Prisma Access Panorama Admin
Prisma Access Panorama Admin
(Panorama Managed)
Version 3.2 Preferred and Innovation
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2021-2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
February 21, 2023
Prisma Access Administrator’s Guide (Panorama Managed) 2 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Table of Contents
Prisma Access Overview.................................................................................. 9
Prisma Access.............................................................................................................................10
Prisma Access Infrastructure Management........................................................................ 14
Releases and Upgrades............................................................................................................ 16
Prisma Access Release Types..................................................................................... 16
Prisma Access Upgrade Types................................................................................... 17
Cadence for Software and Content Updates for Prisma Access................................... 20
Prisma Access Dataplane Upgrades..................................................................................... 25
Dataplane Upgrade Overview.................................................................................... 25
Dataplane Upgrade Example.......................................................................................28
Use the Prisma Access App to Get Upgrade Alerts and Updates................................. 32
View Prisma Access Software Versions.............................................................................. 37
Prisma Access Licensing.......................................................................................................... 42
License Enforcement for Prisma Access Mobile User Deployments.................42
Other Required Prisma Access Licenses..................................................................43
Prisma Access Add-On Licenses................................................................................43
Determine Your Prisma Access License Type from Panorama........................... 43
Cheat Sheet: Integrate ADEM with Panorama Managed Prisma Access..........44
Cheat Sheet: Integrate IoT Security with Panorama Managed Prisma
Access............................................................................................................................... 45
Cheat Sheet: Enterprise DLP on Panorama Managed Prisma Access............... 46
Visibility and Monitoring Features in the Prisma Access App............................ 47
Monitor Your Prisma Access Data Transfer Usage............................................... 47
Plan for Prisma Access IP Address Changes...................................................................... 50
IP Address Allocation For Mobile Users on Prisma Access................................. 50
Remote Network IPSec Termination Nodes and Service IP Addresses on
Prisma Access................................................................................................................. 54
IP Address Changes For Remote Network Connections That Allocate
Bandwidth by Location................................................................................................ 55
Service IP and Egress IP Address Allocation for Remote Networks..................57
Retrieve the IP Addresses for Prisma Access.................................................................... 58
Run the API Script Used to Retrieve Prisma Access IP Addresses.................... 61
Prisma Access IP Address Retrieval Using the API Examples............................. 66
Pre-Allocate IP Addresses for Prisma Access Mobile User Locations...............68
Set Up Prisma Access IP Address Change Notifications......................................72
Use Legacy Scripts to Retrieve Loopback Addresses........................................... 73
Zone Mapping............................................................................................................................ 79
Prisma Access APIs...................................................................................................................80
Access the API Using the Browser and Web Interface........................................80
Prisma Access Administrator’s Guide (Panorama Managed) 3 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Table of Contents
Prisma Access Administrator’s Guide (Panorama Managed) 4 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Table of Contents
How the GlobalProtect App Selects a Prisma Access Location for Mobile
Users...........................................................................................................................................196
Explicit Proxy on Prisma Access......................................................................................... 198
How Explicit Proxy Works in Prisma Access........................................................198
How Explicit Proxy Identifies Users....................................................................... 199
Planning Checklist—Explicit Proxy.......................................................................... 200
Set Up Your Explicit Proxy PAC File......................................................................203
Secure Mobile Users with an Explicit Proxy.........................................................206
Monitor and Troubleshoot Explicit Proxy............................................................. 220
Monitor and Log Out GlobalProtect Users in Prisma Access...................................... 223
View GlobalProtect Mobile Users from the Status Tab.....................................223
View GlobalProtect Mobile Users from the Monitor Tab................................. 224
How Prisma Access Counts GlobalProtect Mobile Users..................................225
Manage GlobalProtect App Upgrades in Prisma Access...............................................229
Select the Active GlobalProtect App Version for Prisma Access.....................229
Manage User Access to GlobalProtect App Updates from Prisma Access.... 231
Perform Staged Updates of the GlobalProtect App on Prisma Access...........231
Deploy Explicit Proxy and GlobalProtect or a Third-Party VPN in Prisma
Access........................................................................................................................................ 235
Use Explicit Proxy with GlobalProtect and Third-Party VPNs Examples....... 235
How Explicit Proxy Works With GlobalProtect...................................................236
Requirements and Recommendations for Using Explicit Proxy with
GlobalProtect and Third-Party VPNs..................................................................... 239
Use Explicit Proxy with GlobalProtect...................................................................239
Use Explicit Proxy with Third-Party VPNs............................................................242
Integrate Prisma Access with On-Premises Gateways.................................................. 244
Manage Priorities for Prisma Access and On-Premises Gateways............................. 247
Set Equal Gateway Priorities for On-Premises and Prisma Access
Gateways....................................................................................................................... 247
Set a Higher Gateway Priority for an On-Premises Gateway...........................248
Set Higher Priorities for Multiple On-Premises Gateways................................249
Configure Priorities for Prisma Access and On-Premises Gateways...............250
Allow Mobile Users to Manually Select Specific Prisma Access
Gateways....................................................................................................................... 259
Allow Listing for Mobile Users—GlobalProtect Deployments..................................... 260
Manage Allow Listing for Existing Mobile User Deployments......................... 261
Manage Allow Listing for New Prisma Access Deployments........................... 262
Allow Listing Examples for Autoscale Events.......................................................264
Fields in the Egress IP Allow List table..................................................................265
Report Prisma Access Website Access Issues.................................................................269
Prisma Access Administrator’s Guide (Panorama Managed) 5 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Table of Contents
Prisma Access Administrator’s Guide (Panorama Managed) 6 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Table of Contents
Prisma Access Administrator’s Guide (Panorama Managed) 7 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Table of Contents
Prisma Access Administrator’s Guide (Panorama Managed) 8 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Read the following sections to get an overview of what Prisma Access is, how it can secure your
organization’s resources, who owns and manages the infrastructure and network components,
and how to retrieve infrastructure and troubleshooting information.
• Prisma Access
• Prisma Access Infrastructure Management
• Releases and Upgrades
• Cadence for Software and Content Updates for Prisma Access
• Prisma Access Dataplane Upgrades
• Use the Prisma Access App to Get Upgrade Alerts and Updates
• View Prisma Access Software Versions
• Prisma Access Licensing
• Plan for Prisma Access IP Address Changes
• Retrieve the IP Addresses for Prisma Access
• Zone Mapping
• Prisma Access APIs
• Troubleshoot the Prisma Access Deployment
• Prisma Access Deployment Progress and Status
9
Prisma Access Overview
Prisma Access
As your business expands globally with new remote network locations popping up around the
globe and mobile users roaming the world, it can be challenging to ensure that your business
remains connected and always secure. Prisma Access uses a cloud-based infrastructure, allowing
you to avoid the challenges of sizing firewalls and compute resource allocation, minimizing
coverage gaps or inconsistencies associated with your distributed organization. The elasticity of
the cloud scales as demand shifts and traffic patterns change. The cloud service facilitates next-
generation security deployment to remote networks and mobile users by leveraging a cloud-based
security infrastructure managed by Palo Alto Networks. The security processing nodes deployed
within the service natively inspect all traffic in order to identify applications, threats, and content.
Prisma Access provides visibility into the use of SaaS applications and the ability to control which
SaaS applications are available to your users.
Prisma Access Administrator’s Guide (Panorama Managed) 10 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
With Prisma Access, Palo Alto Networks deploys and manages the security infrastructure
globally to secure your remote networks and mobile users. Prisma Access includes the following
components:
• Cloud Services Plugin—Panorama plugin that enables both Prisma Access and Cortex Data
Lake.
This plugin provides a simple and familiar interface for configuring and viewing the status of
Prisma Access. You can also create Panorama templates and device groups, or leverage the
templates and device groups you may have already created, to push configurations and quickly
enforce consistent security policy across all locations.
Prisma Access Administrator’s Guide (Panorama Managed) 11 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 12 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
• Prisma Access for Clean Pipe—The Prisma Access for Clean Pipe service allows organizations
that manage the IT infrastructure of other organizations, such as service providers, MSSPs, or
Telcos, to quickly and easily protect outbound internet traffic for their tenants.
Prisma Access for Clean Pipe has its own requirements; however, it requires the same
Panorama and Cortex Data Lake licenses as the other Prisma Access products described in this
section.
Prisma Access forwards all logs to Cortex Data Lake. You can view the logs, ACC, and reports
from Panorama for an aggregated view into your remote network and mobile user traffic. To
enable logging for Prisma Access, you must purchase a Cortex Data Lake license. Log traffic does
not use the licensed bandwidth you purchased for Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 13 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 14 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
• Service Connectivity—You provide the connectivity to the Prisma Access gateway for mobile
users (for example, provide an ISP), and you also provide the on-premises devices used as the
termination points for the IPSec tunnels used by service connections and remote network
connections.
• Onboarding—You onboard the mobile users, HQ/Data center sites, and branch sites.
Prisma Access Administrator’s Guide (Panorama Managed) 15 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
You can retrieve the status of all cloud services, including Prisma Access and Cortex
Data Lake, along with a historical record of the uptime of each service, by accessing
the https://sase.status.paloaltonetworks.com/ website. You can also sign up for
email or text message updates at this site to be notified in advance when infrastructure
updates are planned and real-time notifications when updates occur, and when Palo Alto
Networks creates, updates, or resolves an incident.
Prisma Access Administrator’s Guide (Panorama Managed) 16 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Lab tenants are not covered under the Prisma Access Service Level Agreement (SLA),
and customers are strongly advised to use the tenants only for pre-production testing
and qualification purposes.
• Infrastructure Maintenance—Includes incremental features and optimizations. In some cases,
Palo Alto Networks may combine a hotfix with infrastructure maintenance.
Notification—Palo Alto Networks provides you with the following notifications:
• Cloud Services Plugin Release (Panorama Managed Deployments Only)—If Prisma Access
requires a new plugin, it is made available to download via the Palo Alto Networks Customer
Support Portal (CSP) and on Panorama by the following Tuesday (by 5 p.m. PST) after all
required upgrades have been successfully completed.
Notification—The service will send an email notification via Prisma Access Insights after the
plugin has been made available for the download.
Prisma Access may force all tenants to upgrade to a specific Cloud Services plugin
version to maintain backward compatibility and supported software versions. Such
enforcement activity will provide a 14-day advance notice (via Prisma Access Insights and
the sase.status.paloaltonetworks.com page) to plan for the upgrade of the plugin. The service
strongly recommends that you upgrade to the latest plugin as soon as it is available to
download.
Prisma Access Administrator’s Guide (Panorama Managed) 17 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
• Dataplane Upgrade—Palo Alto Networks upgrades the Prisma Access dataplane that enables
traffic inspection and security policy enforcement on your network and user traffic.
You use the Prisma Access app to sign up for dataplane upgrade email alert notifications and
indicate your upgrade preferences.
• Cloud Services Plugin Upgrade (Panorama Managed Deployments Only)—When a new plugin
release becomes available, your network administrator will need to upgrade the Cloud Services
plugin on the Panorama appliance that manages Prisma Access.
• Panorama Software Version Upgrade (Panorama Managed Deployments Only) —An upgrade
of your Panorama software might be required to ensure continued compatibility with Prisma
Access.
The following table shows you what is included with each release, including the maintenance
window we provide and any impact to your Prisma Access service.
Prisma Access Administrator’s Guide (Panorama Managed) 18 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Cloud Services Plugin You install the plugin when it Prisma Access might require
Upgrade (Panorama becomes available. you to upgrade all tenants
Managed Deployments Only) to a specific plugin version
to maintain backward
compatibility and supported
software versions.
During the plugin
upgrade, you cannot make
configuration changes and
commits in Panorama.
Panorama Software Version You schedule and perform When Prisma Access
Upgrade (Panorama the upgrade on the Panorama upgrades its infrastructure
Managed Deployments Only) that manages Prisma Access. and dataplane after a major
release, the upgrades can
be incompatible with earlier
Panorama versions. Because
of the fast-paced release
of Prisma Access and the
Cloud Services plugin, the
software compatibility
(end-of-support) dates for
Panorama are shorter than
the software end-of-life
dates for Panorama releases
and apply to Panorama
version compatibility with
Prisma Access only. For
more information, including
end-of-support dates for
Panorama when used with
Prisma Access, see Prisma
Access and Panorama Version
Compatibility in the Palo
Alto Networks Compatibility
Matrix.
Prisma Access Administrator’s Guide (Panorama Managed) 19 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 20 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 21 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 22 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 23 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 24 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Palo Alto Networks strongly suggests that you select locations that reflect your entire
deployment. For example, if you have a mobile user, service connection, and remote
network deployment, select a location or locations that have all deployment types.
• Prisma Access will perform phase #1 of the upgrade on the selected location or locations
within the local time window selected for those locations.
• If the selected upgrade locations have any combination of Mobile Users—GlobalProtect,
Mobile Users—Explicit Proxy, Service Connections, or Remote Networks, the dataplane for
each deployment will be upgraded to the required dataplane version, as described later in this
section.
• Once the upgrade is complete in the first location, you’ll receive an email notification via the
Prisma Access app. Palo Alto Networks recommends that you monitor the service for any new
issues that occur immediately after the dataplane upgrade.
Prisma Access Administrator’s Guide (Panorama Managed) 25 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
• In an unlikely occurrence where you see a new issue, report the issue to Palo Alto Networks
technical support.
The technical support team will investigate the issue and take corrective actions that may also
include rolling back to the previous dataplane version. This decision will be communicated to
you via the technical support case.
• If there are no new issues or a new issue is not upgrade-related, Prisma Access will proceed
with the dataplane upgrade on the following weekend.
• The upgrade of the remaining locations will take place during the same time window you
selected for the first upgrade (in local time).
• After the dataplane upgrade completes, you will be notified via email alert.
The following figure shows the timeline used for the upgrade and includes the tasks that you
will need to perform for the dataplane upgrade (shown in green), as well as the steps that Prisma
Access performs.
The following section provides more details about the dataplane upgrade process.
After you sign up for notifications, Prisma Access informs you of the two weekend dates that
will be used for the upgrade process and sends these notifications 21 days, 3 days, and 24 hours
before the first phase of the upgrade will occur. The upgrade process occurs in two phases:
• Phase #1 upgrades the location or locations you chose on the first weekend using the time
window you provided and notifies you via email when the upgrade is complete. If you did not
Prisma Access Administrator’s Guide (Panorama Managed) 26 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
choose the locations to upgrade first, or did not select a time window, Prisma Access makes
the choices for you.
Palo Alto Networks attempts to upgrade the locations during the four-hour window
that you select via the Prisma Access app. However, completing the required upgrades
during this window is best-effort and Palo Alto Networks cannot guarantee that the
locations will be upgraded during that time. If the locations cannot be upgraded within
the specified time window, you will receive an email notification. Palo Alto Networks
recommends that you schedule a change request window starting at 8 p.m. local time
on Friday and ending at 8 p.m. local time on Sunday for each of the two weekends
when the dataplane upgrade occurs.
Prisma Access makes the following changes to your deployment during Phase #1 of the
upgrade.
Prisma Access Administrator’s Guide (Panorama Managed) 27 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Between the first and second upgrades, monitor the first upgraded locations and perform
connectivity, performance, routing, and logging testing to make sure that the locations
upgraded successfully. If you encounter a service-impacting failure after the upgrade, open a
Support Case with Palo Alto Networks Technical Support for assistance. Palo Alto Networks
will attempt to resolve the issue by rolling back the dataplane to a previous dataplane version
within 24 hours.
• Seven days after Prisma Access upgrades the first location, Prisma Access upgrades the
remainder of your locations (Phase #2 upgrade), using the same time window you selected for
the first phase, and notifies you via email when the upgrade is complete.
The upgrade window can be longer. For example, if Phase #2 occurs during a national
holiday in the United States of America, the second phase of the upgrade happens 14
days after the first phase instead of seven. The notifications you receive in the Prisma
Access app show you the specific timeline for the upcoming dataplane upgrade.
The Prisma Access dataplane version is updated in the UI only after all phases of the upgrade
(both Phase #1 and Phase #2) have been completed.
Prisma Access Administrator’s Guide (Panorama Managed) 28 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
In this example, you selected a single location (US West) to upgrade first, and requested a four-
hour upgrade window of 8:00 a.m. to 12:00 noon Saturday for the upgrade.
On the first upgrade weekend (Phase #1), the dataplane upgrade for one of the MU-SPNs and the
primary node of the SC-CAN in the US West location takes place between 8:00 a.m. and 12:00
p.m. Pacific Time on Saturday.
To determine the MU-SPN that was upgraded, contact your authorized Palo Alto
Networks representative or partner.
Prisma Access Administrator’s Guide (Panorama Managed) 29 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Seven days after the first location is upgraded, Palo Alto Networks upgrades the remaining
components (Phase #2), including all the MU-SPNs and SC-CANs in the deployment, using the
same four-hour time window as was used for the first phase of the upgrade (8:00 a.m. to 12:00
p.m. on Saturday).
In this example, Prisma Access uses the following time zone information when upgrading the
dataplane:
• The remaining MU-SPN (MU-SPN 2) in the US West location is upgraded.
• The Japan Central MU-SPN and SC-CAN are upgraded using the local time in Japan.
• The UK MU-SPN and SC-CAN are upgraded using the local time in the UK.
• The US Southwest MU-SPN is upgraded using Pacific Time.
Prisma Access Administrator’s Guide (Panorama Managed) 30 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 31 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
STEP 2 | Check your notifications to be made aware of upcoming dataplane upgrades; then, select
your upgrade preferences using one of the following methods.
• Select Insights > Prisma Access Upgrade > Upgrade Preferences.
• Log in to the Prisma Access app, view the banner at the top of the page for your scheduled
upgrade, and select Click here.
• Check your email for notifications for your scheduled upgrade and click the hyperlink in the
email.
• Select Insights > Prisma Access Upgrade > Upgrade Preferences.
The Prisma Access Upgrade Dashboard displays.
STEP 3 | (Optional) Read the Upgrade Process to learn more about how the upgrade process works.
Prisma Access Administrator’s Guide (Panorama Managed) 32 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
2. Select the Preferred Prisma Access Locations that you want to upgrade first.
Palo Alto Networks strongly suggests that you select locations that reflect your
entire deployment. For example, if you have a mobile user, service connection,
and remote network deployment, select a location or locations that have all
deployment types.
Prisma Access Administrator’s Guide (Panorama Managed) 33 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
After the first set of Prisma Access locations is upgraded successfully, the Prisma Access
team monitors these locations for seven days, and then upgrades all remaining Prisma
Access locations. Selecting a single location or a small number of locations gives you a
chance to monitor these locations before the remainder of your locations are upgraded
one week later.
If no locations display in the drop-down list, you either selected multiple tenants that
have no common locations deployed or you have not yet onboarded any locations for
the tenants you selected.
3. Select the Preferred time for the upgrade window from the list of available options.
Choose from the following upgrade time windows. The time windows are local to the
location or locations being upgraded and are all four hour windows:
• Friday 8:00 p.m. to 12:00 a.m. (midnight)
• Saturday 12:00 a.m. (midnight) to 4:00 a.m.
• Saturday 4:00 a.m. to 8:00 a.m.
• Saturday 8:00 a.m. to 12:00 p.m. (noon)
• Saturday 12:00 p.m. (noon) to 4:00 p.m.
• Saturday 4:00 p.m. to 8:00 p.m.
Palo Alto Networks uses your preference to begin the rollout at the Prisma Access
location or locations you selected.The last submission that occurred seven days before
the scheduled start date will be chosen by the service for the upgrade. If you make
changes, it might take up to 30 minutes for the changes you made to be displayed in
Prisma Access Administrator’s Guide (Panorama Managed) 34 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
the Upgrade Dashboard on Insights. You will be notified via email alert when the Prisma
Access has processed and completed the changes.
If you do not provide your upgrade preferences seven days before the scheduled
upgrade window, Palo Alto Networks will automatically select the first set of
your deployed Prisma Access locations, notify you of the selection, and upgrade
the selected locations on the scheduled date. The remaining Prisma Access
locations, if any, in your deployment will be upgraded seven days after the
selected time window.
4. Select the Software Version that you want to upgrade to, if more than one version is
available.
5. Submit your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 35 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
STEP 5 | After your rollout begins, select Insights > Prisma Access Upgrade > Upgrade Status
by Tenants and view the Upgrade Status by Location. This page displays the following
information for each location that is being upgraded:
• The name of the tenant that is being upgraded.
• The start and finish date of the upgrade process.
• The dataplane version that the tenant is being upgraded to.
• The preferred time window for the upgrade.
• The initial locations that are being upgraded.
• The date that the remaining locations will be upgraded.
In addition, a table displays the locations being upgraded, the start date and time window of
the upgrade, and the time zone used for the upgrade. The Upgrade Status column provides
you with the following information:
STEP 6 | After the first set of locations has completed the dataplane upgrade, monitor the upgraded
locations and perform connectivity, performance, routing, and logging testing to make sure
that they upgraded successfully.
STEP 7 | When the second set of locations is scheduled to be upgraded, monitor those locations
and check their status by selecting Insights > Prisma Access Upgrade > Upgrade Status by
Tenants.
Prisma Access sends you an email notification after the dataplane upgrade is complete.
Prisma Access Administrator’s Guide (Panorama Managed) 36 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
The Service Setup page provides you with the following information:
Prisma Access Administrator’s Guide (Panorama Managed) 37 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Area Description
Generate Certificate for GlobalProtect App If you have enabled GlobalProtect App Log
Log Collection and Autonomous DEM Collection for Troubleshooting, or to enable
Autonomous Digital Experience Management
(ADEM) for your mobile users, click here
to generate a certificate. This certificate
allows GlobalProtect app to authenticate
Prisma Access Administrator’s Guide (Panorama Managed) 38 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Area Description
with Cortex Data Lake (to collect logs) and
Autonomous DEM. When you generate the
certificate, Prisma Access also downloads
the certificate to the Device Certificates in
Panorama Device > Certificate Management
> Certificates > Device Certificates under
the Mobile_User_Template template in the
Shared to be pushed to the mobile device.
Area Description
Prisma Access Administrator’s Guide (Panorama Managed) 39 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Area Description
Prisma Access. Use this information to plan your
Panorama upgrade in advance of its EoS date.
Generate Certificate for GlobalProtect App If you have enabled GlobalProtect App Log
Log Collection and Autonomous DEM Collection for Troubleshooting, or to enable
Autonomous Digital Experience Management
(ADEM) for your mobile users, click here
to generate a certificate. This certificate
allows GlobalProtect app to authenticate
with Cortex Data Lake (to collect logs) and
Autonomous DEM. When you generate the
certificate, Prisma Access also downloads
the certificate to the Device Certificates in
Panorama Device > Certificate Management
> Certificates > Device Certificates under
the Mobile_User_Template template in the
Shared to be pushed to the mobile device.
Prisma Access Administrator’s Guide (Panorama Managed) 40 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Area Description
Prisma Access Administrator’s Guide (Panorama Managed) 41 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Your Prisma Access license edition determines the security capabilities that are available
to you. If you use any capability in security rules or profiles that is unsupported based on
your license type, Prisma Access removes those configurations and those capabilities are
not enforced in your Prisma Access tenants until you update Prisma Access with a license
edition that supports those capabilities. To find the capabilities included with your license,
see the Prisma Access Licensing Guide.
All license editions are available for Local and Worldwide Prisma Access locations. When you
purchase a license with Worldwide locations, you can deploy Prisma Access in all Prisma Access
locations. When you purchase a license with Local locations, you can select up to five Prisma
Access locations.
Prisma Access uses units in licenses, and uses the following definitions for a unit:
• For mobile user deployments, a unit is defined as one mobile user. When you assign units in
Prisma Access from your Mobile users license, each unit allows a mobile user to utilize Prisma
Access—GlobalProtect, Prisma Access—Explicit Proxy, or both GlobalProtect and Explicit
Proxy.
• For remote network and Clean Pipe deployments, a unit is defined as 1 Mbps of bandwidth.
