Prisma Access: Foundational Concepts & Architecture

This document provides a detailed overview of the foundational concepts, architecture, licensing, and core components of Palo Alto Networks Prisma Access. Understanding these elements is crucial for effective design, deployment, and management of the solution.

Part 1: What is Prisma Access?

Prisma Access is Palo Alto Networks' cloud-delivered security platform, forming the core of their Secure Access Service Edge (SASE) offering. It converges networking and security functions into a single, globally distributed, cloud-native service designed to protect all application traffic for mobile users and remote networks (branch offices).

Detailed Explanation of SASE Principles

SASE, a term coined by Gartner, represents an architectural shift in network security. It moves away from securing the traditional network perimeter towards securing users and applications wherever they are. Key SASE principles include:

Core SASE capabilities typically include:

How Prisma Access Implements SASE

Prisma Access embodies the SASE principles by providing:

Example Traffic Flow: Mobile User Accessing Internet/SaaS

This sequence diagram illustrates the basic flow when a mobile user connects through Prisma Access to reach a public internet resource or SaaS application.

        sequenceDiagram
            participant MU as Mobile User (GP Client)
            participant PA_PoP as Prisma Access PoP (SPN)
            participant SaaS as Internet / SaaS App

            MU->>PA_PoP: 1. Connect & Authenticate (via GP)
            activate PA_PoP
            Note over MU, PA_PoP: Establish secure tunnel
            MU->>PA_PoP: 2. Request access to SaaS App
            PA_PoP->>PA_PoP: 3. Apply Security Policies (FW, SWG, ZTNA, DLP etc.)
            PA_PoP->>SaaS: 4. Forward allowed traffic
            activate SaaS
            SaaS-->>PA_PoP: 5. Response from SaaS App
            deactivate SaaS
            PA_PoP->>PA_PoP: 6. Inspect return traffic
            PA_PoP-->>MU: 7. Deliver response to User
            deactivate PA_PoP
     

Core Value Proposition

Prisma Access aims to solve the challenges of securing a modern, distributed workforce:

Comparison with Traditional Network Security Architectures

Prisma Access offers significant advantages over legacy approaches:

Feature Traditional Architecture (e.g., Hub-and-Spoke MPLS + Central Firewall) Prisma Access (SASE)
Traffic Flow Often backhauled from branches/remote users to central datacenter(s) for security inspection (hairpinning). Direct-to-cloud access. Traffic goes from user/branch to nearest Prisma Access PoP for inspection and secure internet/app access.
User Experience Can suffer from high latency, especially for cloud/SaaS applications due to backhauling. Optimized for low latency via global PoPs and peering. Better performance for cloud apps.
Security Consistency Often inconsistent. Branches might have limited security, remote users rely on endpoint security or split-tunnel VPNs. Consistent policy enforcement and threat protection for all users and locations.
Scalability Scaling central firewall clusters and VPN concentrators can be complex and expensive. Cloud-native elasticity. Palo Alto Networks manages scaling of the infrastructure.
Management Managing disparate security products at multiple locations. Complex VPN management. Centralized policy management via Panorama or cloud console. Infrastructure managed by vendor.
Architecture Focus Securing the network perimeter ("castle and moat"). Securing users, applications, and data, regardless of location (Zero Trust).

Part 2: Core Architecture Deep Dive

Understanding the Prisma Access architecture is key to grasping how it delivers secure connectivity. It consists of several interconnected components managed by Palo Alto Networks, interacting with customer-managed elements.

Global Network Infrastructure

Prisma Access is built upon a global network of Points of Presence (PoPs), referred to as **Compute Locations**. These locations host the necessary infrastructure to deliver security services.

