment (CPE).
Use this routing method if you want your organization’s network to perform the majority of routing decisions.
Prisma Access Default Routing
The following figure shows an example of Prisma Access routing service connection traffic in default routing mode. The organization’s network has three separate networks in three data centers and does not have a backbone connecting the networks. In default routing mode, mobile user pools are advertised equally on the three networks, as shown at the bottom of the figure.
Note that, when Prisma Access advertises mobile user routes, it before advertising them; thus, it advertises the /20 mobile user subnets in chunks of /24 as prefixes are consumed by the gateways.
Make a note of how Prisma Access uses BGP route advertisements:
The following figure shows a more common network with a full-mesh eBGP backbone. The figure shows the routes that Prisma Access has learned from your organization’s network on the top right. Note the extra routes that Prisma Access has learned through the Prisma Access backbone (iBGP) and your organization’s backbone (eBGP).
For traffic between mobile users in the North America & South America region (US in the diagram) and the data center in your organization’s Africa, Europe & Middle East region (EU in the diagram), Prisma Access chooses the path through the EU service connection because it prefers routes with a shorter AS-PATH.
In deployments with a full-mesh eBGP backbone, asymmetry can arise when Prisma Access cannot reach a particular data center due to an ISP/CPE failure at the customer’s data center. The following figure shows what could happen when the link to the EU service connection goes down. Your network detects the link failure and builds a new route table for AS 200. Traffic from the US service connection to AS 200 uses the path through AS 100 because the eBGP route for your backbone between AS 200 and AS 100 is preferred to the iBGP route between service connections EU and US. However, return traffic is not guaranteed through the same path because the on-premises CPE can choose either path (shown in red) to return the traffic.
The previous examples show a network whose routes have not been aggregated (that is, you have not performed route summarization before you send the BGP route advertisements to Prisma Access). The following example shows a network that summarizes its routes to 10.0.0.0/8 before sending to Prisma Access. If you select default routing, this configuration can lead to asymmetric routing issues, because Prisma Access cannot determine the correct return path from the summarized routes.
If your Prisma Access deployment has Remote Networks, Palo Alto Networks does not recommend the use of route summarization on Service Connections. Route summarization on service connections is for Mobile Users deployments only.
If you use route aggregation for mobile users, we strongly recommend that you enable hot potato routing instead of default routing, where Prisma Access hands off the traffic as quickly as possible to your organization’s network. In addition, we recommend that you select a Backup SC as described in the following section for each service connection to have a deterministic routing behavior.
Hot Potato Routing
When you select Hot Potato Routing , Prisma Access egresses the traffic bound to service connections/data centers from its internal network as quickly as possible.
With hot potato routing, Prisma Access prepends the AS path (AS-PATH) to the BGP prefix advertisements sent from gateways. This prepending is performed when the prefixes are advertised out of the service connection to your organization’s on-premises CPE. Prisma Access prepends the AS-PATHs so that your CPE gives the correct preference to the primary and secondary tunnels, so that if the primary tunnel goes down, your CPE chooses the secondary tunnel as the backup.
If you specified a different IP address for the secondary (backup) BGP peer, Prisma Access adds more prepends based on the tunnel type, as shown in the following table.
Prefix Type |
Service Connection Tunnel Type |
Number of As-Path Prepends |
Total AS-PATHs Seen on the CPE |
Gateway prefixes from primary service connection |
Primary or Secondary tunnel with the same BGP peer IP address |
0 |
1 |
Gateway prefixes from backup service connection |
Primary or Secondary tunnel with the same BGP peer IP address |
3 |
4 |
Gateway prefixes from all other service connections |
Primary or Secondary tunnel with the same BGP peer IP address |
6 |
7 |
Gateway prefixes from primary service connection |
Secondary tunnel with a different BGP peer IP address |
1 |
2 |
Gateway prefixes from backup service connection |
Secondary tunnel with a different BGP peer IP address |
4 |
5 |
Gateway prefixes from all other service connections |
Secondary tunnel with a different BGP peer IP address |
7 |
8 |
Specify a Backup Service Connection so that Prisma Access to uses that service connection as the backup when a service connection link fails.
The following figure shows a hot potato routing configuration for traffic between the US service connection and AS 200, with the EU service connection configured as the Backup Service Connection of the US connection. Using hot potato routing, Prisma Access sends the traffic from its closest exit path through the US service connection. The return traffic takes the same path through AS100 because this path has a shorter AS-PATH to the mobile user pool in the US location. Prisma Access prepends the AS-PATH to its prefix advertisements depending on whether the tunnel is a primary tunnel, a backup tunnel, or not used for either primary or backup.
Because you have set up a backup service connection, if the link to the US service connection goes down, hot potato routing sends the traffic out using its shortest route through the EU service connection. This routing scenario also applies to networks that use route aggregation.
You can also use backup service connections for multiple service connections in a single region. The following figure shows a Prisma Access deployment with two service connections in the North America region. In this case, you specify a Backup Service Connection of US-E for the US-W service connection, and vice versa, to ensure symmetric routing.
The Zero Trust Network Access (ZTNA) Connector lets you connect Prisma Access to your organization's private apps simply and securely. ZTNA Connector provides mobile users and users at branch locations access to your private apps using an automated secure tunnel. Because the ZTNA Connector sets up the tunnels automatically, you don't have to manually set up IPSec tunnels and routing to the data center or headquarters locations, public cloud locations, and partner networks where your private apps are located.
The ZTNA Connector VMs you deploy automatically connect to the closest Prisma Access location ensuring the best possible latency, in addition to scaling bandwidth access up to 2 Gbps per Connector and 8 Gbps per Connector Group.
Prisma Access denies all access by default, and an administrator must explicitly allow access to a resource using a policy rule, based on our patented User-ID, App-ID, and Device-ID constructs, helping you to reduce the attack surface and the security risks. Once a connection is allowed, we continuously verify the trust of that connection, continuously inspect for security threats, and continuously inspect for data leakage. In addition, the private IP addresses of your applications are not exposed when you use the Prisma Access ZTNA Connector.
ZTNA Connector Components
After you deploy the Connector VM, Prisma Access manages the VM, including providing you with options to upgrade the VM version. After installing the ZTNA Connector VM, it discovers the nearest Prisma Access location and initiates a secure IPSec tunnel to Prisma Access.
If you want to provide access to specific apps using different connectors, place the connectors in separate groups.
Use Cases for ZTNA Connector
Use ZTNA Connector in these scenarios:
ZTNA Connector provides your users secure access to the private apps using ZTNA-Connector Tunnel Terminators (ZTTs).
When you activate a ZTNA Connector in a compute region, ZTT nodes are automatically onboarded. ZTNA Connector automatically forms IPSec tunnels with ZTTs. ZTT nodes in a region remain active for 24 hours after all connectors in that region are deleted. If a new connector is deployed within 24 hours after all connectors are deleted in the same region, it reuses the existing ZTT. If a new ZTNA Connector is activated after 24 hours, a new ZTT is created.
Supported Use Cases for Service Connections and ZTNA Connector
ZTNA Connector isn't a replacement for service connections. It can complement or coexist with service connections, allowing you flexibility in how you secure private apps. If you have already deployed service connections, you can continue to use them, unless you want to move to a different application access model. The following table shows the supported and unsupported use cases for service connections or ZTNA Connector. A check mark indicates that the use case is supported; a dash (—) indicates that it's not supported.
Use Case |
ZTNA Connector Support |
Service Connection Support |
Access to applications in overlapped networks |
√ |
— |
Access to all ports and protocols for client-initiated application traffic |
√ |
√ |
Automatic tunnel establishment to Prisma Access |
√ |
— |
Automatic Prisma Access location discovery |
√ |
— |
Automatic scaling of Prisma Access locations for up to 8 Gbps throughput |
√ |
— |
Access to private apps using IP addresses and subnets |
√ |
√ |
Server-initiated traffic (such as a remote help desk) reaching out to a managed device (GlobalProtect mobile user or remote network). |
— |
√ |
Applications or services that require a unique client IP address |
√ |
√ |
Access to applications with dynamic ports (such as FTP Active mode or VoIP) |
— |
√ |
Hybrid deployments with on-premises next-generation firewalls where policy rules based on User-ID are applied |
√ |
√ |
ZTNA Connector 2.0 Principles
ZTNA Connector lets you connect your private apps to Prisma Access using the following ZTNA Connector 2.0 principles:
Before you configure ZTNA Connector, be sure that you understand the Connector requirements and limits, as well as the guidelines you should follow when deploying it.