When a Prisma Access license expires, you can still use the service and collect logs for 15
days after license expiration. You cannot make changes to configuration. Prisma Access
shuts down its instances 15 days after license expiration and completely deletes the
instances and tenants 30 days after license expiration.
Prisma Access Administrator’s Guide (Panorama Managed) 42 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
• In addition, if you use Prisma Access for users—GlobalProtect, the GlobalProtect app is
required on each supported endpoint. The GlobalProtect app is not required for Mobile Users—
Explicit Proxy deployments.
Prisma Access Administrator’s Guide (Panorama Managed) 43 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Licenses available before November 17, 2020, contain the words GlobalProtect Cloud Service in
the license areas and are divided by remote networks, mobile users, or Clean Pipe.
This feature requires the Autonomous DEM add-on license to use with Panorama Managed
Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 44 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Check what’s available with your Panorama Managed Prisma Access subscription.
Get Started
Here’s how to get up and running with ADEM on Panorama Managed Prisma Access.
Learn about how ADEM works for a Panorama Managed Prisma Access Mobile Users—
GlobalProtect and Remote Network deployment.
Enable ADEM for your Mobile Users—GlobalProtect and Remote Networks deployments.
• Enable ADEM in Panorama Managed Prisma Access for a Mobile Users—GlobalProtect
deployment
• Enable ADEM in Panorama Managed Prisma Access for a Remote Network deployment
Learn how to use Autonomous DEM in Prisma Access to troubleshoot common help desk
scenarios, such as complaints about application access, or end users reporting performance
issues.
This feature requires the IoT Security add-on license to use with Panorama Managed Prisma
Access.
Check what’s available with your Panorama Managed Prisma Access subscription.
IoT Security is an on-demand cloud subscription service designed to discover and protect
the growing number of connected “things” on your network. Unlike IT devices such as laptop
computers that perform a wide variety of tasks, IoT devices tend to be purpose-built with a
narrowly defined set of functions. As a result, IoT devices generate unique, identifiable patterns
of network behavior. Using machine learning and AI, IoT Security recognizes these behaviors and
identifies every device on the network, creating a rich, context-aware inventory that’s dynamically
maintained and always up to date.
Prisma Access Administrator’s Guide (Panorama Managed) 45 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
After it identifies a device and establishes a baseline of its normal network activities, it continues
monitoring its network activity so it can detect any unusual behavior indicative of an attack or
breach. If it detects such behavior, IoT Security notifies administrators through security alerts in
the IoT Security portal and, depending on each administrator’s notification settings, through email
and SMS notifications.
You get the same benefits from integrating IoT Security with Prisma Access as you do from
integrating it with next-generation firewalls. IoT is available as an add-on; after you purchase the
add-on, you activate your product during Prisma Access installation.
Get Started
Here’s how to get up and running with IoT Security on Panorama Managed Prisma Access.
Learn how Prisma Access works with IoT Security instead of next-generation firewalls.
Check the status of your IoT Security Integration with Prisma Access.
This feature requires the Enterprise DLP add-on license to use with Panorama Managed Prisma
Access.
Check what’s available with your Panorama Managed Prisma Access subscription.
Data loss prevention (DLP) is a set of tools and processes that allow you to protect sensitive
information against unauthorized access, misuse, extraction, or sharing. Using the Enterprise
DLP plugin with Prisma Access enables you to use Prisma Access to enforce your organization’s
data security standards and prevent the loss of sensitive data across mobile users and remote
networks.
Prisma Access integrates its DLP capability to allow you to use the same DLP capabilities as
that used in Panorama and on next-generation firewalls. This integration provides you with an
improved experience that allows you to use the same DLP patterns, profiles, and rules as those
used in next-generation firewalls.
Use DLP with Panorama Managed Prisma Access by installing the Enterprise DLP plugin on the
same Panorama appliance that manages Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 46 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
If you are migrating from an existing DLP on Prisma Access license to the DLP plugin,
the locations of data patterns and data filtering profiles move in Panorama after the
migration:
• Data patterns move from Objects > Custom Objects > Data Patterns to Objects >
DLP > DLP Data Patterns.
• Data filtering profiles move from Objects > Security Profiles > Data Filtering to
Objects > DLP > DLP Data Filters.
Prisma Access Administrator’s Guide (Panorama Managed) 47 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access tracks your data transfer for mobile users, remote networks, and Clean Pipe per
unit, and tracks the data starting on the date of your license activation. Units are based on the
type of Prisma Access license you have; for mobile users, a unit is one mobile user and for remote
networks, a unit is 1 Mbps.
Prisma Access allocates 250 GB of data for each unit per year, starting on the date of your license
activation. If you have a license with multiple types of Prisma Access deployments, Prisma Access
combines the units for all licenses you have to determine the maximum amount of data you can
transfer during a 1 year period. The following table provides examples of the data transfer limit by
license type and units purchased.
If you have a multitenant deployment, data transfer across all tenants must add up to the total
data transfer limit based on the allocated units in your license.
1,000 Mobile Users and Remote Networks 250 Terabytes/Year (250 GB * 1,000 units)
1,000 Mobile Users and Remote Networks 500 Terabytes/Year (250 GB * 2,000 units)
1,000 Mobile Users only
1,000 Mobile Users and Remote Networks 500 Terabytes/Year (250 GB * 2,000 units)
1,000 Remote Networks only
Field Description
Prisma Access Administrator’s Guide (Panorama Managed) 48 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Field Description
and Mobile Users—Explicit Proxy), and includes both
internal and internet traffic.
Prisma Access Administrator’s Guide (Panorama Managed) 49 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 50 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Then a large number of users log in to the Seoul location. To accommodate these extra users,
Prisma Access adds a second gateway for the Seoul location, takes one of the gateway addresses
from the first Seoul gateway (51.1.1.4) and assigns it to the second Seoul gateway. It then adds
two additional IP addresses (51.1.1.5 and 51.1.1.6 in this example) and adds them to the two
Seoul gateways.
Prisma Access Administrator’s Guide (Panorama Managed) 51 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Then you add another location, Tokyo, in the Asia Pacific region. Prisma Access creates two new
IP addresses for the new gateway (51.1.1.7 and 51.1.1.8).
Each time you add a location or have a scaling event, you should retrieve the new egress and
gateway IP addresses that Prisma Access assigned and add them to an allow list in your network.
Prisma Access keeps two sets of IP addresses at all times for all active gateways in each location.
Prisma Access Administrator’s Guide (Panorama Managed) 52 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access allocates the loopback IP addresses from the infrastructure subnet that you specify
when you enable the Prisma Access infrastructure. You can add the entire infrastructure subnet
to an allow list and avoid planning for mobile user loopback IP changes during an infrastructure or
dataplane upgrade. To find the infrastructure subnet, select Panorama > Cloud Services > Status
> Network Details > Service Infrastructure and view the Infrastructure Subnet.
Retrieve these addresses using the API used to retrieve public IP and loopback IP addresses.
The following example shows a Prisma Access deployment that has an infrastructure subnet of
172.16.0.0/16. Prisma Access has assigned loopback IP addresses 172.16.0.1 and 172.16.0.3 for
mobile users from the infrastructure subnet.
After in infrastructure or dataplane upgrade (for example, to prepare for a new release of the
Cloud Services plugin), Prisma Access assigns two different IP addresses for mobile users from
the infrastructure subnet (172.16.0.1 is changed to 172.16.0.2 and 172.16.0.3 is changed to
172.16.0.4).
Prisma Access Administrator’s Guide (Panorama Managed) 53 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 54 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
When you onboard a remote network in an Ireland compute location, you are given a choice of
two IPSec termination nodes, because the total bandwidth is more than 1,000 Mbps.
Each IPSec termination node has its own Service IP address, as can be seen in Panorama > Cloud
Services > Status > Network Details > Remote Networks.
In addition, egress IP addresses can change if Prisma Access creates a new Prisma Access
Locations by Compute Location and you decide to use this new compute location
with locations you have already onboarded. See Add a New Compute Location for a
Deployed Prisma Access Location for details.
Prisma Access Administrator’s Guide (Panorama Managed) 55 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
These bandwidth guidelines apply only when you upgrade an existing connection. A single remote
network connection, even a 1000 Mbps (Preview) connection, always receives a single Service IP
Address, regardless of its size.
The 1000 Mbps bandwidth option is in preview mode. The throughput during preview is
delivered on a best-effort basis and the actual performance will vary depending upon the
traffic mix.
The following example shows three remote network connections in the same location, each with a
bandwidth of 150 Mbps. Since the total bandwidth is 500 Mbps, Prisma Access assigns a single IP
address for all connections in the location.
The following example shows the bandwidth of remote network connection A being increased
from 150 Mbps to 300 Mbps. Since the total bandwidth of all connections is now more than 500
Mbps, Prisma Access assigns a new service IP address for the connection with the additional
bandwidth. The other service IP addresses remain unchanged.
Conversely, given four remote networks with a bandwidth of 100 Mbps, if you increase the
bandwidth of one of the remote networks to 100 Mbps, the Service IP address of that remote
network does not change because the total bandwidth is now 500 Mbps.
Prisma Access Administrator’s Guide (Panorama Managed) 56 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
If you reduce the bandwidth of a remote network connection, the Service IP address does
not change.
To find the service IP addresses in Panorama, select Panorama > Cloud Services > Status >
Network Details tab and click the Remote Networks radio button to display the Service IP
Address for the remote networks, or use the API script.
Service connections do not support language localization because egress to the internet
is not supported over service connections. Prisma Access allocates only one service IP
address per service connection, and that IP address is geographically registered to the
compute location that corresponds to the location you specify during onboarding.
The following example shows a customer deployment with two remote network locations
deployed in Canada: Central Canada and Canada East. Prisma Access assigned the same Service
IP Address to both locations. When you configure the remote network tunnel, use this IP address
as the peer IP address when you create the IPSec tunnel for the remote network connection.
However, Canada East uses a different default language (French) than Central Canada (English).
For this reason, Prisma Access assigns them different egress IP addresses. If you run the API script
for egress IP addresses, you will receive two different IP addresses for these two locations.
Prisma Access Administrator’s Guide (Panorama Managed) 57 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
If you have a Mobile Users—GlobalProtect deployment, you can use the Prisma Access
UI instead of this API to manage public IP address allocation and confirm that the IP
addresses have been added to your allow lists before Prisma Access releases the IP
addresses. In this way, Prisma Access only provisions the IP addresses that you have allow
listed.
The following table provides you with a list of the IP address that Prisma Access uses for each
deployment type, along with the keyword you use when you run the API script to retrieve the IP
addresses, and describes whether or not you should add them to your organization’s allow lists.
Prisma Access Administrator’s Guide (Panorama Managed) 58 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Mobile Users—Explicit Proxy Authentication Cache Service The address for the Prisma
(ACS) Access service that stores the
authentication state of the
explicit proxy users.
This address is only used for
explicit proxy for mobile users.
Prisma Access Administrator’s Guide (Panorama Managed) 59 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 60 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
This command does not retrieve loopback addresses; to retrieve loopback IP addresses,
use the legacy API.
If you have already generated an API key, the Current Key displays. If you haven’t yet
generated a key or want to replace the existing key to meet audit or compliance check
for key rotation, click Generate New API Key for a new key.
STEP 2 | Create a .txt file and put the API command options in the file.
Using the API the command to use is a two-step process. First, you create a .txt file, specifying
the parameters for the IP addresses to retrieve, and save the file in a folder that is reachable
Prisma Access Administrator’s Guide (Panorama Managed) 61 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
from the location where you run the command. Then, you run the API and specify the name
and location of the .txt file you created in the command.
Specify the following keywords and arguments in the .txt file. See Prisma Access IP Address
Retrieval Using the API Examples for examples. The examples in this document use a file name
of options.txt but you can specify any file name, as long as you reference it in the command.
Prisma Access Administrator’s Guide (Panorama Managed) 62 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 63 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
{
"serviceType": "service-type",
"addrType": "address-type",
"location": "location"
}
Prisma Access Administrator’s Guide (Panorama Managed) 64 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
• To use the legacy API, enter the following command. This command uses a legacy API
endpoint that will be deprecated in May 2022:
Where option.txt is the .txt file you created in Step 2 and Current-API-Key is the Prisma Access
API key.
For example, given a .txt file name of option.txt and an API key of 12345abcde, use the
following API command to retrieve the public IP address for all locations:
The API command can return a large amount of information. To make the output more
readable, if you have Python installed, you can add | python -m json.tool at
the end of the CURL command.
{
"result": [
{
"address_details": [
{
"address": "1.2.3.4"
"allow_listed": false
"addressType": "address-type"
"serviceType": "service-type"
}
],
"addresses": [
"1.2.3.4"
]
"zone": "zone-name",
"zone_subnet": [zone-subnet
]
},
Prisma Access Administrator’s Guide (Panorama Managed) 65 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
"status": "success"
Where:
• address_details shows the details of the address for each location.
• serviceType shows the type of IP address (either remote network (remote_network),
Prisma Access gateway (gp_gateway), Prisma Access portal (gp_portal), or Clean Pipe
(clean_pipe).
• addressType specifies the type of address specified with the addrType keyword (either
all, active, or pre-allocated if you Pre-Allocate IP Addresses for Prisma Access Mobile
User Locations).
• address shows the IP address you need to add to your allow lists.
If the API returns multiple IP addresses, Prisma Access summarizes the IP addresses in
the addresses field.
• addresses lists all the IP addresses for the location that you need to add to your allow lists.
• zone is the Prisma Access location associated with the IP addresses.
• zone_subnet is the subnet for mobile user gateways and portals. Prisma Access also
provides this subnet if you Pre-Allocate IP Addresses for Prisma Access Mobile User
Locations.
If there are any problems with the options in the .txt file, the API returns an error similar to the
following:
STEP 4 | Update the allow lists on your on-premises servers or SaaS application policy rules with the
IP addresses you retrieved.
Prisma Access Administrator’s Guide (Panorama Managed) 66 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
{
"serviceType": "gp_g
ateway",
"addrType": "active"
,
"location": "deploye
d"
}
Prisma Access Administrator’s Guide (Panorama Managed) 67 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Palo Alto Networks recommends that you only pre-allocate IP addresses for locations that
you want to onboard later.
Prisma Access Administrator’s Guide (Panorama Managed) 68 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
STEP 2 | Pre-allocate the mobile user egress IP addresses by creating a .txt file and specifying the
following options in the .txt file you create.
Enter the following text in the .txt file:
• Mobile Users—GlobalProtect Deployments:
{
"actionType": "pre_allocate",
"serviceType": "gp_gateway",
"location": ["location"]
}
{
"actionType": "pre_allocate",
"serviceType": "swg_proxy",
"location": ["location"]}
Where location is the Prisma Access location or locations where you want to pre-allocate the
IP addresses. If you enter multiple locations, use brackets around the set of locations and
separate each location entry with quotes, a comma, and a space (for example, ["location1",
"location2", "location3"], and so on).
Enter a maximum of 12 locations. Entering more than 12 locations might cause timeout errors
when Prisma Access retrieves the pre-allocated IP addresses.
STEP 3 | Enter the CURL command as shown in Step 3 in Run the API Script Used to Retrieve Prisma
Access IP Addresses.
STEP 4 | Retrieve the IP addresses and subnets you requested, including their validity period, by re-
opening the .txt file, removing the existing information, and editing it.
• Mobile Users—GlobalProtect Deployments:
• To retrieve all pre-allocated IP addresses, enter the following text in the .txt file.
{
"serviceType": "all",
"addrType": "pre_allocated",
"location": "all"
Prisma Access Administrator’s Guide (Panorama Managed) 69 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
• To retrieve all pre-allocated IP addresses for Prisma Access portals for a given location,
enter the same information in the .txt file but substitute “all” with “gp_portal” in
the .txt file.
• Mobile Users—Explicit Proxy Deployments:
To pre-allocate all IP addresses you need to add to allow lists for an explicit proxy
deployment, enter the following text in the .txt file.
{
"actionType": "pre_allocate",
"serviceType": "swg_proxy",
"location": ["all"]
}
Palo Alto Networks recommends that you enter all so you can retrieve all required pre-
allocated egress IP addresses to add to your allow lists.
STEP 5 | Re-enter the CURL command as shown in Step 3 in Run the API Script Used to Retrieve
Prisma Access IP Addresses to retrieve the pre-allocated addresses.
Prisma Access returns the information in the following format:
"result": [
{
"zone": "prisma-access-zone1",
"addresses": [
["ip-address1","ip-address2"]
"zone_subnet" :
[subnet-and-mask1","subnet-and-mask2"]
"address_details":[
{"address":"ip-address1",
"service_type":"service-type",
"addressType":"pre-allocated",
"expiring_in" : "validity-period" },
{"address":"ip-address2",
"service_type":"gp_gateway",
"addressType":"pre-allocated",
"validity_period_remaining" : "90
days" } ,
Prisma Access Administrator’s Guide (Panorama Managed) 70 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
},
Variable Explanation
ip-address1 and ip-address2 The egress IP addresses that Prisma Access has
pre-allocated for the specified location.
Prisma Access retrieves two IP addresses for
each location; you must add both of these IP
addresses to your allow lists.
subnet-and-mask1 and subnet-and-mask2 The subnets that Prisma Access has pre-
allocated and reserved for the egress IP
addresses in your deployment.
You could receive an error if you attempt to pre-allocate IP addresses for locations that meet
one of the following criteria:
• You have already onboarded the location.
• You onboarded, then deleted the location.
In this case, enter the following text in the .txt file to retrieve the Mobile Users—
GlobalProtect IP addresses for the location:
{
"serviceType": "gp_gateway",
"addrType": "all",
"location": "all"
Prisma Access Administrator’s Guide (Panorama Managed) 71 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
• You have reached the maximum number of mobile user locations allowed by your license
and cannot add any more locations.
• You entered the location name incorrectly.
• You entered a serviceType other than gp_gateway.
• you entered an actionType other than pre_allocate.
When you receive a notification, you must follow a two-step process. First, you must manually or
programatically retrieve the IP or loopback addresses. Then, you must update the IP addresses in
your organization’s appropriate allow list to ensure that users do not experience any disruption in
service.
Prisma Access sends this notification a few seconds before the new IP address becomes
active. We recommend that you use automation scripts to both retrieve and add the new
IP addresses to an allow list in your network.
Prisma Access Administrator’s Guide (Panorama Managed) 72 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
STEP 2 | Add an IP Change Event Notification URL where you can be notified of IP address changes
in your Prisma Access infrastructure.
You can specify an IP address or an FQDN to an HTTP or HTTPS web service that is listening
for change notifications. Prisma Access sends these notifications from the internet using a
public IP address.
You do not need to commit your changes for the notification URL to take effect.
The following table shows the keywords and parameters that are available in the legacy API
scripts used with Prisma Access, and provides information and recommendations about which API
to use for the type of deployment you have.
These legacy commands also retrieve public IP and egress IP addresses; however, Palo Alto
Networks recommends that you use the newer API script to retrieve these commands and only
use the legacy API to retrieve the loopback IP addresses.
• A public IP address is the source IP address that Prisma Access uses for requests made to an
internet-based source. Add the public IP address to an allow list in your network to give Prisma
Access access to internet resources such as SaaS applications or publicly accessible partner
applications.
Mobile user, remote network, and clean pipe deployments use public IP addresses.
• An egress IP address is an IP address that Prisma Access uses for egress traffic to the internet,
and you must also add these addresses to an allow list to give Prisma Access access to internet
resources.
Among other purposes, Prisma Access uses egress IP addresses so that users receive web
pages in the language they expect from a Prisma Access location. All locations have public IP
Prisma Access Administrator’s Guide (Panorama Managed) 73 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
addresses; however, not all locations have egress IP addresses. The following locations do not
use egress IP addresses:
• Any locations that you added before the release of Prisma Access 1.4.
• Bahrain
• Belgium
• France North
• France South
• Hong Kong
• Ireland
• South Korea
• Taiwan
• United Kingdom
Mobile user, remote network, and clean pipe deployments use egress IP addresses.
gpcs_gp_gw and gpcs_gp_portal keywords Use this command if your deployment limits the
amount of IP addresses you can add to an allow
Prisma Access Administrator’s Guide (Panorama Managed) 74 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
This legacy script has been superseded by a by a newer API script as of Prisma Access
1.5. Palo Alto Networks recommends that you use the newer script to retrieve all IP
addresses with the exception of loopback addresses.
If you are adding public IP addresses to allow lists to give mobile users access to SaaS or public
applications, Prisma Access provides two IP addresses for each gateway and portal IP address
so that one IP address can be used during a scaling or other event. You can add this set of IP
addresses to an allow list before they are used, preventing any issues with mobile users being able
to access SaaS or public applications during a scaling event.
Prisma Access Administrator’s Guide (Panorama Managed) 75 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
STEP 2 | Enter the following command to retrieve the mobile user public IP addresses:
Every time Prisma Access uses the one set of public IP addresses, it allocates another set of IP
addresses. If you think that Prisma Access has used the added set of public IP addresses (for
example, if a large number of mobile users have accessed a single location), you can run this
API command again to find the new set of public IP addresses. All IP addresses persist after an
upgrade.
Use the Legacy Script to Retrieve Public, Loopback, and Egress IP Addresses
This legacy script has been superseded by a by a newer API script as of Prisma Access
1.5. Palo Alto Networks recommends that you use the newer script to retrieve all IP
addresses with the exception of loopback addresses.
To retrieve public, loopback, and egress IP addresses, complete the following steps.
STEP 1 | Get the API key and add an IP Change Event Notification URL where you can be notified of
IP address changes in your Prisma Access infrastructure.
See Set Up Prisma Access IP Address Change Notifications for details.
STEP 2 | Retrieve the public IP addresses, loopback IP addresses, or both for Prisma Access.
Use the API key and the API endpoint URL either manually or in an automation script:
header-api-key:Current
Prisma Access Administrator’s Guide (Panorama Managed) 76 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
where you need to replace Current API Key with your API key and use one or both of the
following keywords and arguments:
Keyword Description
fwType keyword
addrType keyword
Prisma Access Administrator’s Guide (Panorama Managed) 77 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Keyword Description
server), and is assigned from the infrastructure
subnet.
curl -H header-api-
key:1234y9ydxb__0UmxetVTbC8XTyFMaoT4RBZBKBjfX419YVufeFG7
"https://api.prod.datapath.prismaaccess.com/getAddrList/latest?
fwType=gpcs_remote_network&addrType=public_ip"
or use a simple python script to retrieve the list of all IP addresses, for example:
#!/usr/bin/python
import subprocess
import json
api_key = '1234y9ydxb__0UmxetVTbC8XTyFMaoT4RBZBKBjfX419YVufeFG7' #
Replace with your key
api_end_point = 'https://api.prod.datapath.prismaaccess.com/
getAddrList/latest' # This call retrieves IP addresses for all your
Prisma Access firewalls
args = ['curl', '-k', '-H', 'header-api-key:' + api_key,
api_end_point]
p = subprocess.Popen(args, stdout=subprocess.PIPE)
output = p.communicate()
dout = json.loads(output[0])
addrStrList = dout['result']['addrList']
addrList = []
for addr_str in addrStrList:
addrList.append(addr_str.split(":")[1])
print(addrList)
STEP 3 | Update the allow lists on your on-premises servers or SaaS application policy rules with the
IP addresses you retrieved.
Prisma Access Administrator’s Guide (Panorama Managed) 78 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Zone Mapping
On a firewall, zones are associated with interfaces. But within Prisma Access, the networking
infrastructure is automatically set up for you. This means that you no longer need to worry
about configuring interfaces and associating them with the zones your create (and, in Panorama
Managed Prisma Access, the UI to configure interfaces is removed from Panorama—any
unnecessary Panorama UI elements are removed in Panorama Managed Prisma Access). However,
to enable consistent security policy enforcement, you must create zone mappings so that Prisma
Access will know whether to associate a zone with an internal (trust) interface or an external
(untrust) interface. This will ensure that your security policy rules are enforced properly. By
default, all of the zones you push to Prisma Access are set to untrust. You should leave any zones
associated with internet-bound traffic, including your sanctioned SaaS applications, set to untrust.