[Conceptual Diagram: World map showing interconnected Prisma Access PoPs/Compute Locations. Arrows indicating Mobile Users and Remote Networks connecting to nearby PoPs. Lines showing connections to Internet/SaaS and back to Corporate Datacenter via Service Connections.]
(Visualization placeholder - Actual diagram would go here)

Security Processing Nodes (SPNs)

Corporate Access Nodes (CANs)

Example Traffic Flow: Mobile User Accessing Internal Resource

This sequence diagram shows the path when a mobile user connects through Prisma Access to reach a resource within the corporate network via a Service Connection.

     sequenceDiagram
        participant MU as Mobile User (GP Client)
        participant PA_PoP as Prisma Access PoP (SPN)
        participant PA_CAN as Prisma Access CAN
        participant SC as Service Connection (IPSec)
        participant CorpFW as Corporate Firewall
        participant IntRes as Internal Resource

        MU->>PA_PoP: 1. Connect & Authenticate
        activate PA_PoP
        MU->>PA_PoP: 2. Request access to Internal Resource
        PA_PoP->>PA_PoP: 3. Apply Security Policies (FW, ZTNA, etc.)
        PA_PoP->>PA_CAN: 4. Route traffic destined for Internal Resource
        activate PA_CAN
        PA_CAN->>CorpFW: 5. Encrypt & Send via Service Connection (IPSec Tunnel)
        activate CorpFW
        Note right of PA_CAN: Traffic traverses SC
        CorpFW->>CorpFW: 6. Decrypt & Apply Local Policy
        CorpFW->>IntRes: 7. Forward request to Resource
        activate IntRes
        IntRes-->>CorpFW: 8. Response from Resource
        deactivate IntRes
        CorpFW->>CorpFW: 9. Apply Local Policy
        CorpFW->>PA_CAN: 10. Encrypt & Send response via SC (IPSec Tunnel)
        deactivate CorpFW
        PA_CAN->>PA_PoP: 11. Route response back to SPN
        deactivate PA_CAN
        PA_PoP->>PA_PoP: 12. Apply Security Policies
        PA_PoP-->>MU: 13. Deliver response to User
        deactivate PA_PoP
     

Management Plane Options

Prisma Access offers two primary management paradigms:

Panorama-Managed Prisma Access

High-Level Panorama Onboarding Flow

This flowchart outlines the typical major steps for onboarding Prisma Access using Panorama management.

        graph TD
            A[Start: Install Cloud Services Plugin] --> B(Configure Cortex Data Lake Connection);
            B --> C{Create/Assign Templates};
            C -- Network/Device Settings --> D(Template Stacks);
            C -- Security/NAT/QoS Policies --> E(Device Groups);
            D --> F[Configure Prisma Access Setup in Plugin];
            E --> F;
            F -- MU/RN/SC Details --> G(Commit to Panorama);
            G --> H(Push Config to Cloud Services Plugin);
            H --> I(Plugin pushes to Prisma Access Cloud);
            I --> J(Monitor Status & Verify Connectivity);
            J --> K[End: Onboarding Complete];
        

Cloud-Managed Prisma Access (Prisma SASE UI)

Logging Architecture: Cortex Data Lake (CDL)

Centralized logging is fundamental to Prisma Access visibility and reporting.

Logging Flow from SPN to CDL

This diagram shows how logs generated during traffic processing are sent to Cortex Data Lake.

graph LR
    A[User Traffic] --> B(Prisma Access SPN);
    B --> C{Policy Enforcement & Log Generation};
    C --> D[Log Stream Secure];
    D --> E(Cortex Data Lake - CDL);
    E --> F((Panorama / Cloud Console / API));
    F --> G[Admin Views Logs/Reports];
    subgraph Prisma Access Cloud
        B
        C
        D
    end
    subgraph Logging & Management
        E
        F
        G
    end

        

IP Address Pools and Planning

Proper IP address management is critical for Prisma Access deployment.

Note: Always refer to the official Palo Alto Networks documentation for the specific IP address ranges used by the Prisma Access infrastructure in your deployed regions.

Part 3: Licensing and Bandwidth Models

Prisma Access licensing is primarily based on the number of users and the amount of bandwidth consumed, differing slightly between mobile users and remote networks.

Licensing Units Breakdown

Remote Network Bandwidth Options

When licensing bandwidth for Remote Networks, customers typically choose one of two models:

Mobile User Licensing Details

Add-on Licenses

Beyond the base license, several security services can be added for enhanced protection (availability may depend on MU vs RN context and license bundles):

Note: Licensing models, bundles, and included features evolve. Always consult official Palo Alto Networks datasheets, licensing guides, or your account team for the most current and specific information.
Next Page →