Supported Prisma Access Versions and Requirements
Scale and Throughput Considerations
ZTNA Connector supports the following maximum values:
Each Connector can support 100,000 concurrent connections. A Connector Group can have a maximum of 4 connectors for up to 400,000 concurrent connections per Connector Group.
App Support
ZTNA Connector provides access to all of your private app traffic, with the following exceptions:
For example, you host a Windows Active Directory (AD) server behind a service connection (since AD servers are not supported behind a ZTNA Connector), and host an FTP (Filezilla) server behind a ZTNA Connector. If the FTP server requires authentication to the Windows AD server, authentication fails, because you can't use Prisma Access as a backbone between the Service Connection Corporate Access Node (SC-CAN) and the ZTNA Connector Tunnel Terminator (ZTT).
Feature and Functionality Restrictions
Keep in mind the following restrictions when setting up and configuring a ZTNA Connector deployment:
For example, you have assigned the same app (either an FQDN target or a wildcard target) to four connector groups, each group has a single connector, and all connectors are in the same region. This configuration is acceptable because you're not assigning more than four connectors per app in a single region.
However, if you assign the same app (either an FQDN target or a wildcard target) to three connector groups, each group has two connectors, and all connectors are in the same region, that is an invalid configuration, because you're assigning six connectors to the same app in a single region.
Supported Application Hosting Environments
You can deploy your ZTNA Connector VMs in the following data center environments with the specified minimum requirements:
Cloud Provider |
Instance Size |
CPU Size |
Memory Size |
Disk Size |
Amazon AWS |
m5.xlarge per region |
4 vCPUs |
16 GB |
40 GB |
Google Cloud Platform (GCP) |
n2-standard-4 per region |
4 vCPUs |
16 GB |
40 GB |
Microsoft Azure |
Standard_D4_v3 per region |
4 vCPUs |
16 GB |
40 GB |
KVM |
Uses qcow image |
4 vCPUs |
16 GB |
40 GB |
Hyper-V |
Uses vhd image |
4 vCPUs |
8 GB memory per VM |
40 GB |
VMware ESXi |
Uses OVA image. Supported on vSphere and directly on ESXi Hosts |
4 vCPUs per VM |
8 GB memory per VM |
40 GB disk (Thick Provisioned) |
For VMware ESXi, vMotion, VM snapshots, or migrations are not supported for Connector VMs. For KVM, Live Migrations and snapshots are not supported on Connector VMs. |
It's your responsibility to host the VMs and ensure that they can connect to the internet.
AWS, GCP, and Azure have ZTNA Connectors you can acquire in their respective Marketplaces. You can download the VMware ESXi Open Virtualization Application (OVA) file and the KVM qcow file from the Palo Alto Customer Support Portal.
Network Requirements
The following networking requirements enable connectivity between ZTNA Connector and Prisma Access:
In addition, you need to allow the protocol (either TCP or ICMP) that you configured for the application target health probes to the app. The connector application probes the app server to determine if it can provide access to the app, and you can configure the Probing Type for the Application Target to be tcp ping , icmp ping , or none (no probing). If you specify tcp ping , the firewall must allow TCP access to the app; if you specify icmp ping , the firewall must allow ICMP echo request and reply for the app.
The traceroute diagnostic tool also uses random UDP ports, so you must allow all UDP and ICMP error replies for the traceroute tool to function.
IP Addresses and FQDNs to Allow for ZTNA Connector
.
For example, if you're setting up a ZTNA Connector in the United States, add the following URLs to your organization's allow lists:
Limit DNS resolution of the previous FQDNs to IPv4 resolution. ZTNA Connector does not support establishing connection to the controller FQDNs using IPv6.
IP Addresses and FQDNs to Allow for ZTNA Connector
To ensure smooth functioning of ZTNA Connector, add the following URLs and IP addresses to your allow lists.
Service Name |
Port |
Direction |
Source Interface Internet Protocol |
Destination and IP Addresses |
ZTNA Connector access to Prisma Access |
443 |
Outbound |
ZTNA Connector WAN port |
https://controller.cgnx.net Address: 52.8.93.87 Address: 52.8.25.40 https://locator.cgnx.net Address: 18.223.78.55 Address: 52.15.45.235 hood: 52.40.98.31 34.218.98.185 sugarloaf: 18.200.102.82 18.200.135.33 faber: 18.139.242.53 54.255.61.109 https://vmfg.cgnx.net Address: 52.53.122.104 Address: 52.53.102.7 https://controller.elcapitan.cgnx.net Address: 52.8.93.87 Address: 52.8.25.40 https://vmfg.elcapitan.cgnx.net Address: 52.53.122.104 Address: 52.53.102.7 https://controller.hood.cgnx.net Address: 52.32.167.5 Address: 54.70.168.33 https://vmfg.hood.cgnx.net Address: 50.112.136.184 Address: 34.210.34.87 https://controller.sugarloaf.cgnx.net Address: 108.128.176.192 Address: 18.200.144.58 https://vmfg.sugarloaf.cgnx.net Address: 99.81.179.99 Address: 99.80.52.255 https://sdwan-stats-hood-us.cgnx.net https://sdwan-stats-elcapitan-us.cgnx.net https://sdwan-stats-hood-jp.cgnx.net https://sdwan-stats-elcapitan-jp.cgnx.net https://sdwan-stats-hood-sg.cgnx.net https://sdwan-stats-elcapitan-sg.cgnx.net https://sdwan-stats-hood-au.cgnx.net https://sdwan-stats-elcapitan-au.cgnx.net https://sdwan-stats-hood-in.cgnx.net https://sdwan-stats-elcapitan-in.cgnx.net https://sdwan-stats-hood-ca.cgnx.net https://sdwan-stats-elcapitan-ca.cgnx.net https://sdwan-stats-sugarloaf-eu.cgnx.net https://sdwan-stats-sugarloaf-de.cgnx.net https://sdwan-stats-sugarloaf-uk.cgnx.net https://controller.bowfell.cgnx.net Address: 13.41.243.90 Address: 18.171.17.23 https://vmfg.bowfell.cgnx.net Address: 52.56.35.36 Address: 52.56.224.242 https://controller.faber.cgnx.net Address: 52.74.47.220 Address: 13.251.109.27 https://vmfg.faber.cgnx.net Address: 18.142.153.59 Address: 52.74.58.219 h ttps://controller.townsend.cgnx.net Address: 13.55.31.41 Address: 3.106.168.215 https://vmfg.townsend.cgnx.net Address: 52.64.177.240 Address: 13.55.164.51 https://sdwan-stats-faber-sg.cgnx.net https://sdwan-stats-bowfell-uk.cgnx.net https://sdwan-stats-townsend-au.cgnx.net |
NTP |
123 |
Outbound |
ZTNA Connector WAN and LAN ports |
time.nist.gov 0.cloudgenix.pool.ntp.org 1.cloudgenix.pool.ntp.org 2.cloudgenix.pool.ntp.org 3.cloudgenix.pool.ntp.org |
DNS |
53 |
Outbound |
ZTNA Connector WAN and LAN ports |
Customer or Provider DNS servers |
To ensure trust between parties in a secure communication session, Prisma Access uses digital certificates. Each certificate contains a cryptographic key to encrypt plaintext or decrypt ciphertext. Each certificate also includes a digital signature to authenticate the identity of the issuer. The issuer must be in the list of trusted certificate authorities (CAs) of the authenticating party. Optionally, the authenticating party verifies the issuer did not revoke the certificate. Prisma Access uses certificates to secure features like decryption and authentication, and to secure communication between all the clients, servers, users, and devices connecting to your network.
For applications onboarded to ZTNA Connector, set up your certificates, add certificate authorities, and define certificate checks using Prisma Access .
Before you can set up ZTNA Connector, you must enable it within Prisma Access. Before you enable ZTNA Connector, do the following:
You should reserve at least a /16 subnet for the address pool. Use RFC 1918 or RFC 6598 addresses. You can specify an RFC 1918 address pool during ZTNA Connector setup instead of RFC 6598; however, you cannot change the address pool type back to RFC 6598 after you specify RFC 1918.
Use the following workflow to enable ZTNA Connector in Prisma Access (Managed by Panorama).
You must define separate IP address blocks for your connectors and your applications and the blocks cannot overlap with:
You can add a single Application IP Block, or multiple blocks depending on your deployment. For example, if 100.64.10.0/24 and 100.64.11.0/24. You can also Enable Advertise Application IP Block to Remote Networks .
You can add a single Connector IP Block, or multiple blocks depending on your deployment. For example, enter 100.65.10.0/24 and 100.65.11.0/24.
After you Enable ZTNA Connector you can begin setting up the ZTNA Connector components:
Refer to the following recommendation for the IP address blocks:
You can add more Connectors or Application Blocks to accommodate as required.