However, for all zones that enable access to applications on your internal network or in your data
center, you must map them to trust. Notice in the example below, all sanctioned SaaS applications
—Office 365 and Salesforce in this case—are segmented into the sanctioned-saas zone to enable
visibility and policy enforcement over the use of these applications. To enable Prisma Access to
associate the sanctioned-saas zone with an external-facing interface, you must map this zone to
untrust. Similarly, the eng-tools and dc-apps zones provide access to applications in the corporate
office and you must therefore designate them as trusted zones.
When creating zones, do not use any of the following names for the zones, because these are
names used for internal zones:
• trust
• untrust
• inter-fw
• Any name you use for the remote networks (remote network names are used as the source
zone in Cortex Data Lake logs)
Prisma Access logs that display a zone of inter-fw are logs used for communication within
the Prisma Access infrastructure.
Prisma Access Administrator’s Guide (Panorama Managed) 79 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
The Prisma Access APIs are located in the following XML Path Language (XPath) nodes in the
XML tree:
• Configuration Commands: XML API > Configuration Commands > devices >
entry[@name='localhost.localdomain'] > plugins > cloud_services
• Operational Commands: XML API > Operational Commands > request > plugins >
cloud_services > prisma-access
As you navigate in the XML tree, Prisma Access populates the tree in the XML area. You can enter
required values in the XML area and click Submit to process an XML request. For example, to
request the onboarding status of a job, navigate to XML API > Operational Commands > request
> plugins > cloud_services > prisma-access > job-status > jobid, enter the Job id in the jobid field,
enter the Service Type servicetype area, and click Submit to submit your request.
This XML only retrieves the onboarding status of a job. To retrieve the status of all commit
operations, use the Prisma Access UI.
Prisma Access Administrator’s Guide (Panorama Managed) 80 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 81 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
You can also use the web interface to find APIs in Panorama.
Prisma Access Administrator’s Guide (Panorama Managed) 82 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Configuration Commands:
curl -k -X GET "https://<panorama-ip-address>/api/?key=<api-
key>&type=config&cmd=<api-parameters></api-parameters>
Operational Commands:
curl -k -X GET "https://<panorama-ip-address>/api/?key=<api-
key>&type=op&cmd=<api-parameters></api-parameters>
Where:
• <panorama-ip-address> is the IP address of the Panorama that manages Prisma Access.
• <api-key> is the API key for Prisma Access (Panorama > Cloud Services > Configuration >
Service Setup > Generate API Key).
• <api-parameters> and </api-parameters> are the API parameters you use to retrieve the
requested information from the API.
If you have a multi-tenant deployment, you add the name of the tenant for which you want to
retrieve API information into the API.
For example, given a Prisma Access deployment that has the following parameters:
• Panorama IP Address: 1.2.3.4
• API key: 12345abcde
• Tenant name: tenant-1
If you wanted to retrieve the number of active mobile users for that tenant, you would enter the
following curl command:
curl -k -X GET "https://1.2.3.4/api/?
key=12345abcde&type=op&cmd=<request><plugins><cloud_services><prisma-
access><multi-tenant><tenant-name><entry%20name='tenant-1'></entry></
tenant-name><remote-active-users-count/></multi-tenant></prisma-
access></cloud_services></plugins></request>"
pass
Current User Count: 253
Prisma Access Administrator’s Guide (Panorama Managed) 83 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
The Deployment Status area displays a graphic element (a bubble) showing the status of the
deployment, along with the following text:
Prisma Access Administrator’s Guide (Panorama Managed) 84 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Click details to view the Job ID of the job, its status, and the percentage of its completion. The
Job ID field is the Job ID that is associated with the commit operation in Panorama.
To view more details of a specific deployment job, click the left arrow next to Job ID. The
following screenshot shows the deployment status of a commit that has the Panorama Job ID of
1555. The overall status is Warning because two of the nodes failed during the commit stage.
The first line of the job status shows the following information:
• The type of deployment job (either Service Connections, Remote Networks, Clean Pipe), or
the type of mobile user onboarding operation (GlobalProtect Gateways, GlobalProtect Portals,
or both gateways and portals).
• The Number of Nodes that are in the job.
Nodes represent the number of cloud firewalls, gateways, or portals that Prisma Access is
configuring for a specific job. The number of nodes do not always correspond to the number
of Service Connections, Remote Networks, mobile user locations, or Clean Pipe instances that
you deployed; for example, onboarding a location might cause configuration changes to both
Prisma Access firewalls and portals.
• The number of nodes that are still being provisioned (Provisioning in Progress).
• The number of nodes that failed (Provisioning Failed).
• The number of nodes that completed provisioning (Provisioning Complete).
The next line in the table provides more granular information about the deployment job. The
following screenshot shows three mobile user locations (Australia Southeast, South Africa West,
and Brazil East) being successfully onboarded.
Prisma Access Administrator’s Guide (Panorama Managed) 85 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Field Description
Name (Service Connection, The name of the service connection, remote network
Remote Network, and Clean Pipe connection, or clean pipe instance.
deployments only)
Prisma Access Administrator’s Guide (Panorama Managed) 86 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Field Description
deployment stage. More information about the failure
is available in he Error Details area.
Prisma Access does not retain the details of jobs that you onboard and later delete. For example,
job 42233 added the Australia Southeast, South Africa West, and Brazil East mobile user
locations. If you delete those locations later, clicking the left arrow next to Job ID for job 42233
does not provide any additional details about the job.
Prisma Access Administrator’s Guide (Panorama Managed) 87 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 88 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Tab Description
Prisma Access Administrator’s Guide (Panorama Managed) 89 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Tab Description
• Nexthop—The IP address of the device at the next
hop toward the Destination network. A next hop
of 0.0.0.0 indicates the default route.
• Metric—The Metric for the route. When a routing
protocol has more than one route to the same
destination network, it prefers the route with the
lowest metric value. Each routing protocol uses a
different type of metric; for example, BGP uses the
Multi Exit Discriminator (MED) Attribute. Prisma
Access considers the metric when making routing
decisions; for example, given the same route,
Prisma Access prefers a static route with a lower
metric over a BGP route with a higher metric.
• Flags—The set of flags that are displayed for the
route.
• A?B—Active and learned from BGP
• A C—Active and a result of an internal interface
(connected) - Destination = network
• A H—Active and a result of an internal interface
(connected) - Destination = Host only
• A R—Active and learned from RIP
• A S—Active and static
• O1—OSPF external type-1
• O2—OSPF external type-2
• Oi—OSPF intra-area
• Oo—OSPF inter-area
• S—Inactive (because this route has a higher
metric) and static
Prisma Access Administrator’s Guide (Panorama Managed) 90 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Tab Description
To find the IP address of a mobile user
gateway from the GlobalProtect app,
open the Settings and find the Gateway
IP address in the Connection tab. To find
the IP address of a mobile user gateway
from Prisma Access, use the API to
retrieve Prisma Access infrastructure IP
addresses using the "serviceType":
"gp_gateway" keywords in the .txt file.
Prisma Access Administrator’s Guide (Panorama Managed) 91 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Tab Description
To find the IP address of a mobile user
gateway from the GlobalProtect app,
open the Settings and find the Gateway
IP address in the Connection tab. To find
the IP address of a mobile user gateway
from Prisma Access, use the API to
retrieve Prisma Access infrastructure IP
addresses using the "serviceType":
"gp_gateway" keywords in the .txt file.
EDL Refresh Refreshes the EDLs for Mobile Users and Remote
Networks MU-SPNs and RN-SPNs. You cannot
refresh predefined EDLs.
Prisma Access Administrator’s Guide (Panorama Managed) 92 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Tab Description
To find the IP address of a mobile user
gateway from the GlobalProtect app,
open the Settings and find the Gateway
IP address in the Connection tab. To find
the IP address of a mobile user gateway
from Prisma Access, use the API to
retrieve Prisma Access infrastructure IP
addresses using the "serviceType":
"gp_gateway" keywords in the .txt file.
Search EDL Enter search terms to find data inside the EDLs
you use with mobile users and remote networks in
Prisma Access. This functionality does not work with
Predefined URL lists or URL lists that you create;
EDLs that use IP addresses are supported.
You can enter search terms for either Mobile Users or
Remote Networks. To search for Mobile Users, enter
the IP address of the mobile user location (gateway)
for which you want to search (Mobile Users GW
IP address) with the Search String; to search in the
Remote Networks area, enter the Site Name with
the Search String. Click Search EDL to perform the
search.
If the string is matched in an EDL, the Retrieved Data
table shows the EDL Name where the search string
was matched, along with the Timestamp when the
match was made. The timestamp uses the date and
time of the Panorama that manages Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 93 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Overview
Prisma Access Administrator’s Guide (Panorama Managed) 94 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma
Access Components
After you determine what licenses you need and the bandwidth and mobile user quantity that is
required for your deployment, you activate and install the components as shown in the following
sections.
• Activate and Install Panorama Managed Prisma Access
• Transfer or Update Panorama Managed Prisma Access Licenses
• Configure Panorama Appliances in High Availability for Panorama Managed Prisma Access
95
Activate and Install the Prisma Access Components
Make a note of the serial number of the Panorama appliance; you use that serial
number in a later step.
Prisma Access Administrator’s Guide (Panorama Managed) 96 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
Be sure that you have configured a DNS server and NTP server on the Panorama that manages
Prisma Access (Panorama > Setup > Services). If you do not configure a DNS and NTP server,
you cannot verify your account and will have to reinstall the plugin.
During Prisma Access installation, Palo Alto Networks provides you the required roles on the
Hub to activate Prisma Access, if those Hub roles are not already present. After you complete
installation, you are assigned a role of Instance Admin. If you need additional roles on the Hub
to perform system tasks, log in to the Hub, select Settings > Access Management, find the
Account Administrator for your organization, and contact them to be assigned additional roles.
(Deployments Using Panorama Appliances in HA Mode Only) If you plan to use two Panorama
appliances in High Availability (HA) mode, to simplify the HA set up, you should configure
the Panorama appliances in HA after you purchase Prisma Access and Cortex Data Lake auth
codes and components and associate the serial number of the primary Panorama appliance
on which you plan to install the Cloud Services plugin with the auth codes, but before you
Activate and Install Panorama Managed Prisma Access. However, you can use the same
configuration process for Panorama appliances that already have the plugin installed.
License Activation
Complete the following steps to activate your Prisma Access licenses and download and install the
Cloud Services plugin.
STEP 1 | When you receive the activation email from Palo Alto Networks, select Get Started with
Prisma SASE and begin the activation process.
STEP 2 | When setup is complete, copy the one-time password (OTP). You use this when you verify
your account on Panorama.
Prisma Access Administrator’s Guide (Panorama Managed) 97 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
Do not rename the plugin file or you will not be able to install it on Panorama.
3. Log in to the Panorama Web Interface of the Panorama you licensed for use with the
Prisma Access, select Panorama > Plugins > Upload and Browse for the plugin File that
you downloaded from the CSP.
4. Install the plugin.
• To download and install the Cloud Services plugin directly from Panorama, complete the
following steps:
1. Select Panorama > Plugins and click Check Now to display the latest Cloud Services
plugin updates.
Prisma Access Administrator’s Guide (Panorama Managed) 98 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
Prisma Access Administrator’s Guide (Panorama Managed) 99 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
Prisma Access Administrator’s Guide (Panorama Managed) 100 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
4. Click OK.
Do not click Cancel, even if you did not make any changes to this page.
STEP 7 | Continue to configure your Prisma Access deployment by Enabling the Service
Infrastructure.
Prisma Access Administrator’s Guide (Panorama Managed) 101 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
Prisma Access Administrator’s Guide (Panorama Managed) 102 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
Prisma Access Administrator’s Guide (Panorama Managed) 103 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
The following table shows the supported license update methods based on the type of Panorama
appliance used with the evaluation.
If you are upgrading your Prisma Access license from evaluation to production, make sure
that your Panorama appliance has active, paid licenses before starting this procedure.
If your Panorama has an evaluation license, you need to transfer the Prisma Access
license to a Panorama with a production license.
STEP 2 | Make a note or take a screenshot of the licenses you have, the quantity of licenses, and the
expiration date of each license.
Prisma Access Administrator’s Guide (Panorama Managed) 104 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
STEP 4 | From the Panorama administration console, select Panorama > Licenses and click Retrieve
license keys from license server.
This step should refresh the licenses you already have, and the new licenses should reflect the
new quantity you purchased and the new expiration date.
STEP 5 | Delete any existing certificates using CLI from Panorama by entering the following
command:
STEP 6 | Enter the debug plugins cloud_services reset-endpoint command to reset the
Panorama appliance.
STEP 7 | Create the new certificate with the new OTP by entering the following command, where
value is the new OTP:
STEP 8 | Complete the one-time password (OTP) verification procedure and verify the Panorama
appliance.
STEP 9 | In Panorama, verify that you can make configuration changes and can successfully push the
configuration to Prisma Access.
If the licenses do not update correctly, or if you are not able to make configuration changes
after the refresh, contact Palo Alto Networks support.
Prisma Access Administrator’s Guide (Panorama Managed) 105 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
STEP 4 | Find the production Panorama appliance to which you will be transferring the production
Prisma Access plugin and complete these steps:
1. Verify that it has an active support license.
2. Make a note of this serial number; you use it in a later step.
STEP 5 | Search for the current Panorama appliance you are using to run Prisma Access by using the
serial number.
The model name should be in the format PAN-PRA-25-Exx.
STEP 6 | Click the Actions icon for the current Panorama appliance.
Prisma Access Administrator’s Guide (Panorama Managed) 106 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
STEP 7 | Select Transfer Licenses and choose the Panorama appliance to which you will be migrating.
STEP 8 | Review the EULA and click Agree, then click Submit.
STEP 9 | Wait for a confirmation message in the Support Portal for a successful transfer.
STEP 10 | After the successful transfer of licenses, login to the administration console of your
production Panorama appliance.
STEP 11 | Select Panorama > Support and verify that the Panorama appliance has a valid support
license.
STEP 12 | Click Dashboard and verify that the Panorama appliance is running the minimum supported
software version. See Minimum Required Panorama Software Versions for details.
STEP 13 | Verify that the Panorama appliance is configured to use NTP by selecting Panorama > Setup
> Services > NTP and setting a value, such as pool.ntp.org, for the NTP Server.
Prisma Access Administrator’s Guide (Panorama Managed) 107 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
STEP 15 | Select Panorama > Licenses and click Retrieve license keys from license server.
This should refresh the screen with recently transferred Prisma Access and Cortex Data Lake
licenses you purchased. If the cloud service licenses do not appear, contact Palo Alto Networks
Support for assistance.
STEP 16 | Complete the one-time password (OTP) verification procedure and verify the Panorama
appliance.
STEP 17 | Migrate the configuration from the previous Panorama appliance to the current Panorama
appliance.
• If the production Panorama appliance is completely new, export the configuration from the
Panorama appliance you used during the evaluation (if you have not done so already) and
import it to this Panorama appliance.
• If this is the Panorama appliance that you have been using to manage your existing VMs and
devices, load a partial configuration to this Panorama appliance.
You can now use this Panorama appliance to configure and manage Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 108 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
If you disable HA for a Panorama pair and revert to a configuration where a single
Panorama manages Prisma Access, you must re-verify your account to prevent errors
when retrieving the status of Prisma Access components.
Prisma Access Administrator’s Guide (Panorama Managed) 109 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
STEP 2 | Make sure that the primary (active) and secondary (passive) Panorama appliances are
synchronized and that the HA link state between them is up.
1. Access the Dashboard on the primary Panorama appliance and select Widgets > System
> High Availability to display the HA widget.
2. Sync to peer, click Yes, and wait for the Running Config to display Synchronized.
3. Make sure that the Local peer is active.
4. Access the Dashboard on the passive Panorama appliance and select Widgets > System
> High Availability to display the HA widget.
5. Verify that the Running Config displays Synchronized.
6. Make sure that the Local peer is passive.
STEP 3 | Install the Prisma Access components on the primary Panorama appliance.
1. Log in to the primary Panorama appliance and select Panorama > Licenses.
2. Click Retrieve the license keys from license server.
3. Activate and Install Panorama Managed Prisma Access, including generating a one-time
password (OTP) and verifying your account.
Prisma Access Administrator’s Guide (Panorama Managed) 110 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
3. Log in to the Customer Support Portal (CSP) and select Assets > Cloud Services to verify
that both Panorama peers are tied to your Prisma Access and Cortex Data Lake licenses.
4. Check the fields for the primary and secondary Panorama appliance.
The Auth Code, Model Name, License Description, and Expiration Date fields should
be the same for the primary and secondary Panorama appliance, because Palo Alto
Networks has associated the Prisma Access license automatically to the secondary
Panorama appliance.
STEP 5 | Log in to the secondary Panorama appliance and Activate and Install Panorama Managed
Prisma Access.
When you log in to the Customer Support Portal (CSP) to generate the OTP, make sure that
you specify the serial number for the secondary Panorama appliance.
STEP 6 | Commit your changes on the primary and secondary Panorama appliance.
1. Commit > Commit and Push your changes.
2. Click OK and Push.
STEP 7 | Verify that the primary and secondary Panorama appliances are still in a synchronized state.
Prisma Access Administrator’s Guide (Panorama Managed) 111 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Activate and Install the Prisma Access Components
Prisma Access Administrator’s Guide (Panorama Managed) 112 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access
Infrastructure and Service
Connections
Prisma Access requires a service infrastructure that uses an infrastructure subnet you specify.
Prisma Access uses the IP addresses within this subnet to establish the network backbone that
connects your remote sites, mobile users, headquarters and data center (if applicable). Prisma
Access also uses service connections to access internal resources from your headquarters or data
center location. Learn more about these, as well as a high-level configuration overview, in the
following sections.
• Set Up Panorama Managed Prisma Access
• Prisma Access Service Infrastructure
• Prisma Access Service Connections
• Prisma Access Locations
113
Prepare the Prisma Access Infrastructure and Service Connections
If you are setting up a deployment that includes multiple instances of Prisma Access on a
single Panorama (multitenancy), see Manage Multiple Tenants in Prisma Access. Most
organizations do not have a need to create and manage multiple tenants.
STEP 1 | Add the following URLs and ports to an allow list on any security appliance that you use with
the Panorama appliance that manages Prisma Access.
In addition, if your Panorama appliance uses a proxy server (Panorama > Setup > Service
> Proxy Server), or if you use SSL forward proxy with Prisma Access, be sure to add the
following URLs and ports to an allow list on the proxy or proxy server.
• api.gpcloudservice.com (for Prisma Access)
• api.paloaltonetworks.com (for Prisma Access)
• apitrusted.paloaltonetworks.com (for Prisma Access)
• The FQDNs and ports required for Cortex Data Lake
STEP 2 | Add the ports used by Panorama to allow lists in your network.
STEP 3 | Identify your license requirements; then Activate and Install the Prisma Access Components.
STEP 4 | Import your existing Panorama configuration to Prisma Access, or create new templates and
device groups to begin configuration of Prisma Access.
In order to push configuration—such as security policy, authentication policy, server profiles,
security profiles, address objects, and application groups—to Prisma Access, you must either
create new templates and device groups with the configuration settings you want to push to
Prisma Access, or leverage your existing device groups and templates by adding them to the
Prisma Access Administrator’s Guide (Panorama Managed) 114 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
template stacks and device group hierarchies that Prisma Access creates when you onboard
the service.
Prisma Access creates the following templates and device groups, depending on what you
have purchased (for example, if you do not purchase an Explicit Proxy license, you will not see
the Explicit Proxy templates and device groups):
• Templates:
• Explicit_Proxy_Template
• Explicit_Proxy_Template_Stack
• Mobile_User_Template
• Mobile_User_Template_Stack
• Remote_Network_Template
• Remote_Network_Template_Stack
• Service_Conn_Template
• Service_Conn_Template_Stack
• Device Groups:
• Explicit_Proxy_Device_Group
• Mobile_User_Device_Group
• Remote_Network_Device_Group
• Service_Conn_Device_Group
Configuration is simplified in Prisma Access because you do not have to configure any of
the infrastructure settings, such as interfaces and routing protocols. This configuration is
automated and pushed from Panorama in the templates and device groups that the service
creates automatically. You can configure any infrastructure settings that are required by the
service, such as settings required to create IPSec VPN tunnels to the IPSec-capable devices at
your remote network locations, directly from the plugin. Optionally, you can add templates and
device group hierarchies to the configuration to simplify the service setup.
To simplify the service setup, create or import the templates and device groups you need
before you begin the setup tasks for using Prisma Access.
When creating templates and device groups for Prisma Access, you do not need to assign
managed devices to it. Instead, you will add them to the template stacks and device group
hierarchies that Prisma Access creates. Do not add any of the templates or device groups
created by Prisma Access to any other template stacks or device groups.
STEP 5 | Sign up for email notifications using the Prisma Access app.
Prisma Access provides you with notifications about the service, including any dataplane
upgrades, using notifications from this app.
Prisma Access Administrator’s Guide (Panorama Managed) 115 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
STEP 6 | Change the default master key for Panorama and in the Cloud Services plugin.
Palo Alto Networks recommends changing the master key in Panorama and in the Cloud
Services plugin as a security best practice and that you change the master key monthly.
Because the Panorama and Prisma Access master keys do not synchronize, Palo Alto Networks
recommends that you do not automatically rotate the master key in Panorama without
also synchronizing the master key in Prisma Access. You can use the Panorama UI or API
commands to change the master keys.
Be sure to keep track of the master key you deploy because master keys cannot be
recovered. When a master key expires, you must enter the current master key in order
to configure a new master key. You must reset your Panorama appliance to factory
default if you cannot provide the current master key when it expires.
STEP 7 | Enable the service infrastructure and service connections that allows communication
between Prisma Access elements.
1. Plan to enable the service infrastructure and service connections.
2. Enable the service infrastructure.
3. Create a service connection to allow access to your corporate resources.
If you don’t require access to your corporate resources, you should still create a service
connection to enable access between mobile users and remote networks.
Prisma Access Administrator’s Guide (Panorama Managed) 116 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
STEP 8 | Prisma Access Mobile User Deployments and secure mobile users with GlobalProtect or
Explicit Proxy, as required for your deployment.
To Set Up GlobalProtect on Panorama Managed Prisma Access:
1. Configure zones for mobile users by creating two zones in the Mobile_User_Template (for
example, Mobile-Users and Internet) and mapping the zones. You should map any zone that
is not Prisma Access connected users or HQ or branch offices to Untrust.
Under Panorama > Cloud Services > Configuration > Mobile Users, map Internet to
Untrust; Mobile-Users to Trust.
2. Configure authentication.
We recommend using local authentication as a first step to verify that the service is set
up and your users have internet access. You can later switch to using your corporate
authentication methods.
3. Configure Security policies for the device group.
To create a Security policy to allow traffic to the Internet, select the
Mobile_User_Device_Group Policies > Security > Prerules > Add a rule. For example:
Mobile-Users to Internet.
4. Commit and push your changes to get started with the service.
5. Select Panorama > Cloud Services > Status > Monitor > Mobile Users to view the Status
and verify that you can ping the Portal FQDN.
6. Validate that Prisma Access is securing Internet traffic for mobile users by downloading
and installing the GlobalProtect app, using the app to connect to the portal as a mobile user
(local user), browsing to a few websites on the internet, and checking the traffic logs on
Panorama.
To Secure Mobile Users with an Explicit Proxy:
1. Read the guidelines and requirements.
2. Configure SAML Authentication (for example, use the Cloud Identity Engine to authenticate
Explicit Proxy mobile users. SAML authentication is required for Explicit Proxy.
3. Set up Group Mapping using the Cloud Identity Engine.
4. Complete the Explicit Proxy configuration.
5. Commit and Push your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 117 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
STEP 10 | Run the API Script Used to Retrieve Prisma Access IP Addresses and Use the Legacy Script
to Retrieve Mobile User IP Addresses.
You add these addresses to an allow list on your organization’s network to limit inbound access
to your enterprise network and applications.
STEP 11 | (Optional) Change the authentication method from local authentication to your
organization’s authentication method.
1. Create an authentication profile that meets your organization’s requirements (Cloud
Identity Engine, SAML, LDAP, RADIUS, etc).
2. If your organization uses an on-premises authentication server such as RADIUS or Active
Directory, add the IP addresses that Prisma Access uses as its source IP address for
internal requests (Retrieve the IP Addresses for Prisma Access) to allow lists in your
network, or allow the IP addresses of the entire Infrastructure Subnet (Prisma Access
takes the loopback IP address from this subnet).
3. Update the Authentication Profile for the Prisma Access portal and gateway to use this
new authentication profile.
STEP 12 | (Optional) Forward logs from Cortex Data Lake to a syslog server, HTTPS server, or email
server.
Prisma Access Administrator’s Guide (Panorama Managed) 118 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
• If you create a new subnet for the infrastructure subnet, use a subnet that does not overlap
with other IP addresses you use internally.
Prisma Access Administrator’s Guide (Panorama Managed) 119 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
• (Recommended) Use an RFC 1918-compliant subnet. While the use of non-RFC 1918-
compliant (public) IP addresses is supported, we do not recommend it, because of possible
conflicts with internet public IP address space.
• Do not specify any subnets that overlap with the following IP addresses and subnets, because
Prisma Access reserves those IP addresses and subnets for its internal use.:
169.254.169.253, 169.254.169.254, 169.254.201.0/24, 169.254.202.0/24, and
100.64.0.0/10.
• The subnet cannot overlap with the IP address pools you plan to use for the address pools you
assign for your mobile users deployment.
• Because the service infrastructure can be very large, you must designate a /24 subnet at a
minimum.
Prisma Access Administrator’s Guide (Panorama Managed) 120 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
STEP 2 | On the General tab, specify an Infrastructure Subnet that meets the requirements, for
example, 172.16.55.0/24.
STEP 3 | (Optional) If you want to enable Prisma Access to use BGP to dynamically discover routes to
resources on your remote networks and HQ/data center locations, enter the Infrastructure
BGP AS you want to use within the Prisma Access infrastructure.
If you do not supply an AS number, the default AS number 65534 will be used.
STEP 4 | (Optional) Add one or more templates to the predefined template stack,
Service_Conn_Template_Stack.
The templates you add here can help simplify the process of adding new service connections.
For example, if you add a template containing existing IPSec configuration settings, such as
IPSec tunnel, Tunnel Monitoring, and IPSec Crypto Profile configurations, you can select these
configurations when defining the tunnel settings for each service connection rather than
having to create the tunnel configuration from scratch. You can optionally edit the predefined
Service_Conn_Template with tunnel settings that you can leverage when creating the tunnels
from Prisma Access to your corporate network sites.
STEP 5 | (Optional) Enable Prisma Access to resolve your internal domains using your corporate DNS
servers.
Use this step if you need Prisma Access to be able to resolve your internal domains to
access services, such as LDAP servers, on your corporate network via service connections.
For example, if you want a DNS lookup for your corporate domain to go exclusively to the
corporate DNS server, specify the corporate domain and the corporate DNS servers here.
1. Select the Internal Domain List tab.
2. Add the Domain Names, Primary DNS, and Secondary DNS servers that you want
Prisma Access to use to resolve your internal domain names.
You can use a wildcard (*) in front of the domains in the domain list, for example
*.acme.local or *.acme.com.
Prisma Access Administrator’s Guide (Panorama Managed) 121 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
3. Configure the device groups you are using to push settings to Prisma Access with a Log
Forwarding profile that forwards the desired log types to Panorama/Cortex Data Lake.
The Cloud Services plugin automatically adds the following Log Settings (Device > Log
Settings) after a new installation or when removing non-Prisma Access templates from a
Prisma Access template stack:
• Log Settings for System logs (system-gpcs-default), User-ID logs (userid-gpcs-
default), HIP Match logs (hipmatch-gpcs-default), and GlobalProtect logs (gp-
prismaaccess-default) are added to the Mobile_User_Template.
• Log Settings for System logs (system-gpcs-default), User-ID logs (userid-gpcs-
default), and GlobalProtect logs (gp-prismaaccess-default) are added to the
Remote_Network_Template.
• Log Settings for System logs (system-gpcs-default) and GlobalProtect logs (gp-
prismaaccess-default) are added to the Service_Conn_Template.
These Log Setting configurations automatically forward System, User-ID, HIP Match, and
GlobalProtect logs to Cortex Data Lake.
To apply log setting changes, perform the following steps, then commit and push your
changes:
• To apply the log setting to the mobile user template, select Panorama > Cloud
Services > Configuration > Mobile Users, click the gear icon to edit the settings, and
click OK.
• To apply the log setting to the remote network template, select Panorama > Cloud
Services > Configuration > Remote Networks, click the gear icon to edit the settings,
and click OK.
• To apply the log setting to the service connection template, select Panorama > Cloud
Services > Configuration > Service Setup, click the gear icon to edit the settings, and
click OK.
The way you enable log forwarding for other log types depends on the type. For logs
that are generated based on a policy match, use a log forwarding profile. See the Cortex
Data Lake Getting Started Guide for more information.
Prisma Access Administrator’s Guide (Panorama Managed) 122 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
STEP 8 | (Optional) Configure Advanced settings (routing preferences, symmetric network path
options for service connections, and HIP redistribution).
1. Specify the Routing Preference to use with service connections.
You can specify network preferences to use either your organization’s network, or the
Prisma Access network, to process the service connection traffic.
• Default—Prisma Access uses default routing in its internal network.
• Hot potato routing—Prisma Access hands off service connection traffic to your
organization’s WAN as quickly as possible.
Prisma Access Administrator’s Guide (Panorama Managed) 123 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
a service connection. If you want to use ECMP or another load balancing mechanism
for service connections from your CPE, you can enable asymmetric flows through the
Prisma Access backbone.
• Select no-asymmetric-routing to require symmetric flows across the service
connection backbone (the default setting).
• Select asymmetric-routing-only to allow Prisma Access to use asymmetric flows
across the service connection backbone.
• If you have multiple service connections to a location, you can take advantage of load
balancing in your Prisma Access deployment by selecting asymmetric-routing-with-
load-share. However, load balancing is done on a best-effort basis, and load balancing
will fail if one of the service connections goes down.
3. Enable HIP Redistribution to use service connections to redistribute HIP information
from mobile users and users at remote networks.
4. Enable Quarantine List Redistribution to have Prisma Access identify and quarantine
compromised devices that are connected with the GlobalProtect app.
5. Withdraw Static Routes if Service Connection or Remote Network IPSec tunnel is down
if you want Prisma Access to remove static routes when a tunnel goes down without a
backup tunnel.
Prisma Access removes the route in the following situations:
• The primary tunnel goes down and there is no secondary tunnel.
• If a primary and secondary tunnel is configured, but both go down.
You cannot apply this change if tunnel monitoring is not enabled.
6. (Optional) If you want to route remote network and service connection IPSec tunnel
packets to the static IKE gateways over the internet, Enable automatic IKE peer host
routes for Remote Networks and Service Connections.
7. (Optional) Specify Outbound Routes for the Service (Max 10) by adding up to 10
prefixes for which Prisma Access adds static routes on all service connections and
Prisma Access Administrator’s Guide (Panorama Managed) 124 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
remote network connections. Prisma Access then routes traffic to these prefixes over
the internet.
Prisma Access Administrator’s Guide (Panorama Managed) 125 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
STEP 10 | Commit all your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit to Panorama.
2. Click Commit > Push to Devices and click Edit Selections.
3. On the Prisma Access tab, make sure Service setup is selected and then click OK.
Prisma Access should automatically select the components that need to be committed.
4. Click Push.
STEP 11 | Verify that Prisma Access is successfully connected to Cortex Data Lake.
1. Select Panorama > Cloud Services > Status > Status > Cortex Data Lake and verify that
the Status is OK.
If the status is Error, click the details link to view any errors.
Prisma Access Administrator’s Guide (Panorama Managed) 126 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Prisma Access Administrator’s Guide (Panorama Managed) 127 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
• If you manage multiple tenants and have a ZTNA or Enterprise license, the number of service
connections per tenant depends on the number of units you allocate per tenant and the type of
license you have.
• If you have a Global license and allocate at least 1,000 units for a tenant, you can allocate a
maximum of five service connections for that tenant.
• If you have a Global license and allocate between 200 and 999 units for a tenant, you can
allocate a maximum of two service connections for that tenant (the same as the number of
connections for a Local deployment).
• If you have a Local license, you can allocate a maximum of two service connections per
tenant, regardless of the number of units you allocate past the minimum of 200.
For both Global and Local licenses, you can purchase additional licenses for service
connections if more are required.
While each service connection provides approximately 1 Gbps of throughput, the actual
throughput is dependent on several factors, including:
• Traffic mix (for example, frame size)
• Latency and packet loss between the service connection and the headquarters location
or data center
• Service provider performance limits
• Customer termination device performance limits
• Other customer data center traffic
If you are creating a service connection only to provide communication between remote
networks and mobile users, you do not need this information.
If you have an existing template that contains IPSec tunnel, Tunnel Monitoring,
and IPSec Crypto Profile configurations, you can add that template to the template
stack to simplify the process of creating the IPSec tunnels. Or, you can edit the
Service_Conn_Template that gets created automatically and create the IPSec
configurations required to create the IPSec tunnel back to the corporate site.
Prisma Access also provides you with a set of predefined IPSec templates for some
commonly-used network devices, and a generic template for any device that is not
included in the predefined templates.
Prisma Access Administrator’s Guide (Panorama Managed) 128 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
If you are creating a service connection to allow communication between mobile users
and remote networks, instead of enabling access to your corporate resources, follow the
instructions in Create a Service Connection to Enable Access between Mobile Users
and Remote Networks.
STEP 1 | Select Panorama > Cloud Services > Configuration > Service Connection.
STEP 2 | Add a new service connection to one of your corporate network sites.
Prisma Access Administrator’s Guide (Panorama Managed) 129 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
STEP 5 | Select or add a new IPSec Tunnel configuration to access the firewall, router, or SD-WAN
device at the corporate location:
• If you have added a template to the Service_Conn_Template_Stack (or modified the
predefined Service_Conn_Template) that includes an IPSec Tunnel configuration, select that
IPSec Tunnel from the drop-down. Note that the tunnel you are creating for each service
connection connects Prisma Access to the IPSec-capable device at each corporate location.
The peer addresses in the IKE Gateway configuration must be unique for each tunnel. You
can, however, re-use some of the other common configuration elements, such as Crypto
profiles.
The IPSec Tunnel you select from a template must use Auto Key exchange and IPv4
only. In addition, make sure that the IPSec tunnel, IKE gateway, and crypto profile
names are 31 characters or less.
• To create a new IPSec Tunnel configuration, click New IPSec Tunnel, give it a Name and
configure the IKE Gateway, IPSec Crypto Profile, and Tunnel Monitoring settings.
• If the IPSec-capable device at your HQ or data center location uses policy-based VPN,
on the Proxy IDs tab, Add a proxy ID that matches the settings configured on your local
Prisma Access Administrator’s Guide (Panorama Managed) 130 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
IPSec device to ensure that Prisma Access can successfully establish an IPSec tunnel
with your local device.
• Leave Enable Replay Protection selected to detect and neutralize against replay attacks.
• Select Copy TOS Header to copy the Type of Service (TOS) header from the inner IP header
to the outer IP header of the encapsulated packets in order to preserve the original TOS
information.
• To enable tunnel monitoring for the service connection, select Tunnel Monitor.
• Enter a Destination IP address.
Specify an IP address at your HQ or data center site to which Prisma Access can send
ICMP ping requests for IPSec tunnel monitoring. Make sure that this address is reachable
by ICMP from the entire Prisma Access infrastructure subnet.
• If you use tunnel monitoring with a peer device that uses multiple proxy IDs, specify a
Proxy ID or add a New Proxy ID that allows access from the infrastructure subnet to
your HQ or data center site.
The following figure shows a proxy ID with the service infrastructure subnet
(172.16.55.0/24 in this example) as the Local IP subnet and the HQ or data center’s
subnet (10.1.1.0/24 in this example) as the Remote subnet.
The following figure shows the Proxy ID you created being applied to the tunnel monitor
configuration by specifying it in the Proxy ID field.
Prisma Access Administrator’s Guide (Panorama Managed) 131 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
You must configure a static route on your CPE to the Tunnel Monitor IP Address
for tunnel monitoring to function. To find the destination IP address to use
for tunnel monitoring from your data center or HQ network to Prisma Access,
select Panorama > Cloud Services > Status > Network Details, click the Service
Infrastructure radio button, and find the Tunnel Monitor IP Address.
STEP 6 | BGP and hot potato routing deployments only—Select a service connection to use as the
preferred backup (Backup SC).
You can select any service connection that you have already added. Prisma Access uses
the Backup SC you select as the preferred service connection in the event of a link failure.
Selecting a backup service connection can prevent asymmetric routing issues if you have
onboarded more than two service connections. This choice is available in Hot potato routing
mode only.
STEP 7 | If you have a secondary WAN link at this location, select Enable Secondary WAN and then
select or configure an IPSec Tunnel the same way you did to set up the primary IPSec tunnel.
If the primary WAN link goes down, Prisma Access detects the outage and establishes a tunnel
to the headquarters or data center location over the secondary WAN link. If the primary WAN
link becomes active, the link switches back to the primary link.
Configuring a Secondary WAN is not supported in the following deployments:
• If your secondary WAN is set up in active-active mode with the Primary IPSec tunnel.
• If your customer premises equipment (CPE) is set up in an Equal Cost Multipath (ECMP)
configuration with the Primary and Secondary IPSec tunnel.
If you use static routes, tunnel failover time is less than 15 seconds from the time of detection,
depending on your WAN provider.
If you configure BGP routing and have enabled tunnel monitoring, the shortest default hold
time to determine that a security parameter index (SPI) is failing is the tunnel monitor, which
removes all routes to a peer when it detects a tunnel failure for 15 consecutive seconds. In this
way, the tunnel monitor determines the behavior of the BGP routes. If you do not configure
tunnel monitoring, the hold timer determines the amount of time that the tunnel is down
before removing the route. Prisma Access uses the default BGP HoldTime value of 90 seconds
as defined by RFC 4271, which is the maximum wait time before Prisma Access removes a
Prisma Access Administrator’s Guide (Panorama Managed) 132 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
route for an inactive SPI. If the peer BGP device has a shorter configured hold time, the BGP
hold timer uses the lower value.
When the secondary tunnel is successfully installed, the secondary route takes precedence
until the primary tunnel comes back up. If the primary and secondary are both up, the primary
route takes priority.
If you use a different BGP peer for the secondary (backup) connection, Prisma Access
does not honor the Multi-Exit Discriminator (MED) attributes advertised by the
CPE. This caveat applies if you use multiple BGP peers on either remote network
connections or service connections.
STEP 8 | (Optional, 3.2 Innovation Deployments Only) Enable Source NAT for Mobile Users—
GlobalProtect IP pool addresses, IP addresses in the Infrastructure Subnet, or both.
You can specify a subnet at one or more service connections that are used to NAT traffic
between Prisma Access GlobalProtect mobile users and private applications and resources at a
data center.
• Enable Data Traffic Source NAT—Performs NAT on Mobile User IP Address pool addresses
so that they are not advertised to the data center, and only the subnets you specify at the
service connections are advertised and routed in the data center.
• Enable Infrastructure Traffic Source NAT—Performs NAT on addresses from the
Infrastructure Subnet so that they are not advertised to the data center, and only those
subnets you specify at the service connections are advertised and routed in the data center.
• IP Pool—Specify the IP address pool used to perform NAT on the mobile user IP address
pool, Infrastructure Subnet, or both.
Use a private IP (RFC 1918) subnet or a suitable subnet that is routable in your routing
domain, and does not overlap with the Mobile Users—GlobalProtect IP address pool or the
Infrastructure Subnet. Enter a subnet between /25 and /32.
STEP 9 | Enable routing to the subnetworks or individual IP addresses at the corporate site that your
users will need access to.
Prisma Access uses this information to route requests to the appropriate site. The networks
at each site cannot overlap with each other or with IP address pools that you designated for
Prisma Access Administrator’s Guide (Panorama Managed) 133 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
the service infrastructure or for the Prisma Access for users IP pools. You can configure Static
Routes, BGP, or a combination of both.
To configure Static Routes:
1. On the Static Routes tab, click Add and enter the subnetwork address (for example,
172.168.10.0/24) or individual IP address of a resource, such as a DNS server (for example,
10.32.5.1/32) that your remote users will need access to.
2. Repeat for all subnets or IP addresses that Prisma Access will need access to at this
location.
To configure BGP:
1. On the BGP tab, select Enable.
When you enable BGP, Prisma Access sets the time to live (TTL) value for external BGP
(eBGP) to 8 to accommodate any extra hops that might occur between the Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 134 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
infrastructure and your customer premises equipment (CPE) that terminates the eBGP
connection.
Prisma Access does not accept BGP default route advertisements for either service
connections or remote network connections.
2. (Optional) Select from the following choices:
• To add a no-export community for Corporate Access Nodes (Service Connections) to the
outbound prefixes from the eBGP peers at the customer premises equipment (CPE), set
Add no-export community to Enabled Out. This capability is Disabled by default.
Do not use this capability in hot potato routing mode.
• To prevent the Prisma Access BGP peer from forwarding routes into your organization’s
network. Don’t Advertise Prisma Access Routes.
By default, Prisma Access advertises all BGP routing information, including local routes
and all prefixes it receives from other service connections, remote networks, and mobile
user subnets. Select this check box to prevent Prisma Access from sending any BGP
advertisements, but still use the BGP information it receives to learn routes from other
BGP neighbors.
Since Prisma Access does not send BGP advertisements if you select this option,
you must configure static routes on the on-premises equipment to establish
routes back to Prisma Access.
• To reduce the number of mobile user IP subnet advertisements over BGP to your
customer premises equipment (CPE), specify Prisma Access to summarize the subnets
before it advertises them by selecting Summarize Mobile User Routes before
advertising.
By default, Prisma Access advertises the mobile users IP address pools in blocks of /24
subnets; if you summarize them, Prisma Access advertises the pool based on the
subnet you specified. For example, Prisma Access advertises a public user mobile IP
pool of 10.8.0.0/20 using the /20 subnet, rather than dividing the pool into subnets of
10.8.1.0/24, 10.8.2.0/24, 10.8.3.0/24, and so on before advertising them. Summarizing
these advertisements can reduce the number of routes stored in CPE routing tables. For
example, you can use IP pool summarization with cloud VPN gateways (Virtual Private
Prisma Access Administrator’s Guide (Panorama Managed) 135 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Gateways (VGWs) or Transit Gateways (TGWs)) that can accept a limited number of
routes.
If you have hot potato routing enabled and you enable route summarization,
Prisma Access no longer prepends AS-PATHs, which might cause asymmetric
routing. Be sure that your return traffic from the data center or headquarters
location has guaranteed symmetric return before you enable route
summarization with hot potato routing.
3. Enter the IP address assigned as the Router ID of the eBGP router on the data center/HQ
network for which you are configuring this service connection as the Peer Address.
4. Enter the Peer AS, which is the autonomous system (AS) to which the firewall virtual router
or BGP router at your data center/HQ network belongs.
5. (Optional) Enter an address that Prisma Access uses as its Local IP address for BGP.
Specifying a Local Address is useful where the device on the other side of the connection
(such as an Amazon Web Service (AWS) Virtual Private Gateway) requires a specific local IP
address for BGP peering to be successful. Make sure that the address you specify does not
conflict or overlap with IP addresses in the Infrastructure Subnet or subnets in the service
connection.
You must configure a static route on your CPE to the BGP Local Address.
If you use IPv6 networking for your service connection, you can configure IPv6 addresses
as well as IPv4 addresses. You also need to enable IPv6 networking globally in your Prisma
Access infrastructure before you can use IPv6 addressing.
If you do not specify a local address, Prisma Access uses an IP address from the
Infrastructure Subnet. After you Commit and Push your changes, you can find the Local
Prisma Access Administrator’s Guide (Panorama Managed) 136 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Address used under the EBGP Router Address (Panorama > Cloud Services > Status >
Network Details > Service Connection > EBGP Router).
6. (Optional) Enter and confirm a Secret passphrase to authenticate BGP peer
communications.
STEP 10 | (Optional) If you configured a Secondary WAN and you need to change the Peer Address
or Local Address for the secondary (backup) BGP peer, deselect Same as Primary WAN and
enter a unique Peer and, optionally, Local IP address for the secondary WAN.
In some deployments (for example, when using BGP to peer with an AWS VPN gateway), the
BGP peer for the primary and secondary WAN might be different. In those scenarios, you can
choose to set a different BGP peer for the secondary WAN.
For BGP deployments with secondary WANs, Prisma Access sets both the primary
and secondary tunnels in an UP state, but follows normal BGP active-backup behavior
for network traffic. Prisma Access sets the primary tunnel as active and sends and
receives traffic through that tunnel only; if the primary tunnel fails, Prisma Access
detects the failure using BGP rules, sets the secondary tunnel as active, and uses only
the secondary tunnel to send and receive traffic.
Prisma Access Administrator’s Guide (Panorama Managed) 137 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
STEP 11 | If required, enable Quality of Service for the service connection and specify a QoS profile or
add a New QoS Profile.
You can create QoS profiles to shape QoS traffic for remote network and service connections
and apply those profiles to traffic that you marked with PAN-OS security policies, traffic that
you marked with an on-premises device, or both PAN-OS-marked and on-premise-marked
traffic. See Quality of Service in Prisma Access for details.
Prisma Access Administrator’s Guide (Panorama Managed) 138 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
STEP 13 | Commit your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit and Push.
2. Edit Selections and, in the Prisma Access tab, make sure that Service Setup is selected in
the Push Scope, then click OK.
STEP 14 | Add more service connections by repeating Step 2 through Step 13.
STEP 15 | Configure the IPSec tunnel or tunnels from your IPSec-capable device on your corporate
network back to Prisma Access.
1. To determine the IP address of the tunnel within Prisma Access, select Panorama >
Cloud Services > Status > Network Details, click the Service Connection radio button,
and note the Service IP Address for the site.
The Service IP Address is the public-facing address that you will need to connect
to when you create the tunnel from your IPSec-capable device back to the service
connection.
2. On your IPSec-capable device at the corporate location, configure an IPSec tunnel that
connects to the Service IP Address within Prisma Access and commit the change on that
device so that the tunnel can be established.
Prisma Access Administrator’s Guide (Panorama Managed) 139 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
The Deployment Status area allows you to view the progress of onboarding and deployment jobs
before they complete, as well as see more information about the status of completed jobs. See
Prisma Access Deployment Progress and Status for details.
If the status is not OK, hover over the Status icon to view any errors.
To see a graphical representation of the service connection along with status details, select
Service Connection on the Monitor tab.
Prisma Access Administrator’s Guide (Panorama Managed) 140 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Prisma Access Administrator’s Guide (Panorama Managed) 141 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Click the tabs below the map to see additional information about the service connections.
Status tab:
• Location—The location where your service connection is deployed.
• Remote Peer—The corporate location to which this s service infrastructure is setting up an
IPSec tunnel.
Prisma Access Administrator’s Guide (Panorama Managed) 142 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Prisma Access Administrator’s Guide (Panorama Managed) 143 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
• Ingress Peak Bandwidth (Mbps)—The peak load from the HQ/data center location into the
cloud service.
• Egress Bandwidth (Mbps)—The bandwidth from Prisma Access into the HQ/data center
location.
• Egress Peak Bandwidth (Mbps)—The peak load from Prisma Access into the HQ/data center
location.
• QoS—Select this button to display a graphic chart that shows a real-time and historical QoS
statistics, including the number of dropped packets per class. This chart displays only for
service connections or remote network connections that have QoS enabled.
If you configured BGP, you can check its status by selecting Panorama > Cloud Services > Status
> Network Details > Service Connection > Show BGP Status.