If you use RFC 6598 addresses within your network, you must reserve a separate RFC 6598 IP address pool to reserve for use within Prisma Access internally to route traffic to the connectors and private applications you’ll be onboarding.
Connector Groups are logical groupings of connectors and applications. There are many different ways to group applications and connectors. You can group connectors in different geographic locations for redundancy. Or, you can create multiple connectors in the same data center for increased throughput. For simplified policy management, you may want to group applications that are used by the same user groups. Create your Connector Groups first, and then add the connectors and applications to the groups.
Repeat this step as needed to create all of the Connector Groups you need to group your connectors and applications.
1. Select WorkflowsZTNA Connector , select Overview or Connector Groups , and Create Connector Group .
2. Give the Connector group a Name , enable Preserve User ID , and, optionally, provide a Description for it.
3. ( Optional ) If your data center is in Azure or AWS and you want to use the Auto Scale functionality, select Autoscale . If you have enabled this functionality, you don't have to create a Connector.
4. Create the Connector group.
Create Connectors and add them to the Connector Group.
Connectors represent the VMs running in your data centers that connect to Prisma Access. You must create the Connector within Prisma Access, and use the provided secret/key to onboard the corresponding Connector VM in your data center.
Repeat this step as needed to create as many connectors as you need to connect your data center apps to Prisma Access.
For routing simplicity and fastest access to data center servers, Palo Alto Networks recommends that the connectors and servers be in the same subnet.
To keep the ZTNA Connectors up-to-date, you can update their software version Icons in the ZTNA ConnectorConnector Groups show you the status of the connectors and if an upgrade is available.
You use the Key and Secret values when you set up the VMs in a later step.
1. Autoscale Connector Group —Follow the steps listed below:
You use the Key and Secret to associate the cloud instance or VM you create with the Connector.
2. Non-autoscale Connector Group —Follow the steps listed below:
You use the Key and Secret to associate the cloud instance or VM you create with the Connector.
You can see PA Service IP under Connector Groups only after you onboard your Connector.
If required, add this IP address to your allow lists so that your network can transmit and receive ZTNA Connector traffic.
Set up targets to access the private apps in the data centers through your ZTNA Connector VMs. You can add targets based on FQDN wildcards, FQDNs, or IP subnets; ZTNA Connector does the work of setting up the networking and DNS settings required for your mobile users and users at branch offices to reach the apps securely through Prisma Access.
1. Select WorkflowsZTNA ConnectorApplication Targets .
2. Select the type of target you want to create.
With the commitless app onboarding enhancement, onboarding applications now takes less than a minute, allowing a quick access to the applications. This feature also allows you to onboard a larger number of applications.
Limitations:
To enable the commitless app onboarding feature, update the Prisma Access dataplane to version 11.2.3 and later.
In addition, when users access an app based on a wildcard (for example, app1.example.com based on the *.example.com wildcard), the app is discovered and automatically onboarded as an FQDN Target .
The Group must be a type of FQDN/Wildcard .
Starting with Prisma Access 5.0.1, you can select multiple connector groups for both wildcard and FQDN targets, up to a maximum of four connector groups per wildcard or FQDN target. Use the guidelines when selecting multiple connector groups per target.
Enter it in the format of .example.com or .my.example.com (the UI implicitly adds the asterisk to the front of the wildcard). Do not allow all sites by specifying a wildcard of *.*, example.*.com, or *.com.
Enter a single port, multiple ports using commas between the ports, a range of ports using dashes, or both. Do not add spaces after the commas. Select Any port to match any ports you specify, or select Match and enter the port or ports to match.
If you have selected both under Protocol , you have to add ports to TCP Port and UDP Port
When you enter a range in TCP Port field, under Advanced Settings , icmp ping and none Probing Type gets activated.
If you select tcp ping , select a probing port , and enter a single port. The port does not have to be in the range of ports you entered in the port and protocol area. ZTNA connector determines the reachability of the app by performing a tcp ping from the probing port to the FQDN's resolved IP address. If the ping is successful, the app is considered Up .
You can also edit the probing port, which you have added during application onboarding. When the probe port is updated, ZTNA Connector starts tcp probing application on the updated port and the application status is updated accordingly.
If you select icmp ping , ZTNA Connector performs an ICMP ping to the FQDN's resolved IP address. If a response is received to the ICMP ping, the app is considered Up .
If you select none , no probing is performed and the application is always marked as Up .
Starting with Prisma Access 5.0, for Connector groups having 5.0 or higher ZTNA Connector version, if an application FQDN resolves to multiple private IP addresses, the ZTNA connector performs an application probe to determine the status of all resolved IP addresses and load balances the FQDN access to multiple resolved IP addresses that have an application status of Up.
To create an FQDN target, go to FQDN Targets and Create FQDN Target . You create an FQDN target the same as you create an FQDN wildcard, substituting the FQDN wildcard with a single FQDN.
Starting with Prisma Access 5.0.1, you can select multiple connector groups per FQDN target as well as wildcard targets, up to a maximum of four connector groups per FQDN or wildcard targets. Use the guidelines when configuring multiple connector groups per target.
Applications that are discovered as the result of a wildcard target also display here. When users access sites that match the wildcard, those apps are automatically onboarded for access from ZTNA Connector for your mobile users and remote network users. For example, given a wildcard of *.example.com, when users access the app at app1.example.com, ZTNA Connector automatically adds that app to the list of FQDN targets.
After an FQDN application is discovered from a parent wildcard target, any changes to the wildcard target are not updated in the discovered application. In addition, the same discovered FQDN is not rediscovered. If the characteristics for the discovered FQDN application require updating, perform a manual update on the discovered application using these steps.
The Group must be a type of IP Subnet .
All connectors in the group provide routing access to the specified IP subnets. You can select a single IP address in the form of 10.1.1.1/32, a single subnet, or multiple subnets separated by commas. Enter a maximum of 16 subnets.
The IP subnet must be routable within the tenant's IP Fabric and the IP subnets cannot overlap with any other IP subnets in the tenant, including:
1. Set Up Auto Discovery of Applications Using Cloud Identity Engine
2. Select WorkflowsZTNA ConnectorApplication TargetsDiscovered Application Targets .
3. Click + under Actions to add the application to a Connector group.
4. Give the application a unique Name .
5. Select the ZTNA Connector Group to associate with the app.
6. Enter the Probing Type ( tcp ping , icmp ping , or none ).
ZTNA connector determines the reachability of the app by performing a tcp ping from the probing port to the FQDN's resolved IP address. If the ping is successful, the app is considered Up .
7. Select Enabled .
8. Create the application target.
You Enable ZTNA Connector and add the required Connector IP Blocks that Prisma Access will use internally to route traffic between mobile users, remote networks and the connector VMs in your data centers. Previously, you were unable to do any changes to the Connector IP Blocks after its creation. However, now you can delete or update the Connector IP Blocks . Follow the procedure mentioned to delete or update the blocks.
Complete the following procedure to delete the Connector IP Blocks.
A message appears after the commit is passed.
If you have created any ZTNA Connector objects such as connectors, applications, wildcards, and connector-groups before and you attempt to delete the Connector IP Block without deleting the ZTNA Connector objects, commit and push fails.
In this case, delete the ZTNA Connector objects, delete the required Connector IP Block , and then Commit and push twice. The first commit fails but the second passes.
In order for ZTNA Connector to auto-discover applications that are defined in Azure Active Directory or Okta Directory, you must configure the following:
You must select Collect enterprise applications when you configure your cloud-based directory in Azure or Okta .
The following IdPs are supported for use with application discovery:
In a modern networking infrastructure, thousands of private applications are deployed across on-premises and in multicloud data centers. The networking teams are not aware of the applications running in their network or within a particular subnet in the network leading to a lack of application visibility.
To provide a secure access to applications, you have to manually enter the FQDN, port, application, and be aware of the dependency this application has on the other applications.
Private application target discovery provides a way to discover the applications hosted in the cloud environment and allows those applications to be onboarded on the ZTNA Connector solution. It also connects to the cloud provider network, does the discovery, and stores it in the database. It also provides APIs to the different services to get the discovered applications. If the user has only a service connection instead of a ZTNA Connector, only application targets are discovered.
The private application target discovery identifies:
Make sure you activate cloud identity engine (CIE) before you enable the private application discovery feature.
Complete the following steps to add a cloud account, an IAM role in AWS, and discover the target applications.
If you add a wrong ARN in the IAM Role ARN text field, the verification fails and an error message appears.
After you add the account, you can see the status, account ID, and other details. The refresh period for the discovery is 24 hours. You can also add multiple accounts to the same tenant.