The BGP Status dialog displays. This table provides you with the following information:
• Peer—Routing information for the BGP peer, including status, total number of routes,
configuration, and runtime statistics and counters. The total number of routes display in the
bgpAfiIpv4-unicast Counters area, in the Incoming Total and Outgoing Total fields.
• Local RIB—BGP routes that Prisma Access uses locally. Prisma Access selects this information
from the BGP RIB-In table, which stores the information sent by neighboring networking
Prisma Access Administrator’s Guide (Panorama Managed) 144 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
devices, applies local BGP import policies and routing decisions, and stores the Local RIB
information in the Routing Information Base (RIB).
Note that only the first 256 entries are shown. To view additional entries, enter a subnet or IP
address in the Filter field and click Apply Filter to view a subset of the routing entries up to a
maximum of 256.
• RIB Out—Routing information that Prisma Access advertises to its peers through BGP update
messages. See How BGP Advertises Mobile User IP Address Pools for an example of this table.
Prisma Access Administrator’s Guide (Panorama Managed) 145 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
After you add a service connection, the service connection connects the mobile users and the
remote networks in a hub-and-spoke network.
Another case where a service connection of this type is useful is when the service connection is
far from the mobile users. The following figure shows an example of this network deployment.
Prisma Access Administrator’s Guide (Panorama Managed) 146 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Adding a second service connection that is closer to the mobile users creates a more efficient
network between the mobile users and remote networks.
Prisma Access Administrator’s Guide (Panorama Managed) 147 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Prisma Access Administrator’s Guide (Panorama Managed) 148 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Bahrain Bahrain
Belgium Belgium
Latvia
Senegal
Prisma Access Administrator’s Guide (Panorama Managed) 149 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Prisma Access Administrator’s Guide (Panorama Managed) 150 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Ireland Ireland
Switzerland Switzerland
Uganda
Taiwan Taiwan
US Central US Central
Prisma Access Administrator’s Guide (Panorama Managed) 151 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
US East US East
US Northeast
Guatemala
US Southeast Colombia
Costa Rica
Ecuador
Panama
US Southeast
US Southwest US Southwest
US West
Africa Region
Kenya
Nigeria
Asia Region
Prisma Access Administrator’s Guide (Panorama Managed) 152 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Locations
Bangladesh
Cambodia
Hong Kong
India North
India South
India West
Indonesia
Malaysia
Myanmar
Pakistan South
Pakistan West
Philippines
Singapore
South Korea
Sri Lanka
Taiwan
Thailand
Vietnam
ANZ Region
Australia East
Australia South
Australia Southeast
New Zealand
Prisma Access Administrator’s Guide (Panorama Managed) 153 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Locations
Europe Region
Andorra
Austria
Belarus
Belgium
Bulgaria
Croatia
Czech Republic
Denmark
Finland
France North
France South
Germany Central
Germany North
Germany South
Greece
Hungary
Ireland
Italy
Liechtenstein
Lithuania
Luxembourg
Moldova
Monaco
Netherlands Central
Prisma Access Administrator’s Guide (Panorama Managed) 154 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Locations
Netherlands South
Norway
Poland
Portugal
Romania
Russia Central
Russia Northwest
Slovakia
Slovenia
Spain Central
Spain East
Sweden
Switzerland
UK
Ukraine
Uzbekistan
Japan Region
Japan Central
Japan South
Bahrain
Egypt
Israel
Jordan
Kuwait
Prisma Access Administrator’s Guide (Panorama Managed) 155 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Locations
Saudi Arabia
Turkey
Canada Central
Canada East
Canada West
Costa Rica
Mexico Central
Mexico West
Panama
US Central
US East
US Northeast
US Northwest
US South
US Southeast
US Southwest
US West
Argentina
Bolivia
Brazil Central
Brazil East
Brazil South
Prisma Access Administrator’s Guide (Panorama Managed) 156 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Locations
Chile
Colombia
Ecuador
Paraguay
Peru
Venezuela
Prisma Access Administrator’s Guide (Panorama Managed) 157 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Prisma Access Administrator’s Guide (Panorama Managed) 158 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Prisma Access Administrator’s Guide (Panorama Managed) 159 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prepare the Prisma Access Infrastructure and Service Connections
Prisma Access Administrator’s Guide (Panorama Managed) 160 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Securing mobile users from threats and risky applications is often a complex mix of procuring
and setting up the security and IT infrastructure and then ensuring bandwidth and uptime
requirements in multiple locations around the globe while staying within your budget. Prisma
Access allow you to secure mobile users using GlobalProtect or an Explicit Proxy.
• Prisma Access Mobile User Deployments
• GlobalProtect on Prisma Access
• Explicit Proxy on Prisma Access
• IP Address Pools in a Mobile Users—GlobalProtect Deployment
• How the GlobalProtect App Selects a Prisma Access Location for Mobile Users
• Monitor and Log Out GlobalProtect Users in Prisma Access
• Manage GlobalProtect App Upgrades in Prisma Access
• Deploy Explicit Proxy and GlobalProtect or a Third-Party VPN in Prisma Access
• Integrate Prisma Access with On-Premises Gateways
• Manage Priorities for Prisma Access and On-Premises Gateways
• Allow Listing for Mobile Users—GlobalProtect Deployments
• Report Prisma Access Website Access Issues
161
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 162 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 163 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Pre-Installation checklist:
• IP address pool—To configure Prisma Access for users, you need to provide an IP address
pool that does not overlap with other IP addresses you use internally or with the IP address
pool you designated for the Infrastructure Subnet.
Do not specify any subnets that overlap with the following IP addresses and subnets,
because Prisma Access reserves those IP addresses and subnets for its internal use:
169.254.169.253, 169.254.169.254, 169.254.201.0/24, 169.254.202.0/24, and
100.64.0.0/10.
Prisma Access uses this IP address pool to assign IP addresses to the virtual network
adapters of endpoints when they connect to Prisma Access using the GlobalProtect app.
Each device that connects to a Prisma Access mobile user gateway requires its own IP
address. You specify these pools during the mobile user onboarding process.
Palo Alto Networks recommends that the number of IP addresses in the pool is 2 times the
number of mobile user devices that will connect to Prisma Access. If your organization has
a bring your own device (BYOD) policy, or if a single user has multiple user accounts, make
sure that you take those extra devices and accounts into consideration when you allocate
your IP pools. If the IP address pool reaches its limit, additional mobile user devices will not
be able to connect.
When mobile user devices connect to a gateway, Prisma Access takes IP addresses from
the pools you specified and allocates them to the gateway in /24 blocks. When a /24 block
reaches its limit as more user devices log in, Prisma Access allocates more /24 blocks from
the pool to the gateway. Prisma Access advertises these /24 subnets into its backbone as
they are allocated based on their gateway assignments.
• Template—The Prisma Access GlobalProtect deployment automatically creates a template
stack and a top-level template. If you are already running GlobalProtect on premise and you
want to leverage your existing configuration, you can add additional templates to the stack
to push existing GlobalProtect portal, GlobalProtect gateway, User-ID, server profile (for
example, for connecting to your authentication service), certificate, and SSL/TLS service
profile configurations to Prisma Access for users. If you do not have templates with existing
configuration settings, you can manually enter the required configuration settings when you
Set Up GlobalProtect on Panorama Managed Prisma Access. Additionally, any template(s)
you add to the stack must contain the zone configuration for the zones you use to enforce
Security policy for your mobile users.
• Parent Device Group—When you configure Prisma Access for users, you must specify a
parent device group to use when you push your address groups and Security policy, Security
profiles, other policy objects (such as application groups and objects), HIP objects and
profiles, and authentication policy that the service requires to enforce consistent policy for
your remote users.
• Locations to Onboard—Prisma Access provides you with worldwide locations where you
can Set Up GlobalProtect on Panorama Managed Prisma Access. Before you onboard your
Prisma Access Administrator’s Guide (Panorama Managed) 164 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
locations, view this list to determine which locations you should onboard for your mobile
users deployment.
Choose locations that are closest to your users or in the same country as your users. If
a location is not available in the country where your mobile users reside, you can pick a
location that uses the same language as your mobile users.
You can also divide the locations by geographical region. Keeping all locations in a single
region allows you to specify an IP address pool for that region only, which can be useful
if you have a limited number of IP addresses that you can allocate to the pool. A single
regional IP address pool also provides more granular control over deployed regions and
allows you to exclude regions as required by your policy or industry regulations.
If you have a Local license for Prisma Access for Users and you have a GlobalProtect
deployment as well as an Explicit Proxy deployment, you can deploy a maximum of five
locations for both deployments combined. You need to allocate the five locations between
both deployments (for example, two locations for Mobile Users—GlobalProtect and three
locations for Mobile Users—Explicit Proxy). If you have a Worldwide license, there are no
restrictions for the maximum number of locations.
• Portal Hostname—Prisma Access for users enables you to quickly and easily set up the
portal hostname using a default domain name (.gpcloudservice.com). In this case, the
cloud service automatically publishes the hostname to public DNS servers and handles all
certificate generation. However, you can opt to use your own company domain name in the
portal hostname. If you plan to use your company domain name, you must obtain your own
certificates for the portal and configure an SSL/TLS service profile to point to the certificate
before you configure the service. Additionally, if you use your own domain name in the
portal hostname, you also need to configure your DNS servers to point to the portal DNS
CNAME, which is provided during the configuration process.
• Service Connection—You must create and configure a service connection if you want
to enable your mobile users to access resources, such as authentication servers, on your
internal network (for example, an authentication server in your data center or HQ location)
or enable your mobile users to access your remote network locations.
Even if you don’t plan to use the connection to provide access to your internal resources,
you must configure at least one service connection with placeholder values if you want your
mobile users to be able to connect to your remote network locations or if you have mobile
users in different geographical areas who need direct access to each other’s endpoints.
• IPv6 Usage in Your Network—Determine whether you want to perform any mitigation for
IPv6 traffic in your network to reduce the attack surface. In a dual stack endpoint that can
process both IPv4 and IPv6 traffic, mobile user IPv6 traffic is not sent to Prisma Access by
default and is sent to the local network adapter on the endpoint instead. For this reason,
Palo Alto Networks recommends that you configure Prisma Access to sinkhole IPv6 traffic.
• Logging for GlobalProtect Endpoints—You have two options to collect logs from mobile
users who use the GlobalProtect app:
• Manual Log Collection from GlobalProtect Endpoints—Have the mobile users collect the
logs from the GlobalProtect app for Windows, macOS, and Linux devices. This option
requires no additional configuration.
• GlobalProtect App Log Collection for Troubleshooting—Allow the GlobalProtect app
to perform end-to-end diagnostic tests to resolve connection, performance, and access
Prisma Access Administrator’s Guide (Panorama Managed) 165 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
issues, and generate troubleshooting and diagnostic logs to be sent to Cortex Data
Lake for further analysis. You need to generate a certificate so that the GlobalProtect
app can authenticate with Cortex Data Lake to collect the troubleshooting logs. This
functionality is under Panorama > Cloud Services > Configuration > Service Setup >
Generate Certificate for GlobalProtect App Log Collection and Autonomous DEM. See
GlobalProtect App Log Collection for Troubleshooting for configuration details.
Post-Installation checklist:
• Add the Public IP Addresses to an allow list in Your Network—After you onboard your
locations, you need to the public and IP addresses used by each location and add these
locations’ IP addresses to an allow list in your network to allow mobile users access to SaaS
or public applications. If you add more locations, you will also need to retrieve the new IP
addresses that Prisma Access allocates for the newly-added location or locations.
This validation is not available if you configure locations using CLI. If you deploy all
locations using CLI, we recommend that you add a /18 address in the Worldwide pool for
mobile users.
Prisma Access checks your configuration to make sure that you have specified the following
minimum IP address pool:
• A minimum of /23 (512 IP addresses) is required for either a Worldwide or regional address
pool.
• If you do not onboard any Prisma Access gateways in a region, an IP address pool for that
region is not required. For example, if you specify gateways in the US Northwest, US West,
and US Southwest locations, you need to only specify an IP address pool for the North America
& South America region. Conversely, if you enable mobile user locations in Europe without
specifying either a Worldwide address pool or the Africa, Europe, & Middle East theater, your
deployment will fail.
Prisma Access Administrator’s Guide (Panorama Managed) 166 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
• GlobalProtect mobile users consume the IP addresses in the location group first, then theater-
specific IP addresses, then Worldwide IP addresses. For example, if you specify a pool for a
location group and Worldwide, and you then exhaust the available IP addresses in the location
group pool, Prisma Access then takes IP addresses from the Worldwide pool to use in that
location group.
If you specify more than one block of IP address pools, Prisma Access uses the pools in the
order that you entered them during mobile user setup.
STEP 2 | Configure the template stack and device group hierarchy that the cloud service will push to
the portal and gateway.
1. Edit the Settings.
2. In the Templates section of the Settings tab, Add the template that contains the
configuration you want to push to Prisma Access for users.
Although you can add existing templates to the stack from the plugin, you
cannot create a new template from the plugin. Instead, use the workflow to add
a new template.
You can Add more than one existing template to the stack and then order them
appropriately using Move Up and Move Down. This is important because Panorama
evaluates the templates in the stack from top to bottom and settings in templates that
are higher in the stack take priority over the same settings specified in templates that are
lower in the stack. You cannot move the default Mobile_User_Template from the top of
Prisma Access Administrator’s Guide (Panorama Managed) 167 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
the stack; this prevents you from overriding any settings that Prisma Access requires to
create the network infrastructure in the cloud.
If you want to customize the agent configuration that the Prisma Access for
users pushes to clients from the portal, you must edit the GlobalProtect Portal
configuration in the Mobile_User_Template to add a new agent configuration.
After configuring the Agent configuration, move it above the DEFAULT agent
configuration that is predefined in the template to ensure that your settings take
precedence over the default settings. When editing this template, do not remove
or change the External Gateway entry.
3. In the Device Group section, select the Parent Device Group that contains the
configuration settings you want to push to Prisma Access for users, or leave the parent
device group as Shared to use the Prisma Access device group shared hierarchy.
You will push all of the configuration—including the address groups, Security policy,
Security profiles, and other policy objects (such as application groups and objects), HIP
objects and profiles and authentication policy—that Prisma Access for users needs to
enforce consistent policy to your mobile users using the device group hierarchy you
specify here. In addition, you must make sure that you have configured a Log Forwarding
profile that forwards the desired log types to Panorama/Cortex Data Lake in a device
Prisma Access Administrator’s Guide (Panorama Managed) 168 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
group that gets pushed to Prisma Access for users; this is the only way that the cloud
service knows which logs to forward to Cortex Data Lake.
4. (Optional) If you have configured a next-generation firewall as a master device or added
a Cloud Identity Engine profile to make user and group information selectable in security
policies, select User-ID Master Device or Cloud Identity Engine; then, select either the
Master Device or the Cloud Identity Engine profile that you created.
STEP 3 | (Optional) Configure Prisma Access to use the Directory Sync component of the Cloud
Identity Engine to retrieve user and group information.
You must configure the Directory Sync component of the Cloud Identity Engine to retrieve
user and group information from cloud directory or Active Directory (AD) before you enable
and configure Directory Sync integration in Prisma Access Group Mapping Settings.
STEP 5 | Map the zones configured within the selected template stack as trusted or untrusted.
On a Palo Alto Networks next-generation firewall, Security policy is enforced between
zones, which map to physical or virtual interfaces on the firewall. However, with Prisma
Access for users, the networking infrastructure is automatically set up for you, which means
Prisma Access Administrator’s Guide (Panorama Managed) 169 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
you no longer need to configure interfaces and associate them with zones. However, to
enable consistent security policy enforcement, you must map the zones you use within your
organization as trust or untrust so that Prisma Access for users can translate the policy rules
you push to the cloud service to the internal zones within the networking infrastructure.
1. Edit the Zone Mapping settings.
By default, all of the zones in the Mobile_User_Template_Stack are classified as
Untrusted Zones.
2. For each zone you want to designate as trusted, select it and click Add to move it to the
list of Trusted Zones.
Prisma Access Administrator’s Guide (Panorama Managed) 170 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
to append to the default domain name. Prisma Access for users will automatically
create the necessary certificates and publish the hostname to public DNS servers.
If you already have a GlobalProtect deployment with an existing portal name and
you want to continue to use that portal name, add a CNAME entry that maps Prisma
Access portal name to your existing portal name. For example, if you have an existing
portal named portal.acme.com and you want to map the new Prisma Access portal to
this same name, you would add a CNAME of gpcs2.gpcloudservice.com to the DNS
entry for your existing portal.
Prisma Access Administrator’s Guide (Panorama Managed) 171 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
can configure the portal name by selecting the SSL/TLS Service Profile and entering
the Portal Hostname. If you use this option, you must point your internal DNS
servers to the Portal DNS CNAME, which is the hostname of the portal with the
.gpcloudservice.com domain. For example, if you specified a DNS hostname of
Prisma Access Administrator’s Guide (Panorama Managed) 172 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
acme-portal.acme.com, you would need to create a DNS CNAME entry that maps
that hostname to acme-portal.gpcloudservice.com on your internal DNS servers.
If you need to upload a new certificate, import the certificate and private key;
then, view the SSL/TLS service being used by Prisma Access under Network >
GlobalProtect > Portals > GlobalProtect_Portal > Authentication and check the
SSL/TLS Service Profile name. This field only displays if you are using a company
domain instead of the default domain. You can then select Device > Certificate
Management > SSL/TLS Certificate Profile and replace the certificate in the
SSL/TLS profile used by the portal with the certificate you imported.
3. Select an Authentication Profile that specifies how Prisma Access should authenticate
mobile users or create a new one.
If you added a parent device group that contains an authentication profile configuration,
you should see it on the list of available profiles. If you did not push the profile in the
device group, you can create an authentication profile now.
After you commit and push your changes, you cannot make any changes to the
authentication profile and authentication override certificate in this area and
the choices become read-only. To make changes after initial onboarding, modify
or add one or more GlobalProtect client authentication configurations under
the Mobile_User_Template.
4. Select an Authentication Override Certificate to encrypt the secure cookies that mobile
users authenticate to the portal and gateway.
If you added a parent device group that contains the certificate you want to use to
encrypt authentication cookies, you should see it on the list of available certificates. If
you did not push a certificate in the device group, you can import or generate one now.
5. (Optional) If you do not require GlobalProtect endpoints to have tunnel connections
when on the internal network, enable Internal Host Detection.
1. Select the Internal Host Detection check box.
2. Enter the IP Address of a host that users can reach only from the internal network.
3. Enter the DNS Hostname for the IP address you entered. Clients that try to connect
perform a reverse DNS lookup on the specified address. If the lookup fails, the client
determines that it needs a tunnel connection to Prisma Access for users.
Prisma Access copies the internal host detection settings you specify here to the
default agent settings in your GlobalProtect portal configuration (Network
> GlobalProtect > Portals > <portal-config> > Agent > DEFAULT > Internal).
If you have entered internal host detection settings for the default agent in
the GlobalProtect portal, you will not be able to change the options here and
must change it in the portal. If you require multiple agent configs, enter settings
for the default agent config in the GlobalProtect portal and use those settings
for Prisma Access, then select Network > GlobalProtect > Portals > <portal-
config> > Agent and Add a non-default config, and specify that config in other
parts of your deployment.
6. (Optional) To ensure that your mobile users have redundancy connectivity to the
services and applications that are accessible from service connections, Enable Network
Redundancy between the portals or gateways and service connections.
Prisma Access Administrator’s Guide (Panorama Managed) 173 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 7 | Select the Locations and the regions associated with those locations where you want to
deploy your mobile users.
The Locations tab displays a map. Highlighting the map shows the global regions (Americas,
Europe, and Asia Pacific) and the locations available inside each region. Select a region, then
select the locations you want to deploy in each region. Limiting your deployment to a single
region provides more granular control over deployed regions and allows you to exclude regions
as required by your policy or industry regulations. See Prisma Access Locations for the list of
Prisma Access Administrator’s Guide (Panorama Managed) 174 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
regions and locations. You can select a location in a region that is closest to your mobile users,
or select a location as required by your policy or industry regulations.
Prisma Access uses the Hong Kong, Netherlands Central, and US Northwest locations
as fallback mobile user locations if other locations are not available. For this reason,
Palo Alto Networks strongly recommends that you enable at least one of these
locations during mobile user onboarding.
2. Select one or more Prisma Access gateways within your selected region using the map.
Hovering your cursor over a location highlights it. White circles indicate an available
location; green circles indicate that you have selected that location.
Prisma Access Administrator’s Guide (Panorama Managed) 175 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
In addition to the map view, you can view a list of regions and locations. Choose
between the map and list view from the lower left corner. In the list view, the list
Prisma Access Administrator’s Guide (Panorama Managed) 176 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
displays regions sorted by columns, with all locations sorted by region. You can select All
sites within a region (top of the dialog).
STEP 8 | Set up the IP address pools used to assign IP addresses to GlobalProtect endpoints by
selecting the IP Pools tab and Add an IP address pool.
1. Specify a Region for the IP address pool.
You can use a single IP address pool for all GlobalProtect endpoints in the world
(Worldwide), you can use separate pools for each theater where you have mobile users,
or you can specify pools per location group (a group of locations that is smaller than the
theater). You can also specify a combination of worldwide, per-theater, or per-location
group IP pools. For example, you could add a pool for a specific location group and then
add a Worldwide pool to use for all other locations.
Use location group-specific IP address pools if you have services that depend on the
source IP address of the user to identify the user’s details (such as location-based
services or services based on a user group or function) so you can apply access control
policies, or to perform routing or policy operations on different countries if the countries
Prisma Access Administrator’s Guide (Panorama Managed) 177 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
are in different compute regions. For example, you could use a separate IP address
pool for Canada and one for Brazil, which are in different compute locations, to provide
distinct access and security controls.
GlobalProtect mobile users consume the IP addresses in the location group first, then
theater-specific IP addresses, then Worldwide IP addresses. For example, if you specify
a pool for a location group and Worldwide, and you then exhaust the available IP
addresses in the location group pool, Prisma Access then takes IP addresses from the
Worldwide pool to use in that location group.
• To specify IP pools that can be used by all GlobalProtect mobile users, select
Worldwide.
• To specify IP pools that can be used by GlobalProtect users in a specific theater,
select the theater.
• To specify IP pools that are specific to the location group, select it from the list.
Prisma Access Administrator’s Guide (Panorama Managed) 178 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 9 | To specify the DNS resolution settings for your internal and external (public) domains, select
Network Services tab and Add the settings.
GlobalProtect endpoints with an active tunnel connection use their virtual network adapters
rather than their physical network adapters and therefore require separate DNS resolution
settings.
Configure network settings in the Network Services window.
• Select a Region from the drop-down.
Select Worldwide, select a theater, or select a location group to apply the DNS settings
globally. If you specify multiple proxy settings with a mix of Worldwide, theater, and
Prisma Access Administrator’s Guide (Panorama Managed) 179 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
location group-specific settings, Prisma Access uses the settings for the location group, then
theater, then Worldwide. Prisma Access evaluates the rules from top to bottom in the list.
• Add one or more rules to configure the DNS settings for Internal Domains.
• Enter a unique Rule Name for the rule.
• you want your internal DNS server to only resolve the domains you specify, enter the
domains to resolve in the Domain List. Specify an asterisk in front of the domain; for
example, *.acme.com. You can specify a maximum of 1,024 domain entries.
Prisma Access Administrator’s Guide (Panorama Managed) 180 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
not enter a wildcard (*) character in front of the domain suffix (for example, acme.com). You
can add multiple suffixes.
• If you want Prisma Access to proxy DNS requests, configure values for UDP queries (the
Interval to retry the query in seconds and the number of retry Attempts to perform.
For more information about how Prisma Access proxies DNS requests, see DNS Resolution
for Mobile Users—GlobalProtect Deployments.
STEP 10 | (Optional) If your deployment uses Windows Internet Name Service (WINS) based, you can
specify WINS servers to resolve NetBIOS name-to-IP address mapping by selecting WINS
Configuration; selecting a region for the WINS server or selecting Worldwide to apply the
WINS configuration worldwide, then specifying a Primary WINS and, optionally, Secondary
WINS server address.