To delete your cloud account and add a new one without disabling target discovery, follow this procedure. However, these steps are mandatory if you want to disable target discovery functionality.
Make sure all the cloud accounts are deleted before you disable the target discovery.
ZTNA Connector does not enforce policy; it seamlessly extends your existing Prisma Access security policy to the applications it enables for Prisma Access. This means you can use a common policy across all your applications and data centers, and you don't need to author your security policy separately for apps onboarded to ZTNA Connector.
However, as part of setting up ZTNA Connector, you do need to make sure that your security policy:
Allows traffic between Prisma Access and ZTNA Connector
For this, follow the ZTNA Connector Requirements and Guidelines to make sure that ZTNA Connector can connect to Prisma Access.
Users can access the applications behind the ZTNA Connector
To ensure your users can access ZTNA Connector apps, follow the steps here for the interface you're using to manage Prisma Access.
After you onboard apps to ZTNA Connector, you should set up policy rules to allow and control access for those apps. The procedure to create and apply policy differs on whether your apps are defined by
wildcards
,
IP Subnets
, or
FQDNs
.
Wilcard-based apps ( ( SettingsZTNA ConnectorApplication TargetsWildcard Targets ) require that you create a custom URL category; however, that type of category only enforces policy for HTTP and HTTPS traffic, and other traffic (such as SSH) isn't allowed. For this reason, you need to temporarily allow access to all apps by allowing traffic to the ZTNA Connector Application IP blocks.
After ZTNA Connector learns the FQDNs that are based on the wildcards, you can disable the policy that allows Application IP Block traffic and apply policy enforcement based on the learned FQDNs.
Adding this Security policy allows all traffic from wildcard-based app traffic to be passed while ZTNA Connector discovers the apps based on wildcards. Without the rule to allow the Application IP Blocks, users can't access wildcard-based apps.
You can leave this policy in place until ZTNA Connector discovers the wildcard-based apps. Then, you can choose to disable this policy and add Security policy rules for each of the discovered apps.
Select either the Mobile_User_Device_Group or the Remote_Network_Device_Group , depending on whether mobile users or users at branch sites will be accessing the private apps behind ZTNA Connector.
Enter the FQDNs for the FQDN targets.
If you created ZTNA Connector application targets based on IP subnets ( SettingsZTNA ConnectorConnectorsApplication TargetsIP Subnets ), complete the following steps to allow access to the apps.
If you have added targets based on FQDNs ( SettingsZTNA ConnectorConnectorsApplication TargetsFQDN Targets ), create an address object and a Security policy to allow access to the apps by completing the following steps.
Select either the Mobile_User_Device_Group or the Remote_Network_Device_Group , depending on whether mobile users or users at branch sites will be accessing the private apps behind ZTNA Connector.
Enter the FQDNs for all discovered apps.
After you configure your Connector groups, connectors, and application targets within Prisma Access, you must deploy the Connector VM in your data center. To simplify Connector onboarding, deployment templates for each data center environment are available from the Palo Alto Networks Customer Support Portal or from the cloud provider marketplace. The template you use depends on whether you’re planning to use a
one-arm deployment or a two-arm deployment
.
Supported ZTNA Connector Deployments
ZTNA Connector initiates the connection to the Prisma Access public IP address in the cloud, and you don't need to define any ingress firewall security rules. However, because ZTNA Connector initiates the connection, you'll need to add egress rules to allow ZTNA Connector access to the cloud controller and the IPSec connection to the Prisma Access dataplane. ZTNA Connector initiates the connection to the Prisma Access public IP address in the cloud. For this reason, you need the following egress rules so that ZTNA Connector can create an IPSec tunnel to Prisma Access:
For example, allow egress application ports HTTP (80) and HTTPS (443). These example ports are TCP ports. If your data center uses different ports, allow those ports instead.
You can deploy the Connector VM in the following deployment topologies:
One-arm deployments are only supported in cloud native environments such as AWS, Azure, or GCP. For on-premise deployments such as ESXi or a Kernel-based Virtual Machine (KVM) or Microsoft Hyper-V, use the two-arm deployment.
In this deployment, your ZTNA Connector is on a data center subnet that is private, with access to the internet through a data center router. Access to applications can be either locally on the same subnet, or through the data center router.
The following diagram shows a sample ZTNA Connector network deployment using a one-arm deployment.
If you want more control over your ingress and egress security rules, or if you have an on-premise VM deployment, you can use a two arm deployment, where one interface faces the internet and one faces the data center.
When setting up IP addresses on a two-arm connector, make sure that you have set up the IP address assignments for ZTNA Connector correctly before you power on the VM. For example, the following sample diagram uses 192.168.10.10 and 192.168.10.20 IP addresses. Given these sample addresses, set up the ports on ZTNA Connector for 192.168.10.10 and 192.168.100.20, or Prisma Access cannot reach the apps in the data center through ZTNA Connector. 192.168.10.10 and 192.168.100.20 are sample IP addresses and you do not have to use these IP addresses for your deployment to function.
The following diagram shows a sample ZTNA Connector network deployment using a two-arm deployment.
All of the ZTNA Connector components provide clear status information, logs, and diagnostic tools to help you troubleshoot any issues that arise. Use the following tools to monitor your ZTNA Connector deployment.
If the status shows Down , the Connector can't reach your application. After you fix the issue with the application, click the refresh status button in the Action column and verify that the Status changes to Up (the status automatically refreshes once per minute).
The status is also Up if the application is reachable from ZTNA connector (using the last successful DNS resolution result) but the DNS resolution of the Application FQDN fails from the ZTNA connector.
If the Status shows Tunnel Down , it indicates that the IPSec tunnel between the Connector VM and Prisma Access is down. If the Status shows Connection Down it indicates that the Connector VM is down. Click the diagnostics icon
to launch a remote shell connection to the Connector to troubleshoot the issue. You can run a ping , TCP Ping , traceroute , nslookup , or dump overview to help you diagnose the connectivity issue.
You can use ZTNA Connector in Prisma Access to secure private applications. To limit access to the applications based on User-ID, you can deploy a Next-Generation Firewall (NGFW) in the data center or headquarters location where the private applications are located; then, configure policy rules on the NGFW based on User-ID mapping.
If your deployment uses NGFW in the data center or headquarters location where the private applications are located, and ZTNA Connector does source NAT, the NGFW can't retrieve the User-ID mapping because the NGFW can't retrieve the user device's source IP address. If the NGFW can't retrieve this source IP address, it can't enforce the zone-based Security policy rules you have created on it based on User-ID mapping.
ZTNA Connector has the following responsibilities to enable User-ID within the NGFW secured data center:
The following diagram illustrates the network elements that provide the source IP address to User-ID mapping to the NGFW and deliver Geneve encapsulated data packets including the original Prisma Access source IP address option to the NGFW. These elements enable the NGFW to effectively enforce security policy rules based on User-ID.
Restrictions:
This procedure assumes that you have the following network configurations in place:
To make sure that your network distributes the User-ID mapping to the headquarters or data center, complete the following steps, which enables NGFW to enforce the security policy rules based on the User-ID mapping it learns from GlobalProtect.
Also, go to Connector Groups and make a note of the Anycast IP . This IP address is required to configure NGFW security policy rules to allow TCP application probing from this source IP address.
set deviceconfig setting preserve-prenat-feature yes
If you need to disable this feature in the future, enter set deviceconfig setting preserve-prenat-feature no.
For each port in the range, select one IP address from User ID Redistribution Agent IP in step 3 for the Host field. If you want redundancy at the ZTNA Connector level, you can choose two addresses from User ID Redistribution Agent IP and apply the full port range for both IP addresses. Alternatively, all the ports on all the IP addresses in User ID Redistribution Agent IP can be configured.
Add a redistribution agent for each of the ports in the range User ID Port Range with one or more of the addresses in User ID Redistribution Agent IP .
For IT Enterprise and IT Enabled Services (ITES) companies that need to control which users have access to their customer projects, Dynamic Privilege Access provides a seamless, secure, and compartmentalized way for your users to access only those projects that they are assigned to. These companies typically assign several customer projects to employees and provide siloed access to these projects so that so that an authorized user can access only one customer project at a time.
What Is Dynamic Privilege Access?
Dynamic Privilege Access is a feature in Prisma Access that provides dynamic privileges for your users based on the workflow or project that your users select in the Prisma Access Agent. Your users can have dynamic privileges based on the combination of the user group and IP pool that is assigned to a project. This unique combination defines a project. With Dynamic Privilege Access, you can isolate resources in your network so that they are only accessible to your users according to the projects they are assigned to.