After you enable WINS, Prisma Access can push WINS configuration to mobile users’
endpoints over GlobalProtect.
STEP 11 | (Optional) Select Advanced RCODE Support to allow the primary DNS server to fail over to
the secondary DNS server if an RCODE 2 (SERVFAIL) and RCODE 5 (REFUSED) DNS return
code is received.
A DNS response code of SERVFAIL refers to a communication error with the primary DNS
server, and a DNS response code of REFUSED means that the primary DNS server refused to
Prisma Access Administrator’s Guide (Panorama Managed) 181 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
provide the requested information. In both cases, the service fails over to the secondary DNS
server.
Prisma Access Administrator’s Guide (Panorama Managed) 182 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 12 | (Optional) If you allow your mobile users to manually select gateways from the GlobalProtect
app, select the Manual Gateway Locations that the users can view from their GlobalProtect
app.
Choosing a subset of onboarded locations reduces the number of available gateways that
mobile users can view in their GlobalProtect app for manual gateway selection.
If you do not select manual gateways in this tab, Prisma Access selects the following list of
gateways by default.
• Australia Southeast
• Belgium
• Brazil South
• Canada East
• Finland
• France North
• Germany Central
• Hong Kong
• India West
• Ireland
• Israel
• Japan Central
• Netherlands Central
• Saudi Arabia
• Singapore
• South Africa Central
• South Korea
• Taiwan
• UK
• US East
• US West
Prisma Access lets you select only gateways that you have onboarded. For example, if you
don’t choose UK when you select locations, you cannot select UK as a manual gateway (the
location is grayed out).
Prisma Access Administrator’s Guide (Panorama Managed) 183 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
If you need to delete a location after you onboard it, and it is selected as one of the
Manual Gateway Locations, be sure to deselect it here as well as in the Locations tab.
Prisma Access Administrator’s Guide (Panorama Managed) 184 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 15 | (Optional, Windows and macOS only) Exclude video traffic from the GlobalProtect tunnel.
Exclude video traffic from the tunnel; then, Add or Delete video streaming applications that
you want to exclude from the GlobalProtect tunnel.
STEP 16 | Create security policy rules to secure traffic for your mobile users.
1. Select the Device Group in which to add policy rules. You can select the
Mobile_User_Device_Group or the parent device group that you selected when setting
up Prisma Access for mobile users.
2. Create security policy rules. Make sure that you do not define security policy rules to
allow traffic from any zone to any zone. In the security policy rules, use the zones that
you defined in the template stack you are pushing to the cloud service.
Prisma Access Administrator’s Guide (Panorama Managed) 185 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 18 | (Optional) Forward logs for other log types to Cortex Data Lake.
To do this, you must create and attach a log forwarding profile to each policy rule for which
you want to forward logs.
1. Select the Device Group in which you added the policy rules.
2. Select Objects > Log Forwarding and Add a profile. In the Log Forwarding Profile Match
List, Add each log type that you want to forward.
The following example enables forwarding of Traffic, Threat Prevention, WildFire
Submission, URL Filtering, Data Filtering, and Authentication logs.
3. Select Panorama/Cortex Data Lake as the Forward Method. When you select Panorama,
the logs are forwarded to Cortex Data Lake. You will be able to monitor the logs and
generate reports from Panorama. Cortex Data Lake provides a seamless integration to
store logs without backhauling them to your Panorama at the corporate headquarters,
and Panorama can query Cortex Data Lake as needed.
4. Select Policies > Security and edit the policy rule. In Actions, select the Log Forwarding
profile you created.
Prisma Access Administrator’s Guide (Panorama Managed) 186 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 19 | Commit all your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit and Push.
2. Edit Selections and, in the Prisma Access tab, make sure that Mobile Users is selected in
the Push Scope, then click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 187 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 20 | To verify that Prisma Access for users is deployed and active, select Panorama > Cloud
Services > Status > Status.
After the provisioning completes, the mobile users Status and Config Status should show OK.
The Deployment Status area allows you to view the progress of onboarding and deployment
jobs before they complete, as well as see more information about the status of completed jobs.
See Prisma Access Deployment Progress and Status for details.
To view the number of unique users who are currently logged in, or to log out a logged in user,
click the hyperlinked number next to Current Users.
Prisma Access Administrator’s Guide (Panorama Managed) 188 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
To view historical information of previously-logged in users for a 90-day time period, click the
number next to Users (Last 90 days).
When the number of users in the Users (Last 90 days) field reaches 80% of the total licensed
number, the number displays in a red color.
To export the list of users to a csv file, select Export to CSV. Note that a maximum of 45,000
users can be exported to a CSV file.
Prisma Access Administrator’s Guide (Panorama Managed) 189 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
To display a map that shows the locations of Prisma Access portals and gateways running in
the regions you have selected, select Monitor; then, select Mobile Users.
Prisma Access Administrator’s Guide (Panorama Managed) 190 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 191 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
• Current Users—The number of users who are connected and being secured by the service.
When the current mobile user count reaches 80% of its total licensed number, this number
displays in red.
• Peak Users—The count for the maximum number of concurrent users.
• Peak Users Timestamp—The timestamp when the Peak Users data was last retrieved.
• Status—The operational status of the connection between Prisma Access and your mobile
users.
• Config Status—The status of your last configuration push to the service. If you have made
a change locally, and not yet pushed the configuration to the cloud, this may display the
status Out of sync. Hover over the status indicator for more detailed information. After
Prisma Access Administrator’s Guide (Panorama Managed) 192 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
committing and pushing the configuration to Prisma Access, the Config Status changes to In
sync.
STEP 21 | If you chose to Use Company Domain for your portal hostname, you must add a DNS entry
on your internal DNS servers to map the portal hostname you defined to the Portal DNS
CNAME displayed on the Cloud Services > Configuration > Mobile Users > Onboarding >
General tab (for example, <portal_hostname>.gpcloudservice.com).
Prisma Access Administrator’s Guide (Panorama Managed) 193 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access manages the version of the GlobalProtect app on the portal and you
can select the active version from the versions that Prisma Access hosts, as well as
control the ability of users to download it.
Alternatively, you can host GlobalProtect app software on a web server for your Mac OS and
Windows users. Prisma Access is compatible with any GlobalProtect app versions that are not
listed as end of life.
Mobile app users can download and install the GlobalProtect mobile app from the appropriate
app store for their operating systems.
STEP 2 | Enable asymmetric routing with load sharing across service connections in your backbone
routing options to choose the best alternate route in case of connectivity failure.
Prisma Access Administrator’s Guide (Panorama Managed) 194 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 3 | Select the Enable Network Redundancy check box when you onboard mobile users.
If you have already onboarded mobile users, edit the configuration settings in the Onboarding
section.
1. Select Panorama > Cloud Services > Configuration > Mobile Users - GlobalProtect.
2. Select the hostname in the Onboarding section.
3. Select the Enable Network Redundancy check box.
4. Click OK.
STEP 4 | Commit all your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit and Push.
2. Edit Selections and, in the Prisma Access tab, make sure that Mobile Users is selected in
the Push Scope, then click OK.
3. Click Commit and Push.
Prisma Access Administrator’s Guide (Panorama Managed) 195 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
You enable the mobile user locations where you want Prisma Access to be present during
mobile user onboarding. If you do not select the location during onboarding, Prisma
Access does not use it in your deployment.
• If the mobile user connects in a country that has a Prisma Access location, the user connects to
the location in that country.
• If the mobile user cannot connect to an in-country location for any reason, Prisma Access
selects from one of the following mobile user locations to connect the user based on region.
• Asia, Australia & Japan: Hong Kong, Japan Central, or Japan South
• Africa, Europe & Middle East: Netherlands Central
• North America & South America: US Northwest
Palo Alto Networks recommends that you enable at least one of these locations in their
respective regions during mobile user onboarding to provide redundancy. If you have mobile
users who connect to Prisma Access from a country that does not have a Prisma Access
location, you must enable at least one of the fallback locations in the preceding list.
The Hong Kong, Japan Central, Japan South, Netherlands Central, and US Northwest locations
can accept client connections from anywhere and are known as global fallback locations. In
addition to these locations, you can enable one or more of the following locations which also
act as global fallback locations:
• Bahrain
• France North
• Ireland
• South Africa West
• South Korea
• Palo Alto Networks recommends that you enable locations in more than one compute location
for redundancy purposes.
• If you use on-premises gateways with Prisma Access locations, you can specify priorities in
Prisma Access to let mobile users connect to either a specific on-premises GlobalProtect
gateway or a Prisma Access location.
• When mobile users connect, the GlobalProtect app does not use the following Prisma Access
locations in the automatic gateway selection process, even if you selected the Prisma Access
locations in the plugin during onboarding. However, mobile users can still manually select one
Prisma Access Administrator’s Guide (Panorama Managed) 196 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
of these locations and set it as a preferred location (gateway) as long as you allow them to
manually select those locations during mobile user onboarding:
• Australia: Australia East
• Brazil: Brazil East and Brazil Central
• France: France South
• Germany: Germany North and Germany South
• India: India South
• Mexico: Mexico West
• Netherlands: Netherlands South
• Pakistan: Pakistan West
• Russia: Russia Northwest
• Spain: Spain East
You might have to change your Connect Method to On-Demand for the mobile user to
manually connect to a gateway.
Prisma Access Administrator’s Guide (Panorama Managed) 197 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 1 | The mobile user browses the Internet or accesses the SaaS application by entering the URL
or IP address using a web browser.
STEP 2 | The browser on the mobile users’ endpoint checks for the PAC file.
This PAC file specifies that the URL or SaaS request should be forwarded to Prisma Access
Explicit Proxy.
STEP 3 | The HTTPS client (the browser on the mobile user’s endpoint) forwards the URL request to
the proxy URL.
STEP 4 | The traffic is redirected to Explicit Proxy, and the proxy decrypts the traffic.
Prisma Access Administrator’s Guide (Panorama Managed) 198 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 5 | The proxy inspects the traffic and checks for the authentication cookie set up by the Prisma
Access Explicit Proxy.
The cookie contains information that identifies the mobile user, and uses the cookie to
authenticate the user.
STEP 6 | If, upon inspection of the cookie, Prisma Access determines that the user has not been
authenticated, it redirects the user for authentication.
STEP 7 | After the IdP authenticates the user, Prisma Access stores the authentication state of the
user in the Authentication Cache Service (ACS). The validity period of the authentication is
based on the Cookie Lifetime value you specify during Explicit Proxy configuration.
STEP 8 | The Explicit Proxy checks for the presence and validity of our cookie. If the cookie is not
present or is invalid, the user is redirected to ACS. After ACS confirms the authentication of
the user, the user is redirected back to Explicit Proxy with a token. The proxy then validates
that token and sets the cookie for that domain for that user.
STEP 9 | Prisma Access applies security enforcement based on the security policy rules that the
administrator has configured.
STEP 10 | If the URL is not blocked by security policy rules, Prisma Access sends the URL request to
the internet.
Users that are logged in from another proxy XAU header information.
that uses X-Authenticated-User (XAU)
Explicit Proxy only allows traffic from specific
headers
IP addresses to use XAU for authentication.
You create an address object and specify
the IP addresses where you allow XAU for
authentication; then, add the address object
in the Trusted Source Address field during
Explicit Proxy setup.
Prisma Access Administrator’s Guide (Panorama Managed) 199 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 200 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
• You must configure an SSL decryption policy for all Explicit Proxy traffic.
Decryption is required for Prisma Access to read the authentication state cookie
set up by Prisma Access on the mobile user’s browser. Failing to enforce decryption
enables the abuse of Explicit Proxy as an open proxy that can be widely misused as a
forwarding service for conducting denial of service attacks.
To prevent users from accessing undecrypted sites, be sure to leave the Decrypt traffic that
matches existing decryption rules; for undecrypted traffic, allow traffic only from known IPs
registered by authenticated users check box selected when you configure Explicit Proxy.
• Explicit Proxy does not support HTTP/2 natively. HTTP/2 protocol requests will be
downgraded to HTTP/1.1. Explicit Proxy strips out application-layer protocol negotiation
(ALPN) headers from uploaded files, regardless of your configuration.
• The maximum supported TLS version is 1.3. When creating a decryption profile, specify a Max
Version of TLS v1.3.
• If mobile users are connecting from remote sites or headquarters/data center locations using
an Explicit Proxy, the mobile user endpoint must be able reach and route to the IdP, ACS
FQDN, Explicit Proxy URL, and URL of the PAC file hosted by Prisma Access. To find the ACS
FQDN and the Explicit Proxy URL, select Panorama > Cloud Services > Status > Network
Details > Mobile Users—Explicit Proxy.
Panorama and Content Version Requirements—Make sure that your deployment has the
following minimum Panorama and Antivirus Content version requirements:
• Explicit Proxy requires a minimum Panorama version of 10.0.5.
Prisma Access Administrator’s Guide (Panorama Managed) 201 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
• Explicit Proxy requires a minimum antivirus Content Version of 3590 to be installed on the
Panorama to support the predefined security policies. Install the required Content Version
before committing the Mobile Users—Explicit Proxy configuration.
Palo Alto Networks Subscription Support—Explicit Proxy includes Threat Prevention, URL
Filtering, WildFire, DNS Security, and DLP subscriptions. The DNS Security subscription is also
included and includes support for the Command and Control Domains and Malware Domains
DNS Security threat categories.
Mobile User App Support and Browser Guidelines—Explicit Proxy supports the following apps
and has the following browser guidelines and requirements:
• Explicit Proxy secures internet and SaaS applications accessed over the mobile users’ browser
using HTTP and HTTPS traffic only. Non-web ports and protocols are not supported.
• Explicit Proxy does not support the full client-based version of Microsoft 365 (Office 365),
which uses non-web ports. However, it is designed to support web-based M365, including
Office Online (office.com).
• Explicit Proxy does not provide access to private applications.
• Mobile users will be unidentified in the traffic logs for sites that are not decrypted, with some
exceptions.
• Make a note of the following browser requirements and usage guidelines:
• If you use Explicit Proxy, do not disable cookies in your browser; if you do, you cannot
browse any web pages.
• If you are using Explicit Proxy with Microsoft Edge, be sure that Settings > Privacy, Search,
and Services > Tracking prevention is set to Basic.
• If you use Safari with Explicit Proxy, you might experience issues when accessing websites.
Instead of Safari, use Microsoft Edge, Firefox, Chrome, or Internet Explorer as your browser.
• When using Firefox with an Explicit Proxy, go to about:config and set
security.csp.enable to false. In addition, some add-ons, such as ones that perform
ad blocking or tracking protection, might interfere with tracking protection.
• To support desktop applications, or applications that do not send HTTP traffic, you can
configure GlobalProtect in split tunnel mode and use GlobalProtect in conjunction with
Explicit Proxy.
• If you visit a website for the first time, are prompted to enter Explicit Proxy credentials, then
refresh the browser, you might receive an error. If this condition occurs, re-visit the website
without refreshing and retry the authentication operation.
PAC File Requirements and Guidelines—Follow the PAC file requirements and guidelines when
you set up the PAC file to use with Explicit Proxy.
Proxy Chaining Guidelines—If you use proxy chaining from a third-party proxy to Explicit Proxy,
specify the Explicit Proxy URL (Panorama > Cloud Services > Status > Network Details > Mobile
Users—Explicit Proxy) in the third-party proxy to forward traffic to Explicit Proxy.
Authentication Requirements—SAML is the only supported authentication protocol. Prisma
Access supports PingOne, Azure AD, and Okta as SAML authentication providers, but you should
be able to use any vendor that supports SAML 2.0 as a SAML identity provider (IdP). For more
details about configuring SAML authentication with Prisma Access, including examples for Azure
Prisma Access Administrator’s Guide (Panorama Managed) 202 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
AD, Okta, and Active Directory Federation Services (ADFS) 4.0, see Authenticate Mobile Users in
the Prisma Access Integration Guide (Panorama Managed).
Group Mapping Requirements—You use the Cloud Identity Engine to retrieve user and group
mapping information.
Private or Data Center Access Support—Explicit Proxy does not support flows to Private or Data
Center access for internal applications. It is internet-outbound only.
Port Listening Guidelines—Explicit Proxy only listens on port 8080.
On-Premises Support—Explicit Proxy is a cloud-based proxy solution, and is not offered as an on-
premises product.
Prisma Access Administrator’s Guide (Panorama Managed) 203 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
If you want to use the default PAC file that Prisma Access provides, you can optionally modify the
fields in the PAC file as described in the following table.
Text Description
Prisma Access Administrator’s Guide (Panorama Managed) 204 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Text Description
• shExpMatch(host, "*.local") ||—
Bypasses the proxy for any hostnames
that are hosted in the internal network
(localhost).
• isInNet(resolved_ip,
"10.0.0.0", "255.0.0.0")
|| isInNet(resolved_ip,
"172.16.0.0", "255.240.0.0")
|| isInNet(resolved_ip,
"192.168.0.0", "255.255.0.0")
|| isInNet(resolved_ip,
"127.0.0.0", "255.255.255.0"))—
Bypasses Explicit Proxy for any IP addresses
that are in the private or loopback IP
address range.
Prisma Access Administrator’s Guide (Panorama Managed) 205 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Text Description
paloaltonetworks-245139.proxy.prismaaccess.co
or PROXY 1.2.3.4:8080.
sAMAccountName: muser
Netbios: example
userPrincipalName: [email protected]
mail: [email protected]
If, in the Cloud Identity Engine configuration, you use a Primary Username of
userPrincipalName and an E-Mail of mail, the user information that Cortex
Data Lake returns in traffic logs and the user information that the ACS returns in
authentication logs will be different. In this example, ACS sends the mail attribute
([email protected]) to the authentication logs and Cortex Data Lake sends
the userPrincipalName attribute ([email protected]) to the traffic logs. As a result
of this mismatch, your user count will not be accurate in the Current Users and Users
(Last 90 days) fields when checking the Explicit Proxy status in the Status (Panorama >
Cloud Services > Status > Status page. For this reason, use the same directory attribute
Prisma Access Administrator’s Guide (Panorama Managed) 206 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
for Primary Username and E-Mail (for example, mail) when specifying Group Mapping
Settings.
• When using Panorama to manage Prisma Access, the Cloud Identity Engine does not
auto-populate user and group information in security policy rules.
• IdP Guidelines:
• Use the following URLs when configuring SAML:
SAML Assertion Consumer Service URL: https://
global.acs.prismaaccess.com/saml/acs
Entity ID URL: https://global.acs.prismaaccess.com/saml/metadata
• If you use Okta as the IdP, use EmailAddress for the Name ID Format setting.
• Enter a single sign on URL of https://global.acs.prismaaccess.com/saml/
acs.
• Single Logout (SLO) is not supported.
• To troubleshoot IdP authentication issues, use the IdP’s monitoring and troubleshooting
capabilities. The ACS does not log IdP authentication failures.
• When creating an Authentication Profile for the SAML IdP, in the Advanced tab, select
all in the Allow List or Explicit Proxy will not be able to retrieve group mapping.
Prisma Access Administrator’s Guide (Panorama Managed) 207 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
in security policies, select User-ID Master Device or Cloud Identity Engine; then,
select either the Master Device or the Cloud Identity Engine profile that you created.
• In the License Allocation section, specify the number of mobile users to allocate for
Explicit Proxy.
3. In the Group Mapping Settings tab, Enable Directory Sync Integration (now known as
the Cloud Identity Engine) to configure Prisma Access to use the Cloud Identity Engine
to retrieve user and group information.
You use the Cloud Identity Engine to populate user and group mapping information for
an Explicit Proxy deployment. To configure the Cloud Identity Engine, you set up the
Cloud Identity Engine on your AD and associate the Panorama that manages Prisma
Prisma Access Administrator’s Guide (Panorama Managed) 208 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Access with the Cloud Identity Engine in the hub; then, set up the Cloud Identity Engine
in Prisma Access.
Enter mail for the Directory Attribute in the Primary Username field and mail for the E-
Mail field.
STEP 3 | (Optional, Innovation Deployments Starting with 3.0 Innovation Only) Configure Block
Settings.
Use Block Settings to block access to an internet destination at the DNS resolution stage.
To restrict access to Explicit Proxy to specific source IP addresses, you can also use
special objects. These Address Objects, Address Groups, and External Dynamic Lists
(EDLs) that use specific names allow the IP addresses you specify for internet traffic
and block any other IP addresses.
STEP 4 | In the Authentication Settings tab, configure decryption, X-Authenticated-User (XAU), and
authentication settings.
1. Configure your settings for decrypted traffic.
• Select Decrypt Traffic That Matches Existing Decryption rules; For Undecrypted
Traffic, Allow Traffic Only From Known IPs Registered By Authenticated Users to
configure the following decryption rules:
• Traffic that matches decryption policy rules you have configured with an Action to
Decrypt or Decrypt and Forward will be decrypted.
If a user accesses an undecrypted HTTPS site, and a user has not yet authenticated
to Explicit Proxy from that IP address, the user is blocked. However, the user can
Prisma Access Administrator’s Guide (Panorama Managed) 209 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 210 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Authentication traffic is forwarded through Explicit Proxy, specify the domains used
in the authentication flow.
Only add the domains that are required for authentication to the Custom
URL category you specify, including all ACS and IdP FQDNs. You must add
authentication URLs to the Custom URL category, even if you have added
them to a decryption policy.
• To allow all traffic to be decrypted, select Decrypt All traffic (Overrides Existing
Decryption Rules).
If you choose this radio button, ensure that:
• You do not have exceptions in your decryption policy.
• You are applying source IP address-based restrictions in your security policy.
• You have at least one SSL Forward Proxy certificate specified as a Forward Trust
Certificate.
If you do not have a forward trust certificate, create one on Panorama; then,
Commit and Push your changes to Prisma Access. Failure to have a forward trust
certificate will cause a commit error when you commit your Explicit Proxy changes.
2. (Optional) Enter any IP addresses from which undecrypted HTTP or HTTP Cross-Origin
Resource Sharing (CORS) traffic should be allowed to the Trusted Source Address.
Add the IP addresses to IP address-based Address Objects and Add the address objects
in the field.
Enter a maximum of 100,000 addresses. Make sure that the address object uses IP
addresses only.
3. (Optional) If you want to allow the Trusted Source Address IP addresses to use XAU
for identity, select Use X-Authenticated-User (XAU) header on incoming HTTP/HTTPS
requests for Identity.
Select this option if you if you are using proxy chaining from a third-party proxy to
Explicit Proxy, users have authenticated in that proxy, and the proxy uses XAU headers.
XAU headers are the only HTTP headers supported for Explicit Proxy header ingestion.
X-Forwarded-For (XFF) headers are not supported.
4. (Optional) Specify settings for privacy-sensitive websites by creating security policy
rules for those sites, then specifying the Security Policy or policies for those sites in the
Enforce Authentication Only area.
For any websites you specify in the in the Security Policy or policies you add, Explicit
Proxy decrypts the websites based on the decryption policies, but does not inspect or
log the decrypted traffic.
Prisma Access Administrator’s Guide (Panorama Managed) 211 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 5 | (Optional) If you want to forward traffic to Explicit Proxy from your branches through a
secure IPSec tunnel, configure Advanced settings and retrieve anycast IP addresses if you
want to use Explicit Proxy in conjunction with a Prisma Access remote network.
This solution uses anycast addresses with a remote network IPSec tunnel to allow Explicit
Proxy to be used for users and devices at a remote network site or branch location.
Prisma Access Administrator’s Guide (Panorama Managed) 212 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
To prevent issues with users not being able to download large files before
the cookie lifetime expires, or the cookie expiring when users are accessing a
single website for a long period of time, Palo Alto Networks recommends that
you configure a Cookie Lifetime of at least one day. If Explicit Proxy users
have a cookie lifetime expiration issue, they can browse to a different website
to re-authenticate to ACS and refresh the ACS cookie.
If you are downloading a file, and the file download takes longer than the Cookie
Lifetime, the file download will terminate when the lifetime value expires. For this
reason, consider using a longer Cookie Lifetime if you download large files that take a
long time to download.