A new predefined role called the Project Admin is available on Prisma Access to allow project administrators to create and manage project definitions. Project administrators have the ability to map projects to select Prisma Access location groups, and create IP address assignments using DHCP based on the project and location group. Project administrators can manage only the projects that they are assigned to in Strata Cloud Manager.
When your end users log in to a Prisma Access Agent that is enabled for Dynamic Privilege Access on their managed devices, the following workflow takes place:
You can gain visibility into your Prisma Access Agent deployment by using Strata Cloud Manager to monitor your users' project activity, and view the service consumption and security posture in your network.
With Dynamic Privilege Access, IT administrators can map end users to several customer projects. An authorized user is allowed access to only one customer project at a time.
Dynamic Privilege Access is an optional feature during the activation of a new Prisma Access tenant. After you enable this feature and the tenant is activated, DPA is set for the life of the tenant, and you can't disable it.
The option to enable DPA is available only once during the first activation of a new Prisma Access tenant. After the tenant is activated, the option is hidden for all the following activations, including add-ons and renewals. It's not available for existing tenants.
Provide access to users as Project Admin based on projects.
Before you begin, make sure that you have completed the following prerequisites:
In this workflow, we have used Azure as the IdP. You can also use Okta as your IdP.
Select Dynamic service provider metadata .
Make sure you complete all the necessary steps in the Azure portal.
If you have more than one directory, Switch directory to select the directory you want to use with the Cloud Identity Engine.
Customize the app name if required while creating the application.
Select the users and groups you want to use the Azure IdP in the Cloud Identity Engine for authentication.
Be sure to assign the account you're using so you can test the configuration when it's complete. You may need to refresh the page after adding accounts to successfully complete the test.
3.c
and click Add .
Alternatively, copy the reply URL to the sign on URL.
5.a
, and Get URL to get the metadata.
Ensure to sync the directory you added in step
2
and the SAML app.
3
to
5
to configure the SAML app for user groups that don't require MFA.
Don't enable MFA in step
5.g
for user groups that don't require MFA.
5
or
6
, based on the user groups requiring MFA, and Submit .
Ensure to set the configuration scope to the Access Agent mobile users container.
7
.
Before you can onboard your users, you must enable Access Agent as a mobile user connection type using Strata Cloud Manager. After you enable the connection type, the Prisma Access Agents installed on mobile user devices will be able to send traffic to Prisma Access.
Before you begin to enable the Prisma Access Agent, ensure that you Authorize User Group Mapping in Cloud Identity Engine for Dynamic Privilege Access .
Explicit Proxy is not supported for Prisma Access Agent.
The Access Agent Setup page appears.
Configure infrastructure settings for Prisma Access Agent so that Prisma Access can provision your mobile user environment. Then, select the Prisma Access locations where your Prisma Access Agent users will connect to.
You can also optionally
enable SC-NAT support for Dynamic Privilege Access
if you have created service connections to access private apps in their data center or headquarters location, or
enable route summarization for Dynamic Privilege Access
to reduce the number of routes that are sent to the network.
Configure Infrastructure Settings
To enable Prisma Access for internet access only for users, Prisma Access provides a default IP address pool and a cloud default DNS server. However, if you want your mobile users to access internal resources at your headquarters, data centers, or at remote network sites to which you onboarded to Prisma Access, you must allocate client IP address pools. Prisma Access uses the IP address pools to assign IP addresses to your mobile users and set up the Prisma Access service infrastructure .
Before you configure the infrastructure settings, ensure that you configure at least one project. Otherwise, when you try to commit and push the infrastructure settings, the commit will fail. For more information, refer to Create a Project .
By default, users can access the service using an FQDN based on your hostname and the .epm.gpcloudservice.com domain.
The project name and the location group ID from Prisma Access are part of the DHCP request. Each Prisma Access Agent connecting to a specific project is assigned an IP address from that project's IP subnet. When a user changes to a different project, a different IP address is assigned to the Prisma Access Agent from the project's IP subnet.
You can configure the following options:
enable SC-NAT
or configure and select the global summary IP pools for
route summarization
.
Select Prisma Access Locations
Select the Prisma Access locations where you want to support Prisma Access Agent users. The location groups are used for Dynamic Privilege Access.
Depending on your license agreement , you can select either Local or Worldwide locations. The map shows the regions where you can deploy Prisma Access for Users. In addition, Prisma Access provides multiple locations within each region to ensure that your users can connect to a location that provides a user experience tailored to the users’ locale. For the best performance, Select All . Alternatively, select specific locations within each selected region where your users will need access. By limiting your deployment to a single region, you can have more granular control over your deployed regions and exclude regions required by your policy or industry regulations.
For Prisma Access Agents, you can deploy Prisma Access to the following Strata Logging Service regions:
This list will be updated as more regions become available.
For the best user experience if you are limiting the number of locations, choose locations that are closest to your users or in the same country as your users. If a location isn’t available in the country where your mobile users reside, choose a location that is closest to your users for the best performance.
The images in this section are provided for illustrative purposes only.
13. Select an available region on the map.
14. Click the plus sign + on the locations that you want to add.
You can switch between the Map and List views. You can also Select All locations.
In the list view, you can select from the list of available locations to deploy Prisma Access. You can select All sites within a region.
15. Save your Prisma Access location settings.
You can enable the egress IP allow lists for existing mobile user deployments and during new user onboarding. If you enable egress IP allow lists for existing Prisma Access deployments, Prisma Access migrates all the egress IP addresses already allocated for your locations to the egress IP allow lists. For new Prisma Access deployments, enable the egress IP allow list while onboarding the Prisma Access Agent mobile users. Every time you add a location or have an auto scaling event, you should retrieve the new egress IP addresses that Prisma Access allocates and add them to allow lists in your SaaS applications. You can then push the configuration to your Prisma Access deployment to confirm the egress IP allow lists allocated for your locations.
1. Enable Egress IP Allowlist to display the IP addresses for onboarded Prisma Access locations.
2. Copy and add the allocated addresses to the allow lists of your SaaS applications.
3. Migrate to confirm the IP addresses allocated for the onboarded locations in Prisma Access.
4. Retrieve the IP addresses for new onboarded locations or during an auto scaling event.
Enable SC-NAT Support for Dynamic Privilege Access
Use SC-NAT support for Dynamic Privilege Access (DPA) if you use DPA and have created service connections to access private apps in your data center or headquarters location. Multiple projects in your DPA environment can experience IP address exhaustion if the IP addresses of the infrastructure subnet overlap. To fix this issue, Prisma Access can implement source NAT (SNAT) for IP addresses, which:
DPA customers can onboard client locations to Prisma Access using service connections. However, multiple projects may have large IP pools on multiple data centers, leading to potential exhaustion of private IP pools. To solve this issue, Dynamic Privilege Access in Prisma Access offers support for SC-NAT with defined pools. Customers have the option to use SC-NAT instead of the infrastructure subnet in order to divide up the IP pools. If you enable SC-NAT for a service connection corporate access node (SC-CAN), SC-NAT will always be supported for that service connection.
With DPA enabled, you can turn SC-NAT on (to use SC-NAT) or off (to use the Infrastructure Subnet) per project.
For enterprises that have on-premises hardware with limited capacity, such as simple cloud routers that can accommodate only a few hundred routes, Prisma Access can summarize Mobile User (MU) routes when advertising the routes to the on-premises network. Route summarization minimizes the requirements on these devices by staying within the route capacity on the data center.
To enable route summarization, you can configure global summary pools, which are lists of large IP pools that can be used across multiple projects. When a user connects to a project using the Prisma Access Agent and the agent is assigned an IP address within the range of a global summary pool, the Prisma Access service connection advertises the global summary pool instead of the smaller aggregate route.
To help illustrate route summarization for projects, consider the following scenario:
To enable route summarization for projects in Strata Cloud Manager:
in WorkflowsPrisma Access SetupAccess AgentInfrastructure Settings .
You can create a snippet to group the configurations of Prisma Access Agents that you can quickly push to your deployments. Snippets are used to standardize a common base configuration for a set of project-based deployments, allowing you to quickly onboard new devices with a known good configuration and reducing the time required to onboard a new device.
After you create the snippet, you will associate the snippet to a scope, assign a user to the scope, and grant the user the Project Admin role. The user can then log in as the Project Admin and use the snippet to manage the project settings for the Prisma Access Agent. The Project Admin can only change the Prisma Access Agent settings for the snippets that they are assigned to.
To create a snippet, complete the following steps:
You can select an existing label or create a new label by typing the label you wanted to create.
Choose whether to Auto generate a random prefix or select Manual and add your own Prefix Value . The prefix value can be alphanumeric and have a maximum of six characters.
The prefix will have the format xxxxxx- . When you add an object, Strata Cloud Manager will prepopulate the object name with the prefix.
After you create the snippet, you're in the Configuration Scope for the snippet. All configurations you create while in the snippet scope occurs only for the snippet.
Access Agent appears in the list of Snippet Associations.
After the push config operation is completed, the snippet is created and the roles are associated with the snippet.
The assigned user (project admin) can now log in to Strata Cloud Manager and configure project-specific using the snippet that you created. The user can view other scopes that they are not assigned to, but they cannot interact with them, such as changing any configurations.
After the Superuser administrator sets up the infrastructure , creates a snippet and assigns the snippet to you, you can log in as the Project Admin to set up project-specific Prisma Access Agents settings, such as private IP, split-tunnel, and DNS information that will be assigned to endpoints when they log in to a project using the Prisma Access Agent.
You can create project-specific settings for one or more Prisma Access Agents or use the default agent settings. You can use a different agent for each project that you managed, or share an agent with multiple projects.
Forwarding Profiles provides a single pane-of-glass to configure and manage traffic forwarding rules and traffic enforcement, such as setting up split tunnel settings and managing traffic outside of the tunnel connection. Forwarding profiles improves on the disjointed configuration of traffic policies experienced with other mobile access agents, and greatly extends the limit on how many rules and entries that you can configure. By simplifying the related configurations and improving clarity, you can focus on how you want endpoint traffic to be routed and enforced.
The forwarding profile is a profile type that contains several logical and ordered sections. These sections illustrate the various phases a connection passes before the agent determines how the connection should be steered. This organizational structure can help you understand why traffic is being routed a certain way by presenting the ordered entries in each section. Within each section, you can add, edit, remove, or reorder entries.
Once you set up the forwarding profiles, you can assign them to users or user groups in the Agent Settings page.
Traffic forwarding rules are applied from the top down in the forwarding profile. Therefore, configure the forwarding profile in a top-down manner, such as configuring the most specific rules first and the least specific rules last.
Forwarding Rules
A forwarding profile consists of a set of traffic forwarding rules that specify what source application or destination domain and destination IP address traffic goes through the tunnel or outside the tunnel, whether to split DNS traffic, and what traffic enforcement is in effect. Traffic that matches a rule is forwarded to Prisma Access according to the traffic forwarding specifications. The specifications in a forwarding rule are organized into the following sections:
Traffic Enforcement
Each forwarding profile also contains traffic enforcement settings that allow you to:
To configure a forwarding profile, complete the following steps:
You can also view the snippets that are not assigned to you, but you cannot interact with them, such as to change the configuration.
If you choose to exclude application traffic (by selecting Direct connectivity in the forwarding rule), traffic from these applications is sent through the physical adapter on the endpoints rather than the tunnel (the virtual adapter).
If you choose to include application traffic (by selecting Tunnel connectivity in the forwarding rule), traffic from these applications is routed to Prisma Access, even if it meets the exclude traffic criteria.
For example, to manage traffic from the Zoom application, add the following complete paths:
If you have a list of applications in a text file in comma-separated values format (.csv), you can Upload .csv File .
If you choose to exclude traffic based on the domain name (by selecting Direct connectivity in the forwarding rule), traffic from the domain is sent through the physical adapter on the endpoints rather than the tunnel (the virtual adapter).
If you choose to include traffic based on the domain name (by selecting Tunnel connectivity in the forwarding rule), traffic from the domain is routed to Prisma Access, even if it meets the exclude traffic criteria.
Do not include wildcard characters in the IP address. Wildcards in IP addresses are not supported in forwarding profiles.
If you do not include or exclude routes or applications, every request is routed through the tunnel (without a split tunnel). Also, all traffic is inspected and subjected to policy enforcement whenever users connect to Prisma Access.
When you define split tunnel traffic to exclude access routes (by selecting Direct connectivity in the forwarding rule), these routes are sent through the physical adapter on the endpoint instead of being sent through the tunnel via the virtual adapter (the tunnel). By excluding split tunnel traffic by access routes, you can send latency-sensitive or high-bandwidth traffic outside of the tunnel, while all other traffic is routed through the tunnel for inspection and policy enforcement by the gateway.
When you define split tunnel traffic to include access routes (by selecting Tunnel connectivity in the forwarding rule), the gateway pushes these routes to the remote users’ endpoints to specify what traffic these endpoints can send through the tunnel.
Specify excluded routes that are more specific than included routes; otherwise, you might exclude more traffic than intended.
If you have a list of IP addresses in a text file in .csv format, you can Upload .csv File .
To edit a forwarding profile, select the name of the profile in the Forwarding Profiles table.
The Forwarding Rules table shows the rules that make up the forwarding profile. All forwarding profiles contain the Default forwarding rule, which sends all DNS and network traffic through the tunnel. Any new rules that you add are placed above the default rule. You cannot delete or move the default forwarding rule, but you can change its Connectivity setting.
1. Enable the rule.
2. Enter a Name for the rule.
3. Select the Source Application that you defined previously. If you select Any , the forwarding rule will apply to traffic from any source applications.
The rule will match only if the connection is made by the specified source application.
4. Select a User Location . If you did not set up a user location or if you allow the rule to match any user location, select Any . (Does not apply to Dynamic Privilege Access enabled agents.)
The rule will match only if an endpoint is connected to the user location that you specify.
5. Select a Destination that you defined previously. If you select Any , the forwarding rule will apply to traffic from any destination domain or IP address.
The rule will match only if the connection destination matches the specified destination domain or IP address.
6. Select the Connectivity :
7. Select the Traffic Type :
Specify whether to use split DNS to allow users to direct their DNS queries for applications and resources over the tunnel or outside the tunnel in addition to network traffic.
For Windows agents, the DNS + Network Traffic split tunnel option is not supported for application-based split tunnel rules. If you set up split tunneling to include or exclude traffic from the tunnel based on application names and select DNS + Network Traffic , DNS query packets for excluded and included apps will not honor the split tunnel rule.
The rule is added to the Forwarding Rules table. You can add multiple rules to the forwarding profile.
Be sure that to deselect all these options as they are not recommended for Dynamic Privilege Access.
Blocking access to your local network causes all traffic from being sent to the local adapter. In addition, your users won't be able to access resources on the local subnet, such as printers. Split tunnel traffic based on access route, destination domain, and application still works as expected.
If you disable this option, your end users can access local resources without requiring them to first connect to Prisma Access using the Prisma Access Agent.
After you configure a forwarding profile, you can verify whether the traffic is being directed as intended by viewing the traffic log files. You can view the traffic logs in the log viewer or by using the Prisma Access command-line tool (PACli) on an endpoint.
"C:\Program Files\Palo Alto Networks\Prisma Access Agent\pacli" traffic show
/Applications/Prisma\ Access\ Agent.app/Contents/Helpers/pacli traffic show
pacli traffic show <number>
Where <number> is the number in the Priority column, for example:
pacli traffic log
To show an individual log entry, issue the following command:
pacli traffic log <index>
Where <index> corresponds to the index number for the entry. For example:
You can also export the connection log to a file for further analysis by issuing:
pacli traffic log export <filename>
Strata Cloud Manager provides the default Prisma Access Agent app configurations that apply to all user groups in all projects. You can add an app configuration to customize how your end users in a project interact with the Prisma Access Agent.
You can also view the snippets that are not assigned to you, but you cannot interact with them, such as to change the configuration.
To edit the settings for an agent, select an agent name from the table.
The default support page is the website for the Prisma Access Agent documentation
For details about getting started with ADEM on Cloud Managed Prisma Access, see Get Started with Autonomous DEM .
Specify the amount of time that must elapse before the session times out due to inactivity. This setting is required.
If you're using the Nebula (10.2) dataplane in Prisma Access, the Session timeout value isn’t configurable and by default is seven days.
If you disable this option, Prisma Access Agent will bypass the proxies. All HTTP or HTTPS traffic that matches the proxy or PAC file rules is required to traverse the Prisma Access Agent tunnel before reaching the intended destination. By bypassing proxies, you can prevent users from setting up a personal proxy to access web resources without going through the tunnel for inspection and policy enforcement.
When users try to access a resource that requires additional authentication, Prisma Access Agent receives a UDP packet containing the inbound authentication prompt and displays this message. The UDP packet also contains the URL for the Authentication Portal page you specified when you configured multi-factor authentication. Prisma Access Agent automatically appends the URL to the message.
For example:
You have attempted to access a protected resource that requires additional authentication. Do you want to continue?
The message can have 255 or fewer characters.