STEP 7 | Select the Locations and the regions associated with those locations where you want to
deploy your Explicit Proxy for mobile users. Prisma Access adds a proxy node into each
location you select.
Explicit Proxy supports a subset of all Prisma Access locations. See Explicit Proxy Locations for
the list of locations.
The Locations tab displays a map. Highlighting the map shows the global regions (Americas,
Europe, and Asia Pacific) and the locations available inside each region. Select a region, then
select the locations you want to deploy in each region. Limiting your deployment to a single
region provides more granular control over deployed regions and allows you to exclude regions
as required by your policy or industry regulations. See Prisma Access Locations for the list of
Prisma Access Administrator’s Guide (Panorama Managed) 213 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
regions and locations. You can select a location in a region that is closest to your mobile users,
or select a location as required by your policy or industry regulations.
1. Click the Locations tab and select a region.
2. Select one or more Explicit Proxy locations within your selected region using the map.
Hovering your cursor over a location highlights it. White circles indicate an available
location; green circles indicate that you have selected that location.
In addition to the map view, you can view a list of regions and locations. Choose
between the map and list view from the lower left corner. In the list view, the list
Prisma Access Administrator’s Guide (Panorama Managed) 214 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
displays regions sorted by columns, with all locations sorted by region. You can select All
sites within a region (top of the dialog).
STEP 8 | Configure security policy rules to enforce your organization’s security policies.
To make required configuration changes and to control the URLs that mobile users can access
from Explicit Proxy, use security policies. Use the following guidelines and requirements when
configuring your security policies:
• Based on your business goals, create security policies for sanctioned internet and SaaS apps
using App-ID and user groups that need access to those applications.
• Attach security profiles to all security policy rules so that you can prevent both known and
unknown threats following the security profile best practices.
Prisma Access Administrator’s Guide (Panorama Managed) 215 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 9 | Commit your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit and Push.
2. Edit Selections and, in the Prisma Access tab, make sure that Explicit Proxy is selected in
the Push Scope, then click OK.
Be sure that you understand how PAC files work and how to modify them before
you upload them to Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 216 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
When users access an internet destination using Explicit Proxy, the DNS resolution for the
internet destination is performed by Explicit Proxy. To block access to an internet destination
at the DNS resolution stage, you can use block settings. You can block based on DNS Security
categories, URL Filtering categories or external dynamic lists (EDLs).
For domains that you block, Prisma Access blocks the domains and users receive a block
page during the HTTP GET request (for unencrypted websites) or HTTP Connect request (for
encrypted websites), which means that domains are blocked during the initial connection request.
When you block access to the site, user are shown a block page after taking them through the
authentication flow, and the username is captured for further forensics and Security Operations
Center (SOC) workflows.
To configure block settings, complete the following steps.
STEP 1 | Configure Block Settings to block domains or domain categories.
Specify the domains or domain categories for malicious websites, or for any websites that you
do not want users to access. Prisma Access prevents users from accessing the URLs and IP
addresses you specify in this area when users initiate an HTTP GET (for unencrypted requests)
Prisma Access Administrator’s Guide (Panorama Managed) 217 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
or HTTP CONNECT (for encrypted requests). Users receive a block page when they attempt to
access blocked websites.
Prisma Access Administrator’s Guide (Panorama Managed) 218 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 2 | Select the IP addresses to block in the Blocked Source Address area.
You can Add addresses, address groups, IP address-based EDLs, or region- and country-based
IP addresses.
Use the following IP address guidelines:
• Use EDLs with a Type of IP List or Predefined IP List only.
• Use Address Objects with a type of IP Range or IP Netmask only.
• Address groups with dynamic objects membership are not supported.
• Do not use custom regions in IP address objects; instead, use predefined regions.
STEP 3 | Select Log requests to blocked domains to have Prisma Access log blocked domain requests.
Since blocked domain logs can generate a lot of traffic from botnets, use caution when you
enable logging, or use it only for troubleshooting purposes. If you restrict your proxy usage
(for example, if you restrict usage to specific IP addresses), you might be able to enable logging
without restriction.
Use Special Objects to Restrict Explicit Proxy Internet Traffic to Source IP Addresses
Explicit Proxy provides you with special Address Objects, Address Groups, and External Dynamic
Lists (EDLs) to restrict access to Explicit Proxy to specific source IP addresses. When you create
one or more of these special objects using the following exact names, Explicit Proxy allows the
source IP addresses you specify and blocks any other IP addresses:
• Address Object—Select Objects > Addresses in the Explicit_Proxy_Device_Group and create
an object named Palo Alto Networks Explicit Proxy Allowed Source Address.
• Address Group—Select Objects > Address Groups in the Explicit_Proxy_Device_Group and
create an object named Palo Alto Networks Explicit Proxy Allowed Source Address Group.
• External Dynamic List (EDL)—Select Objects > External Dynamic Lists in the
Explicit_Proxy_Device_Group and create an EDL named Palo Alto Networks Explicit Proxy
Allowed Source List, and create an EDL with a type of IP List.
You can specify IP addresses such as egress IP addresses of branch offices.
Prisma Access Administrator’s Guide (Panorama Managed) 219 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Using wildcards (such as *.*) to skip Explicit Proxy authentication for a large number of domains is
not permitted unless you restrict your source traffic to specific source IP addresses using one of
these special objects.
Use Address Objects, Address Groups, or EDLs separately or jointly; for example, you could create
only an Address Group without creating an Address Object or EDL.
Prisma Access Administrator’s Guide (Panorama Managed) 220 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
• Select Panorama > Cloud Services > Status > Status to see Explicit Proxy status.
The mobile users Status and Config Status fields indicate whether the connection between
Prisma Access and your mobile users is OK, unable to fetch the status on the tunnel (Warning),
or that the mobile users cannot connect to Explicit Proxy (Error).
Click the hyperlink next to Current Users and Users (Last 90 days) to get more information
about mobile users.
• Current Users—The current number of authenticated users who have browsed traffic in the
last five minutes.
• Users (Last 90 days)—The number of unique authenticated Explicit Proxy users for the last
90 days.
Prisma Access Administrator’s Guide (Panorama Managed) 221 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
• Select Panorama > Cloud Services > Status > Monitor > Mobile Users—Explicit Proxy to
display a map showing the deployed Explicit Proxy locations.
• Select Panorama > Cloud Services > Status > Network Details > Mobile Users—Explicit Proxy
to view the following details:
Prisma Access Administrator’s Guide (Panorama Managed) 222 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
To view more details about the users who are currently logged in, click the hyperlinked number
next to Current Users to display the Current Users table.
The total number of users that display in the Status page, and the number that displays
in the pop-up table, might be different; the number that displays in the table might be
larger.
You can log out active users from the Current Users table; to do so, select the user and click
Logout. Note that you might have to close and then re-open the screen to have Prisma Access
remove the logged-out user from the Current Users page.
Prisma Access Administrator’s Guide (Panorama Managed) 223 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
The following screen shows users who logged in with the GlobalProtect app and with Clientless
VPN. The screen shows the users’ username, public IP, and last login time. If the user is logged in
with the GlobalProtect app, it also shows their client OS, private IP address, and computer name.
Prisma Access Administrator’s Guide (Panorama Managed) 224 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
The number of users that displays in the global map view page and the number that
displays in the table per region might be different; the number that displays in the table
might be larger.
Prisma Access Administrator’s Guide (Panorama Managed) 225 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
the Current Users table counts all users per login or connection. If a single user is logged in to
more than one gateway or is connected with multiple devices, the number in the table might be
larger.
For example, a user user1 is logged into two gateways in the United Kingdom location; this
condition might have occurred because Prisma Access automatically added gateways when a
large number of users logged in to the same location. In this case, Prisma Access counts user1
once in the Mobile Users—GlobalProtect area, but twice in the Current Users table.
To prevent the same mobile usernames (appearing in different formats) from being
counted multiple times, Panorama Managed Prisma Access will normalize usernames
to a single format.
For example, when users connect to a gateway, Panorama Managed Prisma Access can
receive instances of the same username from the gateway in various formats, such as:
• [email protected]
• domain\jane.doe
• (null)\[email protected]
• jane.doe
Before normalization, these instances of the same username are counted as individual
users, causing the mobile user counts to be inflated incorrectly.
After normalization, all usernames will be in the [email protected] format, and
the mobile user counts will accurately reflect the number of users who have connected
to Panorama Managed Prisma Access within the last 90 days. If the username is
already in the [email protected] format, the username is not normalized.
• Monitor tab (Panorama > Cloud Services > Status > Service Stats > Mobile Users—
GlobalProtect)—The number of Users you see in the global map might be different than the
number that displays in the table when you select a region. A user that is logged in to more
Prisma Access Administrator’s Guide (Panorama Managed) 226 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
than one gateway or is connected with multiple devices might show up multiple times in the
table.
The following screenshots provide an example. There are 23 unique users logged into the Asia
region, as shown in the global map.
If you select the Asia region, Prisma Access gives the number of unique users (23) on the top
left of the region page. However, two users are connected via multiple devices in the South
Korea location (for example, a smart phone and a computer). Because the users have two
Prisma Access Administrator’s Guide (Panorama Managed) 227 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
separate connections, Prisma Access counts them twice in the table, giving a total number
count in the table of 25.
Prisma Access Administrator’s Guide (Panorama Managed) 228 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
If you are using Prisma Access in a FedRAMP environment, you must use the FIPS-
certified version of GlobalProtect, which is version of 5.1.4. If you change the default
GlobalProtect version from 5.1.4, you cannot select version 5.1.4 from the Panorama UI
and must open a Support case with Palo Alto Networks Technical Support to add it back.
STEP 1 | Select Panorama > Cloud Services > Configuration > Service Setup.
Prisma Access Administrator’s Guide (Panorama Managed) 229 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
If your current GlobalProtect version is end-of-life (EoL), a message displays in this area
on the Service Setup page; if you receive this message, upgrade your GlobalProtect app
version by continuing to the next step.
STEP 3 | Select the version to which you want to upgrade and click OK.
A window displays to verify your choice.
After the app has been activated, you receive a success message.
STEP 4 | View the System Status page to verify the Active GlobalProtect App version.
Prisma Access Administrator’s Guide (Panorama Managed) 230 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 4 | Select the Agent tab and select the app configuration.
STEP 6 | In the App Configurations area, select a choice in Allow User to Upgrade GlobalProtect App
to specify whether mobile users can upgrade their GlobalProtect app version to the active
version that is hosted on Prisma Access and, if they can, whether they can choose when to
upgrade:
• Allow with Prompt (default)—Prompt users when a new version is activated and allow users
to upgrade their software when it is convenient.
• Disallow—Prevent users from upgrading the app software.
• Allow Manually—Allow users to manually check for and initiate upgrades by selecting
Check Version in the GlobalProtect app.
• Allow Transparently—Automatically upgrade the app software whenever a new version
becomes available on the portal.
• Internal—Automatically upgrade the app software whenever a new version becomes
available on the portal, but wait until the endpoint is connected internally to the corporate
network. This prevents delays caused by upgrades over low-bandwidth connections.
Prisma Access Administrator’s Guide (Panorama Managed) 231 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 2 | Create a new GlobalProtect agent configuration to use for the first group of users.
1. In Panorama, select Network > GlobalProtect > Portals.
2. Select the Mobile_User_Template from the Template drop-down.
3. Select GlobalProtect_Portal to edit the Prisma Access portal configuration.
4. Select the Agent tab.
5. Select the DEFAULT configuration and Clone it.
You can also Add a new configuration; but cloning the existing configuration copies over
required information for the new configuration.
6. Specify a Name for the configuration.
Prisma Access Administrator’s Guide (Panorama Managed) 232 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
10. Change Allow User to Upgrade GlobalProtect App to either Allow with Prompt or Allow
Transparently.
Allow with Prompt prompts users when a new version is activated and allows them
to upgrade their software when it is convenient; Allow Transparently automatically
upgrades the app software whenever a new version becomes available on the portal.
STEP 3 | Select Move Up to move your configuration above the default configuration.
When an app connects, the portal compares the source information in the packet against the
agent configurations you have defined. As with security rule evaluation, the portal looks for
a match starting from the top of the list. When it finds a match, it delivers the corresponding
configuration to the app.
STEP 4 | Repeat these steps for the DEFAULT configuration, but change Allow User to Upgrade
GlobalProtect App to Disallow to prevent users from updating to the latest GlobalProtect
app software.
Prisma Access Administrator’s Guide (Panorama Managed) 233 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 5 | When you want to let the rest of the users update their apps, change Allow User to Upgrade
GlobalProtect App in the DEFAULT configuration to a selection that allows it (either Allow
with Prompt or Allow Transparently).
Prisma Access Administrator’s Guide (Panorama Managed) 234 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
If you have a third-party VPN, you can use it to connect to private apps in the data center, while
securing public apps using Explicit Proxy, as shown in the following figure.
Prisma Access Administrator’s Guide (Panorama Managed) 235 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 236 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
When a mobile user requests an private or internet-based resource or app, the request is
evaluated by the Explicit Proxy PAC file on the endpoint.
• A return "DIRECT"; function in the PAC file causes the traffic specified in the expression
to bypass Explicit Proxy processing.
Explicit Proxy provides you with a sample PAC file that uses the return "DIRECT"; function
with IP addresses and URLs. See Set Up Your Explicit Proxy PAC File to see the contents of the
PAC file and a description of how to use it.
• A dnsresolve(host) function in the PAC file forces the endpoint to make a DNS query to
resolve a hostname to an IP address. This query then follows the VPN policy (for example, split
tunnel or split DNS) for forwarding the DNS request to the destination DNS server.
The PAC file provided with Explicit Proxy uses dnsresolve(host), return "DIRECT";,
and private IP addresses together in an expression. If, after a DNS lookup, the returned IP
address is included with the private IP addresses in the expression, the traffic associated with
the private IP address bypasses Explicit Proxy processing.
• Traffic that is specified in the PAC file as return "PROXY sitename:8080"; is
forwarded to Explicit Proxy.
After the web request is evaluated based on the conditions in the PAC file, it is then sent to the
GlobalProtect or third-party VPN configuration on the endpoint for processing and the traffic
is evaluated in the GlobalProtect app for split tunnel configuration options. You can split traffic
based on domain (URL) or application or subnet. If you have configured split DNS options in
GlobalProtect, traffic is also evaluated based on those DNS options.
After the traffic is processed, it is then sent to GlobalProtect, direct to the internet, or to Explicit
Proxy, based on the PAC file and VPN processing.
The following figure shows a mobile user attempting to access a private resource using the URL
internal-app.corp.com.
• The PAC file has the following configuration to allow internal-app.corp.com to bypass
Explicit Proxy.
Prisma Access Administrator’s Guide (Panorama Managed) 237 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
if (shExpMatch(host, "*internal-app.corp.com"))
return "DIRECT";
• When the mobile user requests internal-app.corp.com from their browser, the browser
evaluates the conditions in the PAC file. Based on that evaluation, the browser does not
forward the request to the proxy and sends it directly to the GlobalProtect app.
• GlobalProtect notes that internal-app.corp.com is listed in the Include Domain and
sends it through the VPN tunnel.
• GlobalProtect sends the request to the resource in internal-app.corp.com based on the
configuration options in GlobalProtect.
You might want to configure some resources, such as login resources, so that they do not use
either Explicit Proxy or the GlobalProtect or third-party VPN for processing. The following figure
shows a user logging in to Microsoft Online by entering login.microsoftonline.com from
their browser.
• The PAC file has the following configuration to allow internal-app.corp.com to bypass
Explicit Proxy traffic.
• When the mobile user requests login.microsoftonline.com from their browser, the PAC
file evaluates the request from the PAC file in the mobile user’s endpoint and then sends it to
the GlobalProtect VPN configuration (GlobalProtect in this case) for processing.
• The GlobalProtect app notes that login.microsoftonline.com is listed in the Exclude
Domain.
• GlobalProtect bypasses the VPN and sends the request direct to the internet, based on the
configuration options in GlobalProtect.
Prisma Access Administrator’s Guide (Panorama Managed) 238 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 239 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
• Mobile users are able to reach and resolve the GlobalProtect portal hostname, gateway
FQDNs, Explicit Proxy URL, and PAC File URL.
• To find the gateway FQDNs, select Panorama > Cloud Services > Status > Network Details
> Mobile Users—GlobalProtect > Gateways.
• To find the PAC File URL, select Panorama > Cloud Services > Configuration > Mobile
Users—Explicit Proxy > PAC File URL.
STEP 2 | Decide which applications you want to send to GlobalProtect and which applications you
want to send to Explicit Proxy.
The following steps direct private applications hosted at your data center to GlobalProtect and
requests to internet and public SaaS applications to Explicit Proxy.
STEP 3 | In the Panorama that manages Prisma Access, configure GlobalProtect portal settings.
1. Select Network > GlobalProtect > Portals.
Be sure that you are in the Mobile_User_Template from the Template drop-down.
2. Select GlobalProtect_Portal to edit the Prisma Access portal configuration.
3. Select the Agent tab and select the DEFAULT configuration or Add a new one.
4. Select the App tab.
5. Make the following app configuration changes:
• In Detect Proxy for Each Connection, select Yes.
• In Set Up Tunnel Over Proxy (Windows & Mac Only), select No.
• In Use Default Browser for SAML Authentication, select Yes.
Prisma Access Administrator’s Guide (Panorama Managed) 240 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 4 | Create a split tunnel in GlobalProtect that allows you to direct the internal traffic to
GlobalProtect.
The following example uses a split tunnel to direct traffic based on domain (FQDN); you could
also configure a split tunnel based on the access route of traffic.
1. While you are still in the GlobalProtect Agent configuration (Network > GlobalProtect >
Gateways > GlobalProtect External Gateway), select Agent > Client Settings.
2. Select the DEFAULT configuration or Add a new one.
3. Select Split Tunnel > Domain and Application.
4. Add the Include Domain and, optionally, the Ports to use with the domain.
This example uses internal-app.corp.com as the URL you use to host apps in your data
center. You add this URL and the SAML authentication URL in the Exclude Domain.
Prisma Access Administrator’s Guide (Panorama Managed) 241 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 5 | Configure the PAC file to exclude the domains you entered for split tunnel.
The following example shows a PAC file with the URL that hosts private apps (internal-
app.corp.com) bypassing the internal proxy. The parameters in the following PAC file are all
example values:
• The portal hostname is splittunnel.gpcloudservice.com.
• The mobile user gateways (Panorama > Cloud Services > Status > Network Details
> Mobile Users—GlobalProtect > Gateways) are contained in the wildcard FQDN
*examplegateways.gw.gpcloudservice.com.
• The PAC File URL (Panorama > Cloud Services > Configuration > Mobile Users—Explicit
Proxy > PAC File URL) is https://pacfileurl.pac.
• internal-app.corp.com is hosting the private apps that are being protected by Mobile
Users—GlobalProtect.
• Okta is being used for SAML authentication.
• The Explicit Proxy URL is example.proxy.prismaacess.com.
For more information about what PAC files do and how to create and modify them, see Set Up
Your Explicit Proxy PAC File.
Prisma Access Administrator’s Guide (Panorama Managed) 242 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
• You must configure your third-party VPN to perform split tunneling to direct internet traffic to
Explicit Proxy.
For any assistance with configuring your third-party VPN, contact your third-party VPN
vendor.
• modify the PAC file to have Explicit Proxy bypass any of the following VPN components:
• Any IP addresses associated with the third-party VPN
• Any login URLs required for the third-party VPN
In the following example, you configured the PAC file so that Explicit Proxy bypasses internal
resources using private IP addresses, as well as authentication traffic flows.
++++++++++++++++
function FindProxyForURL(url, host) {
if (isPlainHostName(host) ||
shExpMatch(host, "*.local") ||
isInNet(dnsResolve(host), "10.0.0.0", "255.0.0.0") ||
isInNet(dnsResolve(host), "127.0.0.0", "255.255.255.0"))
return "DIRECT";
/* Bypass SAML for AnyConnect Azure */
if (shExpMatch(host, "login.microsoftonline.com"))
return "DIRECT";
if (shExpMatch(host, "login.windows.net"))
return "DIRECT";
if (shExpMatch(host, "login.microsoft.com"))
return "DIRECT";
/* Forward to Prisma Access */
return "PROXY example.proxy.prismaaccess.com:8080";
}
Prisma Access Administrator’s Guide (Panorama Managed) 243 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
You cannot use your own portal with Prisma Access. You can only use the portal that is
deployed when your Prisma Access for mobile users is provisioned.
To configure one of these hybrid Prisma Access deployments, you must edit the
GlobalProtect_Portal configuration within the Mobile_User_Template to add your on-premises
gateways to the appropriate regions:
STEP 1 | Edit the Prisma Access portal configuration.
1. To add an existing gateway to the list of available gateways, select Network >
GlobalProtect > Portals.
2. Select Mobile_User_Template from the Template drop-down.
3. Select GlobalProtect_Portal to edit the Prisma Access portal configuration.
Prisma Access Administrator’s Guide (Panorama Managed) 244 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 2 | Add your on-premises gateway to the list of gateways in the agent configuration.
1. Select the Agent tab and select the DEFAULT agent configuration or Add a new one.
2. Select the External tab and Add your on-premises gateway.
If you add a new agent configuration and you want to add the Prisma Access
gateways to the list of external gateways in that configuration, you must set
the Name to Prisma Access (existing deployments might use the name GP cloud
service) and the Address to gpcloudservice.com. You must enter these values
exactly as shown, and you cannot use either of these values for non-Prisma
Access gateways.
3. Enter the Name of the gateway and specify either the FQDN or IP address of the
gateway in the Address field; this value must exactly match the common name (CN) in
the gateway certificate.
4. (Optional) If you want mobile users to only connect to the gateway when they are in the
corresponding region, Add the Source Region to restrict the gateway to. For example,
if you have a gateway in France, you would select FR (France). If you have a gateway in
Sweden, you would select (SE) Sweden.
One benefit of this is that users will then be able to access a gateway that enables access
to internet resources in their own language.
5. Configure other agent settings as necessary to complete the agent configuration.
6. Click OK to save the portal configuration.
Prisma Access Administrator’s Guide (Panorama Managed) 245 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 3 | Commit all your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit to Panorama.
2. Click Commit > Push to Devices and click Edit Selections.
3. On the Prisma Access tab, make sure Prisma Access for users is selected and then click
OK.
4. Click Push.
Prisma Access Administrator’s Guide (Panorama Managed) 246 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
If you add on-premises gateways to your Prisma Access deployment, check to see if the
priority for the Prisma Access gateways is set to None and, if it is, change the priority. If
the priority is set to None, the service will not select a gateway. See Configure Priorities
for Prisma Access and On-Premises Gateways to change the priority of your Prisma
Access gateways.
If you require users to connect to a specific Prisma Access gateway, you can Allow Mobile Users
to Manually Select Specific Prisma Access Gateways. Mobile users choose one of the Prisma
Access gateways using the GlobalProtect app that is installed on their endpoint.
Complete the following workflow to configure gateway priorities in Prisma Access.
• Set Equal Gateway Priorities for On-Premises and Prisma Access Gateways
• Set a Higher Gateway Priority for an On-Premises Gateway
• Set Higher Priorities for Multiple On-Premises Gateways
• Configure Priorities for Prisma Access and On-Premises Gateways
• Allow Mobile Users to Manually Select Specific Prisma Access Gateways
Prisma Access Administrator’s Guide (Panorama Managed) 247 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
that the on-premises gateway has a lower response time. Since all gateways have the same
priority, User 1 connects to the Prisma Access gateway and User 2 connects to the on-premises
gateway, based on the lower response time.
Prisma Access Administrator’s Guide (Panorama Managed) 248 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 249 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 2 | Select Network > GlobalProtect > Portals in the Mobile_User_Template template.
Prisma Access Administrator’s Guide (Panorama Managed) 250 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 251 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 252 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Do not add a source region for the Prisma Access gateways; any region you
specify is not applied to the configuration.