You can configure DNS servers to enable Prisma Access to resolve your internal domains.
Do not enter a wildcard (*) character in front of the domain suffix (for example, acme.com). You can add multiple suffixes.
The Prisma Access Agent collects information about the host it's running on and submits this host information to the gateway upon successful connection. The gateway matches this raw host information submitted by the Prisma Access Agent against any host information profile (HIP) objects and HIP Profiles that you have defined. If it finds a match, it generates an entry in the HIP Match log. Additionally, if it finds a HIP Profile match in a policy rule, it enforces the corresponding security policy.
In the HIP Notifications tab of the Edit Global Agent Settings page, you can create HIP notifications, create and manage HIP objects, and create and manage HIP Profiles that apply to the Prisma Access Agent across all endpoints.
Here, you can define custom HIP data that you want the Prisma Access Agent to collect. When this option is enabled, the Prisma Access Agent collects data from devices running macOS or Windows operating systems.
For example, a custom check could enable you to know whether a certain application is installed or running on an endpoint. The data that you define to be collected in a custom check is included in the raw host information data that the Prisma Access Agent collects and then submits to the gateway when the Prisma Access Agent connects.
If you want to use a certificate profile that isn't on the list, Add Certificate Profile .
Optionally, if the gateway uses the Online Certificate Status Protocol (OCSP) to verify certificate revocation status, configure the following fields to override the default behavior. For most deployments, these fields do not apply.
If you select both OCSP and CRL, the gateway first tries OCSP, and only falls back to the CRL method if the OCSP responder is unavailable.
Save your settings when you're done.
For example, if you have any required applications that are not included in the Vendor or Product lists for creating HIP objects, you can create a custom check to determine whether that application is installed (it has a corresponding Windows registry or Mac plist key) or is currently running (has a corresponding running process):
Save the custom check settings when you are done.
Add projects that you want users to access using the Prisma Access Agent. Only a project-admin can create and manage the project definitions.
The project that you're creating is associated with IP pools and location groups. Users will acquire the IP addresses based on which project and Prisma Access compute location they connect to using the Prisma Access Agent. A project can only connect to the location within the location group that is associated with the project. You can select Click here for detailed mapping to see the mapping between the Prisma Access location groups and the Prisma Access compute locations.
These project IP pools can be summarized to reduce the number of routes that are sent to the network.
After you create a project in Prisma Access, it can take up to 15 minutes before the user can authenticate to that project using the Prisma Access Agent.
Use traffic steering to forward a project's traffic to a service connection and project-specific routes.
Your end users will use the Prisma Access Agent to access your organization's network based on the customer projects that your users are assigned to.
After you set up the project-specific agent settings and created the projects , you can configure other Prisma Access Agent settings such as staged rollouts and global agent settings.
You can configure the following Prisma Access Agent settings:
The Prisma Access Agent upgrade rollout functionality provides administrators with a way to upgrade groups of devices in a specific order. With upgrade rollouts, you no longer have to rely on mobile device management (MDM) software, such as Jamf Pro and Microsoft Intune, to upgrade Prisma Access Agents.
Stage upgrade rollouts can occur only after the initial deployment or installation of the Prisma Access Agent on your end users' devices.
Before you begin, learn about staged rollouts of Prisma Access Agents .
To stage the rollout of Prisma Access Agent upgrades, you can configure upgrade rings with match criteria based on users, groups, and operating systems. Devices that match the criteria are upgraded in the order of the upgrade rings (Ring 0 to Ring 4, Default ring).
You can optionally define upgrade rings when you onboard mobile users using the Access Agent Setup page for the Prisma Access Agent. If you choose not to define upgrade rings during the initial agent configuration, all devices are placed in the default ring. You can return to Prisma Access Agent Setup page later to define the upgrade rings and push the configuration to Prisma Access. These changes will take effect during the next staged rollout, or after you stop and start a staged rollout.
To configure an upgrade ring:
You can use an attribute only once per ring. After you add a criteria using an attribute, that attribute will no longer appear in the Attribute drop-down.
After you added the criteria, the criteria is displayed in the Criteria table in the Ring Criteria page. When Prisma Access evaluates the criteria, the values listed in the same cell are evaluated using the logical OR operator, while the attributes and values between the rows are evaluated using the logical AND operator.
For instance, the criteria in the following image will match those devices that belong in the gp-auto-saml-group or Okta Administrators group and run the Windows 11 operating system.
You can customize the global agent settings that apply to Prisma Access Agents across all endpoints.
General global agent settings include setting up the anti-tamper feature that prevents users from tampering with the Prisma Access Agent, such as uninstalling it from an end user's device. In addition, you can configure the authentication override settings, the inactivity timeout setting, and block the login of quarantined devices.
You can safeguard the Prisma Access Agent by enabling the anti-tamper feature, which prevents any unauthorized user from tampering with the Prisma Access Agent. The anti-tamper feature can protect the following Prisma Access Agent resources on your endpoints:
To unlock the anti-tamper feature to troubleshoot the Prisma Access Agent, you need to set up an anti-tamper unlock password (also known as the supervisor password).
5. Enable the anti-tamper unlock password.
If you don't enable the anti-tamper password, no password is assigned, and a user can enter any password (including an empty password) when prompted at the Prisma Access Agent command line.
If you disable the anti-tamper password after enabling it, users can run certain PACli commands on the agent, such as the pacli disable , pacli hip status , pacli protect disable , and pacli switchto GlobalProtect commands, without providing the supervisor password. They only need to press Enter when prompted for the password.
6. Enter the Password , and then Confirm Password by reentering the password. The password must have a minimum of eight alphanumeric characters.
If you do not provide a password, the default password will be used. By default, the anti-tamper password is set to the first three characters of the Prisma Access tenant name in uppercase, plus the Prisma Access Data Region in lowercase, plus the last five digits of the Prisma Access Instance ID , for example: PANamericas56789 .
You can obtain the Prisma Access Instance ID and Data Region by selecting SettingsTenants<your_tenant> and selecting the View Support Info tool tip next to the serial number for Prisma Access.
To provide a higher level of security for your agents, override the default anti-tamper unlock password by setting up a new secure password.
The Inactivity Logout setting applies to both Prisma Access Agent and GlobalProtect. Any changes you make will be reflected and used for GlobalProtect, and vice versa.
You can use the inactivity logout period to enforce a security policy to monitor traffic from endpoints while connected to Prisma Access and to quickly log out inactive Prisma Access Agent sessions. You can enforce a shorter inactivity logout period. Users are logged out if the Prisma Access Agent has not routed traffic through the tunnel or if the gateway does not receive a HIP check from the endpoint within the configured time period.
If a user attempts to log in from a quarantined device when this setting is enabled, the Prisma Access Agent notifies the user that the device is quarantined and the user cannot log in from that device. If this setting is not enabled, the user receives the notification but is able to log in from that device.
The Block Login for Quarantined Devices setting applies to both Prisma Access Agent and GlobalProtect. Any changes you make will be reflected and used for GlobalProtect, and vice versa.
In the HIP Notifications tab of the Edit Global Agent Settings page, you can create host information profile notifications, create and manage HIP objects, and create and manage HIP Profiles that apply to the Prisma Access Agent across all endpoints.
The Prisma Access Agent collects information about the host it's running on and submits this host information to the gateway upon successful connection. The gateway matches this raw host information submitted by the Prisma Access Agent against any HIP objects and HIP Profiles that you have defined. If it finds a match, it generates an entry in the HIP Match log. Additionally, if it finds a HIP Profile match in a policy rule, it enforces the corresponding security policy.
HIP checks are performed when the app connects to the gateway and subsequent checks are performed hourly while the Prisma Access Agent is connected. The gateway can request an updated HIP report if the previous HIP check has changed. Only the latest HIP report is retained on the gateway per endpoint.
Using host information profiles for policy enforcement enables granular security that ensures the remote hosts accessing your critical resources are adequately maintained and adhere with your security standards before they are allowed access to your network resources. For example, before allowing access to your most sensitive data systems, you might want to ensure that the hosts accessing the data have encryption enabled on their hard drives. You can enforce this policy by creating a security rule that only allows access to the application if the hard drives on the endpoint are encrypted.
In addition, for endpoints that are not in compliance with this rule, you can create a notification message that alerts users as to why they have been denied access. You can also provide a link to the location where they can access the installation program for the missing encryption software. To allow the user to access that file share, you will have to create a corresponding security rule allowing access to the particular share for hosts with that specific HIP Profile match. You have the option to configure HIP notifications for both HIP match and nonmatch. The notification can be sent as a pop-up message or a system tray balloon.
You can complete the following tasks:
When the HIP report matches the HIP profile or object, a corresponding HIP notification is sent. You can define the notification messages that end users see.
Deciding whether to display a notification message when the user's configuration matches or does not match a HIP Profile in the policy depends largely on your policy and what a HIP match (or nonmatch) means for the user. That is, does a match mean they are granted full access to your network resources, or does it mean they have limited access due to a noncompliance issue?
For example, suppose you create a HIP Profile that matches if the required corporate antivirus and antispyware software patches are not installed. You could create a HIP notification message for users who match the HIP Profile, informing them that they need to install the patches. Alternatively, if your HIP Profile matches when those same patches are installed, you might want to create the message for users who do not match the profile.
If there are no HIP Profiles, you need to create a HIP Profile.
HIP objects consist of the matching criteria used to filter out the host information that you're interested in using to enforce policy from the raw data reported by the Prisma Access Agent. For example, while the raw host data might include information about several antivirus packages that are installed on the endpoint, you might only be interested in one particular application. In this case, you would create a HIP object to match the specific antivirus software you're interested in enforcing.
The best way to determine what HIP objects you need is to determine how you will use the host information you collect to enforce the policy. Keep in mind that the HIP objects themselves are merely building blocks that enable you to create the HIP Profiles that are used in your security policies. Therefore, try to keep your objects simple by matching on one item. This item could be the presence of a particular type of required software, membership in a specific domain, or a specific OS. By doing this, you will have the flexibility to create a granular HIP-augmented policy.
For example, to create an object that looks for information about antivirus or antispyware software, select the Anti-Malware tab, and then select the Anti-Malware check box to enable the corresponding fields. Complete the fields to define the desired matching criteria.
For example, the following image shows how to create a HIP object that matches if the endpoint has the AVAST Free Antivirus software application installed, has Real Time Protection enabled, and has malware definitions that have been updated within the last five days.
Repeat this step for each category you want to match against in this object. For more information, see Table: Data Collection Categories .
From there, click Manage HIP Object to view the list of HIP objects that you configured. You can select a HIP object and Delete , Clone , or Move it.
A HIP Profile is a collection of host information profile objects that are evaluated together, either for monitoring or for security policy enforcement. When you create your HIP Profiles, you can combine the HIP objects and HIP Profiles you previously created by using Boolean logic, such that when a traffic flow is evaluated against the resulting HIP Profile, it either matches or does not match. If there is a match, the corresponding policy rule is enforced. If there is no match, the flow is evaluated against the next rule, as with any other policy matching criteria.
From there, click Manage HIP Profile to view the list of HIP Profiles that you have configured. You can select a HIP Profile and Delete , Clone , or Move it. You can also Add a HIP Profile from here.
Create HIP-Enabled Security Rules on Your Gateways
As a best practice, you should create your security rules and test that they match the expected flows (based on the source and destination criteria) before adding your HIP profiles. By doing this, you can better determine the proper placement of the HIP-enabled rules within the policy.
After you complete the Prisma Access Agent configuration or update the configuration, you must push the configuration to Prisma Access.
Create at least one project before you can push the commit, otherwise the commit will fail.
After you have configured the Prisma Access Agent and project-specific Prisma Access Agent settings, you can download the Prisma Access Agent package so that you can make it available for download and installation by your end users.
In addition, ensure that you download the configuration file. Your agent and project-specific agent configurations, along with the Prisma Access tenant ID and the server domain, are saved to the Prisma Access Agent configuration file. The configuration file will be used during the installation and registration of the Prisma Access Agent.
Ensure that you download the Configuration file because it will be used during the installation and registration of the Prisma Access Agent.
If your organization is an IT or IT Enabled Services (ITES) company that needs to control which users have access to their customer projects, Dynamic Privilege Access provides a seamless, secure, and compartmentalized way for you to access only those projects that are assigned to you.
If your administrator has set up Prisma Access and the Prisma Access Agent for Dynamic Privilege Access, you can use the Prisma Access Agent to access and work on the projects that you are assigned to.
After you log in to your project, you can access your organization's network, resources in the network, or software-as-a-service applications that are specific to the project. Learn how to:
If your administrator did not push the Prisma Access Agent to your device, you can manually install the Prisma Access Agent on your macOS or Windows device.
The Prisma Access Agent and GlobalProtect app can coexist on the same device, but only one of them can connect to Prisma Access. If the GlobalProtect app is also installed and enabled on your device, the Prisma Access Agent installation will automatically disable the GlobalProtect app. To use the GlobalProtect app after installing the Prisma Access Agent, you will need to switch to the GlobalProtect app .
To manually install the Prisma Access Agent on your Windows device.
PrismaAccessAgent_x64_<version>.msi
You can uninstall the Prisma Access Agent manually if you no longer need to use it. Keep in mind that by uninstalling the agent, you will no longer have access to your corporate network, and your endpoint won't be protected by your organization's security policies.
Before you begin, if the anti-tamper feature is enabled for the Prisma Access Agent, you must obtain the anti-tamper unlock password from the administrator. To uninstall the agent, you must have administrator privileges.
Complete the following steps to uninstall the Prisma Access Agent:
C:/Program Files/Palo Alto\ Networks/Prisma Access Agent/PACli.exe" protect disable
To access your organization's network, resources, SaaS applications, or the internet, log in to the Prisma Access Agent using your login credentials.
After you log in to the Prisma Access Agent, you’re automatically connected to your network using the best location (sometimes called a gateway). The agent automatically selects the best location to provide you with the best performance to provide a better experience, such as viewing websites in your local language. When your device is outside your organization's network, the agent finds the best location to give you the best performance when connecting to the network.
Before you begin, the Prisma Access Agent must be installed on your device. Typically, your administrator will deploy the Prisma Access Agent to the device that you use to access your organization's network, resources, and applications. The agent is configured according to policy rules defined by your administrator and deployed to your device. However, if your administrator did not deploy the Prisma Access Agent to your device, you will need to manually install the Prisma Access Agent .
Depending on how Prisma Access is set up in your organization, your administrator should provide you with the following login information:
Depending on the settings for your operating system, the app icons and app interface can appear in dark mode or light mode.
Log in to the Prisma Access Agent by completing the following steps:
from the macOS menu bar or Windows taskbar.
The format of the server name is <xxx>.epm.gpcloudservice.com (without the https:// protocol). The maximum length of the server name is 256 characters.
The maximum length for the project name is 32 characters.
If your administrator enabled multi-factor authentication (MFA), you’ll need to complete additional verification in the browser when you log in.
( Optional ) If you don’t want the browser to prompt you the next time you log in, select Always allow <site> to open these types of links in the associated app , then click Open Prisma Access Agent (if supported by your default web browser).
You can now access your organization's resources and SaaS apps, along with secure access to the internet.
If your administrator enabled Always On mode for Prisma Access Agent, you cannot disconnect from Prisma Access due to your organization's policy. However, you can still change Prisma Access locations.
If your administrator enabled On Demand mode for Prisma Access Agent, you must click the lock icon to connect to Prisma Access.
Use the Prisma Access Agent preferences window to view information about your device and to change options for your agent, such as enabling desktop notifications.
from the macOS menu bar or Windows taskbar.
Icon |
Description |
|
Your user ID. |
|
The Prisma Access location that your device is connected to. |
|
The IP address of the Prisma Access location. |
|
The hostname or IP address for the administrative interface (server) that you're connected to. You can click the plus ( + ) icon to connect to a different server. |
|
The project you're signed in to. |
The desktop notifications will adhere to any "do not disturb" settings that you set at the time of installation. The operating system will prompt you to allow notifications from Prisma Access Agent at the time of installation.
After you log in to Prisma Access Agent, you’re automatically connected to the best available Prisma Access location. If you want to change locations, you can do so using the Location drop-down.
from the macOS menu bar or Windows taskbar.
The list of available locations are sorted according to the best experience based on response time, availability, and other factors. The location that offers the best experience is listed as Best Location .
If you're assigned to multiple projects in your organization, you can switch to another project to access the network and resources associated with that project.
If the project you're trying to switch to is accessible from a different server, you will need to switch to that server first.
from the macOS menu bar Windows taskbar.
You must be assigned to the project that you're switching to.
An instance of the Prisma Access server is also known as a tenant . If your administrators set up multiple Prisma Access servers, you can connect to a different server to access the network or the resources through that server.
For example, you need to work on a different project, but that project is only accessible on a different server. You will need to connect to that server before you can change to that project.
from the macOS menu bar or Windows taskbar.
The format of the server name is <xxx>.epm.gpcloudservice.com without the https:// . The maximum length of the server name is 256 characters. The maximum number of servers allowed on this page is 20.