4. Click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 253 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
If you set the priority of on-premises external gateways higher than Prisma
Access gateways, we recommend that you specify source regions for the
external gateways. If you specify Any for the region, the GlobalProtect app
might never select Prisma Access gateways over on-premises gateways because
of the higher priority for the on-premises gateways.
4. Select the Manual check box to allow users to manually switch to the gateway.
5. Set the Priority of the on-premises gateway to Highest (the default).
Prisma Access Administrator’s Guide (Panorama Managed) 254 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
6. Click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 255 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 256 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 9 | (Optional) Set the priority for additional gateways by repeating Step 8.
The following figure shows a sample configuration with multiple gateways that have source
regions in Norway, Sweden, and Denmark. Note that the Manual check box is selected, which
indicates that a mobile user can manually select any of these gateways.
Prisma Access Administrator’s Guide (Panorama Managed) 257 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Prisma Access Administrator’s Guide (Panorama Managed) 258 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
When configuring the Prisma Access gateways, do not specify a source region. Any region
you specify is not applied to the configuration.
To choose a specific Prisma Access gateway, mobile users can select the gateway on their
endpoint from the drop-down list in their GlobalProtect app.
This configuration requires that you configure Manual selection of the gateway when you
Configure Priorities for Prisma Access and On-Premises Gateways.
The following figure shows a user choosing a list of Prisma Access gateways from the endpoint’s
GlobalProtect app.
The tasks you perform to connect to a specific gateway are based on the operating system of
your endpoint. For details, see the GlobalProtect App User Guide.
Prisma Access Administrator’s Guide (Panorama Managed) 259 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
If you onboard a location, and other locations in the same compute location are
experiencing an autoscale event, Prisma Access might allocate more than two IP
addresses for the new location. In this situation, be sure that you add all these IP
addresses to your allow lists and confirm all addresses as being Added to My Allow
List.
• During a large scaling event.
If the number of mobile users exceeds the capacity of the two pre-allocated IP addresses,
Prisma Access allocates one more set of two IP addresses.
Autoscale events affect all the onboarded locations in a compute location. When an autoscale
event occurs for a location and you have not yet confirmed the addresses as being added to
your allow lists, all locations in that compute location will show an Autoscale Status of Not
Allowed.
Prisma Access Administrator’s Guide (Panorama Managed) 260 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 2 | Select your Hostname and Configure it (for an existing deployment), or Configure your
deployment for the first time (for a new deployment).
STEP 4 | Commit and Push your changes to enable the allow listing functionality.
Make a note of the following changes to that occur after you enable allow listing and commit
and push your changes:
• Prisma Access confirms any egress IP addresses you are already using as being allow listed.
• Prisma Access will not provision any new egress IP addresses that are allocated during
onboarding or autoscale events until you confirm them as allow listed. See Manage Allow
Listing for New Prisma Access Deployments for the procedure you use to do so.
Prisma Access Administrator’s Guide (Panorama Managed) 261 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 2 | Select your Hostname and Configure it (for an existing deployment), or Configure your
deployment for the first time (for a new deployment).
STEP 4 | Continue your Prisma Access onboarding, including selecting the locations to use in your
Mobile Users—GlobalProtect deployment, and Commit and Push your changes.
It might take up to a minute for the changes to be reflected in the UI. If you view the Egress
IP Allow List before committing and pushing your changes, it shows a status of 0/0 Egress IPs
Confirmed Allow Listed, because Prisma Access has not assigned any egress IP addresses to
your deployment.
STEP 5 | View the Egress IP Allow List table, and make a note of the egress IP addresses that need to
be added to your allow lists.
You can view the egress IP addresses in the Confirmed Allow Listed Egress IPs / Allocated
field of the Egress IP Allow List table. The first number indicates whether or not the IP address
Prisma Access Administrator’s Guide (Panorama Managed) 262 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
has been confirmed as being added to your allow lists. For a description of the other fields in
this table, see Fields in the Egress IP Allow List table.
The following example shows the IP addresses for the US Northeast location. The description
of 0/2 Egress IPs Confirmed Allow Listed indicates that 0 of the two egress IP
addresses have been marked as being added to your allow lists, and you need to add them.
If you have a new Prisma Access deployment, or if you have added locations or had an
autoscale event, the table shows that none of the egress IP addresses have been added to your
organization’s allow list.
If you have an existing Prisma Access deployment, the table shows a Provisioning Status of
Provisioned and an Autoscale Status of Allowed, which indicates that Prisma Access marked
the egress IP addresses as added.
Prisma Access will allocate two addresses for each newly-added location. If an existing location
has previously had an autoscale event when a large number of mobile users logged in to
a single location at the same time, Prisma Access allocates additional egress IP address in
multiples of two, and an existing location could have four or more addresses.
STEP 6 | Find the new egress IP addresses that need to be added to your organization’s allow lists by
selecting the Location name in the table.
Prisma Access Administrator’s Guide (Panorama Managed) 263 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
STEP 8 | After you have allow listed the egress IP address, return to the egress IP area and indicate
that you have added them to your allow lists by selecting Added to My Allow List.
STEP 9 | Commit and push your changes to make them active in Prisma Access.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope.
2. Select Prisma Access, then make sure that Mobile Users is selected.
After you Commit and Push, the Confirmed column will show a status of 0/2 Egress IPs
Confirmed Allow Listed, because you have not yet confirmed the IP addresses as having been
allow listed in the Prisma Access UI.
Prisma Access Administrator’s Guide (Panorama Managed) 264 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
If a large number of mobile users log in to the Hong Kong location at the same time, Prisma
Access makes the backup egress IP address active and allocates two more IP addresses and
makes one of them active. When an autoscale event occurs, the egress IP addresses have been
allocated but not provisioned, the confirmed status is 2/4 Egress IPs Confirmed Allow Listed, and
the provisioning status shows Provisioned without enough capacity. In addition, the autoscale
status shows Not Allowed, which means that Prisma Access will not provision the extra egress IP
address to your deployment if an autoscale event occurs.
After you have added the new egress IP addresses to your allow lists, select the location name;
then, select Added to My Allow List for the two IP addresses that were added and Commit and
Push your changes.
When complete, the Hong Kong location shows that all four egress IP addresses are confirmed
and provisioned, and autoscaling is active.
Prisma Access Administrator’s Guide (Panorama Managed) 265 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Field Description
Confirmed Allow Listed Egress IPs / The number of egress IP addresses that have
Allocated been confirmed as being allow listed, and the
number of egress IP addresses that have been
allocated.
Prisma Access Administrator’s Guide (Panorama Managed) 266 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Field Description
• Cannot Be Provisioned—You have
onboarded this location, but have not
yet checked Add to My Allow List and
committed and pushed your changes.
Until you specify in Prisma Access that
you have added these egress IPs to your
organization’s allow lists and Commit and
Push your changes, Prisma Access will
not provision these IP addresses to your
deployment.
• Provisioned with partial capacity—You have
added the first set of egress IP addresses,
have confirmed them as having been added
in the Prisma Access UI, and have Committed
and Pushed your changes. However, Prisma
Access has added another set of IP addresses
as part of an autoscale event, and those IP
addresses have not been specified as added
to your allow lists in the Prisma Access UI.
The following screenshot shows an example
of a deployment that would be marked as
Provisioned with partial capacity. Two IP
addresses have been marked as Added to
My Allow List; however, Prisma Access
has added two more IP addresses to this
location, and those locations have not been
added in the UI.
Prisma Access Administrator’s Guide (Panorama Managed) 267 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Field Description
users log in to a single location and trigger an
autoscale event, Prisma Access will use the
allow listed IP addresses for the autoscale
event.
• Not Allowed—You have not specified all IP
addresses as being added to your allow lists
in the Prisma Access UI, or you have not
committed and pushed your changes after
marking them as added. If Prisma Access
triggers an autoscale event, Prisma Access
will not provision more IP addresses to add
more capacity for the location.
Every time that you add a location, or every
time that Prisma Access adds IP addresses as
a result of an autoscale event, you need to
refresh the page that contains the Egress IP
Allow List table, specify Added to My Allow
List to mark the IP addresses as being added
to your organization’s allow lists, and Commit
and Push your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 268 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
Access Denied.
Prisma Access Administrator’s Guide (Panorama Managed) 269 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Secure Mobile Users
3. If SRE determines the URL to be safe, a policy-based forwarding (PBF) rule is applied to the
URL and its parent domain.
4. The traffic is routed via Prisma Access from the GlobalProtect gateway or remote network to
a URL processing hub, where the PBF rule is applied to the domain, and from the hub to a Palo
Alto Networks data center.
5. As traffic egresses from the data center, the URL is source NATted to the IP address of the
data center.
As a result of these actions, traffic to and from the SaaS applications is not dropped because the
data center IP address has a clean reputation.
Prisma Access Administrator’s Guide (Panorama Managed) 270 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure
Branches
As you business scales and your office locations become geographically distributed, Prisma Access
for networks allows you to speedily onboard your remote network locations and deliver best-
in-breed security for your users. It offers a convenient option that removes the complexity in
configuring and managing devices at every remote location. The service provides an efficient
way to easily add new remote network locations and minimize the operational challenges with
ensuring that users at these locations are always connected and secure, and it allows you to
manage policy centrally from Panorama for consistent and streamlined security for your remote
network locations.
To connect your remote network locations to Prisma Access, you can use the Palo Alto Networks
next-generation firewall or a third-party, IPSec-compliant device including SD-WAN, that can
establish an IPSec tunnel to the service.
In addition to IPSec tunnel connectivity, Prisma SD-WAN lets you use a CloudBlade that you
onboard as a remote network to integrate the Prisma SD-WAN Controller and ION devices with
Prisma Access.
• Prisma Access Remote Network Deployments
• Onboard and Configure Remote Networks
• Plan to Migrate to an Aggregate Bandwidth Remote Network Deployment
• Remote Network Locations with Overlapping Subnets
• Configure Remote Network and Service Connection Connected with a WAN Link
• Use Predefined IPSec Templates to Onboard Service and Remote Network Connections
• Onboard Remote Networks with Configuration Import
271
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 272 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Before you migrate to the aggregate bandwidth model, you should review the
migration checklist.
All locations you onboard share the allocated bandwidth for that compute location. For
example, you need to onboard four branch offices using remote networks in the Singapore,
Thailand, and Vietnam locations. All these locations map to the Asia Southeast compute
location. If you allocate 200 Mbps bandwidth to the Asia Southeast compute location, Prisma
Access divides the 200 Mbps of bandwidth between the four branch offices you onboarded in
that location. If you also add a location in Hong Kong, you note that Hong Kong maps to the
Hong Kong compute location, and you would need to add bandwidth to that compute location.
Specify a minimum bandwidth of 50 Mbps per compute location.
Prisma Access dynamically allocates the bandwidth based on load or demand per location.
Using the previous example where the four sites collectively use up to 200 Mbps, if one
or more sites are not using as much bandwidth as the other sites, Prisma Access provides
more bandwidth for the locations that are more in demand, giving you a more efficient use of
allocated bandwidth. In addition, if one of the sites goes down, Prisma Access reallocates the
bandwidth between the other sites that are still up in that compute location.
IPSec Termination Nodes—You assign an IPSec termination node to the remote network during
onboarding. Each IPSec termination node can provide you with a maximum of 1,000 Mbps of
bandwidth. If you allocate more than 1,000 Mbps of bandwidth to a compute location, Prisma
Access provides you with an additional IPSec termination node.
• IPSec Termination Nodes and Upgrades from Releases Earlier than 3.2—Before 3.2, one
IPSec Termination Node was allocated for every 500 Mbps of allocated bandwidth in a
compute location. If you have a remote network deployment earlier than 3.2 and upgrade
to a release that is 3.2.1 or later, and if remote network locations have more than 500
Mbps allocated to their corresponding compute location, every remote network associated
with the IPSec Termination Node can support up to 1,000 Mbps of bandwidth. After you
upgrade to 3.2 or later, Prisma Access deploys one IPSec Termination Node for every 1,000
Mbps of allocated bandwidth. For existing remote networks, Prisma Access can increase the
bandwidth for a remote network using an autoscaling mechanism that is triggered when the
Prisma Access Administrator’s Guide (Panorama Managed) 273 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
bandwidth consumption on the remote network requires additional capacity. See Changes
to Default Behavior in the Prisma Access (Panorama Managed) Release Notes for details.
The current IPSec termination node-to-remote network mapping after the upgrade to
3.2 is unchanged, and the number of IPSec Termination Nodes remain the same. IPSec
termination nodes are added or deleted only when you increase or decrease the bandwidth
for an existing compute location or when you onboard new compute locations for remote
networks.
Service Connection—If your remote network locations require access to infrastructure in your
corporate headquarters to authenticate users or to enable access to critical network assets,
you must create a service connection so that headquarters and the remote network locations
are connected. If the remote network location is autonomous and does not need to access to
infrastructure at other locations, you do not need to set up the service connection (unless your
mobile users need access).
Template—Prisma Access automatically creates a template stack
(Remote_Network_Template_Stack) and a top-level template (Remote_Network_Template)
for Prisma Access for networks. To Onboard and Configure Remote Networks, you will either
need to configure the top-level template from scratch or leverage your existing configuration,
if you are already running a Palo Alto networks firewall on premise. The template requires
the settings to establish the IPSec tunnel and Internet Key Exchange (IKE) configuration for
protocol negotiation between your remote network location and Prisma Access for networks,
zones that you can reference in security policy, and a log forwarding profile so that you can
forward logs from the Prisma Access for remote networks to Cortex Data Lake.
IPSec Tunnel Configurations—If you have an existing template that contains IPSec tunnel,
Tunnel Monitoring, and IPSec Crypto Profile configurations, you can add that template to the
Remote_Network_Template_Stack to simplify the process of creating the IPSec tunnels. Or,
you can edit the Remote_Network_Template that gets created automatically and create the
IPSec configurations required to create the IPSec tunnel back to the corporate site. Prisma
Access also provides you with a set of predefined IPSec templates for some commonly-used
network devices, and a generic template for any device that is not included in the predefined
templates. Be sure to following the IPSec tunnel recommendations when you configure the
remote network tunnel
Configure IP Subnets for Static Routing or BGP for Dynamic Routing—In order for Prisma
Access to route traffic to your remote networks, you must provide routing information for
the subnetworks that you want to secure using Prisma Access. You can do this in several
ways. You can either define a static route to each subnetwork at the remote network location,
or configure BGP between your service connection locations and Prisma Access, or use a
combination of both methods. If you configure both static routes and enable BGP, the static
routes take precedence. While it might be convenient to use static routes if you have just a
few subnetworks at your remote network locations, in a large deployment with many remote
networks with overlapping subnets, BGP will enable you to scale more easily.
Parent Device Group—Prisma Access for networks requires you to specify a parent device
group that will include your security policy, security profiles, and other policy objects (such as
application groups and objects, and address groups), as well as authentication policy so that
Prisma Access for networks can consistently enforce policy for traffic that is routed through
the IPSec tunnel to Prisma Access for networks. You will need to either define policy rules and
Prisma Access Administrator’s Guide (Panorama Managed) 274 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
objects on Panorama or use an existing device group to secure users in the remote network
location.
If you use an existing device group that references zones, make sure
to add the corresponding template that defines the zones to the
Remote_Network_Template_Stack. Doing so will allow you to complete the zone
mapping when you Onboard and Configure Remote Networks.
Prisma Access Administrator’s Guide (Panorama Managed) 275 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
If you need to onboard many remote networks (up to 1,000), you can onboard a remote
network using the following procedure, then export the remote network configuration
to a CSV file, add the other remote networks you want to onboard to the CSV file, then
import the CSV file to save the configuration into Prisma Access.
STEP 1 | Select Panorama > Cloud Services > Configuration > Remote Networks and edit the settings
by clicking the gear icon in the Settings area.
1. In the Templates section, Add any templates that contain configuration you want
to push to Prisma Access for networks. For example, if you have existing templates
that contain your zone configurations, or IPSec tunnel, IKE Gateway, or crypto profile
settings, you can add them to the predefined Remote_Network_Template_Stack to
simplify the onboarding process.
You can Add more than one template to the stack and then order them appropriately
using Move Up and Move Down. This is important because Panorama evaluates in the
stack from top to bottom, with settings in templates higher in the stack taking priority
Prisma Access Administrator’s Guide (Panorama Managed) 276 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
over the same settings specified in templates lower in the stack. Note that you cannot
move the default template from the top of the stack.
Although you can add existing templates to the stack from the plugin, you
cannot create a new template from the plugin. Instead, use the workflow to add
a new template.
2. Select the Parent Device Group for Prisma Access for remote networks. You can select
an existing device group or use Shared.
You will push all of the configuration—including the security policy, security profiles, and
other policy objects (such as application groups and objects, and address groups), HIP
objects and profiles and authentication policy—that Prisma Access for networks needs to
enforce consistent policy to your remote network users using the device group hierarchy
you specify here.
You don’t need to define all of the policy that you will push to the remote
network yet. Instead, configure the settings to onboard the remote site. You
can then go back and add the templates and device groups with the complete
configurations to push consistent policy out to your remote networks.
3. (Optional) If you have configured a next-generation firewall as a master device or added
a Cloud Identity Engine profile to make user and group information selectable in security
Prisma Access Administrator’s Guide (Panorama Managed) 277 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
policies, select User-ID Master Device or Cloud Identity Engine; then, select either the
Master Device or the Cloud Identity Engine profile that you created.
4. If you will be configuring remote networks that have overlapping subnets, select the
Overlapped Subnets check box to enable outbound internet access for those locations.
While configuring Remote Network Locations with Overlapping Subnets introduces
some limitations, it is acceptable in some cases (for example, if you want to add a guest
network at a retail store location).
Prisma Access Administrator’s Guide (Panorama Managed) 278 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 2 | (Optional) Configure DNS Proxy settings for your remote network.
Prisma Access allows you to specify DNS servers to resolve both domains that are internal to
your organization and external domains. If you do not specify any settings, Prisma Access does
not proxy DNS requests for remote networks.
1. In the Remote_Network_Device_Group device group, select Policies > Security and Add
a security policy rule with an Application of DNS and an Action of Allow to allow DNS
traffic.
Without a security policy rule to allow DNS traffic, DNS resolution does not occur.
2. If you configure Prisma Access to proxy the DNS requests from your remote networks,
update the DNS settings on all the endpoints in that network to use the Prisma Access
Remote Network DNS Proxy IP Address as the primary DNS server and use your DNS
server as secondary DNS server. You can get this DNS proxy IP from Panorama > Cloud
Services > Status > Network Details > Service Infrastructure.
3. Add one or more DNS Proxy settings, entering the following values:
• Select a Region from the drop-down at the top of the window.
Select Worldwide to apply the DNS settings globally, select a specific theater,
or select settings per location group (a group of locations that is smaller than the
theater). If you add multiple settings, the location group settings are used first, then
the theater settings, then the worldwide settings. Prisma Access evaluates the rules
from top to bottom in the list.
• Add one or more rules to configure the DNS settings for Internal Domains.
• Enter a unique Rule Name for the rule.
• you want your internal DNS server to only resolve the domains you specify, enter
the domains to resolve in the Domain List. Specify an asterisk in front of the
domain; for example, *.acme.com. You can specify a maximum of 1,024 domain
entries.
• If you have a Custom DNS server that can access your internal domains, specify
the Primary DNS and Secondary DNS server IP addresses, or select Use Cloud
Default to use the default Prisma Access DNS server.
• Specify the DNS settings for Public Domains.
• Use Cloud Default—Use the default Prisma Access DNS server.
• Same as Internal Domains—Use the same server that you use to resolve internal
domains. When you select this option, the DNS Server used to resolve public
Prisma Access Administrator’s Guide (Panorama Managed) 279 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
domains is same as the server configured for the first rule in the Internal Domains
section.
• Custom DNS server—If you have a DNS server that can access your public
(external) domains, enter the Primary DNS server address in that field.
(Optional) You can Add a DNS Suffix to specify the suffix that the client should use
locally when an unqualified hostname is entered that it cannot resolve, for example,
acme.local. Do not enter a wildcard (*) character in front of the domain suffix (for
example, acme.com). You can add multiple suffixes.
• If you want Prisma Access to proxy DNS requests, configure Configure values for the
use for UDP queries (the Interval to retry the query in seconds and the number of
retry Attempts to perform).
If you want Prisma Access to proxy DNS requests for your GlobalProtect users, you
must update your endpoints to use the Remote Network DNS Proxy IP Address as
the primary DNS server (Panorama > Cloud Services > Status > Network Details >
Service Infrastructure).
4. (Optional) Select Advanced RCODE Support to allow the primary DNS server to fail over
to the secondary DNS server if an RCODE 2 (SERVFAIL) and RCODE 5 (REFUSED) DNS
return code is received.
A DNS response code of SERVFAIL refers to a communication error with the primary
DNS server, and a DNS response code of REFUSED means that the primary DNS server
refused to provide the requested information. In both cases, the service fails over to the
secondary DNS server.
STEP 3 | (Optional) Enable QoS for your remote network deployment and specify a QoS Profile,
Guaranteed Bandwidth Ratio, the amount of Reserved for Guaranteed Bandwidth (Mbps)
bandwidth and, optionally, customize site options per location (Customize Per Site).
You enable QoS at a compute location level; however, you can specify to enable or disable
QoS on a per-site basis, and specify a QoS profile on a per-site basis, when you add your
remote network in a later step. Before you configure QoS, you should understand how QoS
Prisma Access Administrator’s Guide (Panorama Managed) 280 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
works for remote networks that allocate bandwidth by compute location, including specifying
the guaranteed bandwidth and customizing bandwidth per site.
STEP 4 | (Optional) Configure Group Mapping Settings to have Prisma Access use the Directory Sync
component of the Cloud Identity Engine to retrieve user and group information.
You must configure the Cloud Identity Engine to retrieve user and group information from
your Active Directory (AD) before you enable group mapping in Prisma Access using Group
Mapping Settings.
STEP 5 | Create new zones in the one of the templates in the stack (Network > Zones> Add) or map
the zones referenced in existing templates you added to the stack as trusted or untrusted.
On Panorama, policy rules are defined in device groups, and zones are defined in templates.
Therefore, you need to make sure that you add the templates that reference the zones
included in your policy rules to the template stack.
On a Palo Alto Networks® next-generation firewall, security policy is enforced between zones,
which map to physical or virtual interfaces on the firewall. But as Prisma Access for networks
has only two zones, trust and untrust, you need to map any zone with traffic bound to the
Internet (including your sanctioned SaaS applications) as untrust and all internal zones as trust.
1. (Optional) Edit the zone mapping settings.
By default, all of the zones in Prisma Access for networks template stack a are classified
as Untrusted Zones. If you have not yet defined zones or if the templates in the
Remote_Network_Template_Stack do not have zone configurations, you can come back
and add them when you push policy to Prisma Access for networks.
2. For each zone you want to designate as trusted, select it and click Add to move it to the
list of Trusted Zones.
3. Click OK to save the mappings.
Prisma Access Administrator’s Guide (Panorama Managed) 281 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 6 | Allocate bandwidth for the locations that you want to onboard by clicking the gear icon in
the Bandwidth Allocation area.
You allocate bandwidth at an aggregate level per compute location. See Prisma Access Remote
Network Deployments for details.
If you have an existing remote networks deployment that currently onboards remote networks
by location, a pop-up window displays, asking if you want to migrate to the aggregate
bandwidth model. Click Migrate to continue, or Cancel to cancel the migration.
The migration to the aggregate bandwidth model is permanent and not reversible.
Before you migrate, review the pre-migration checklist. You must Commit and Push
your changes for them to take effect.
The Service IP Address (the public IP addresses used on the Prisma Access side of the IPSec
tunnel for the remote network connection) do not change when you migrate your deployment
to the aggregate bandwidth model, and no reconfiguration of your IPSec tunnel is required.
STEP 7 | Enter the Bandwidth Allocation you want for each Compute Location that is associated with
the Prisma Access Locations you want to onboard.
To verify the bandwidth amount you entered, select the check mark next to the bandwidth
amount; to cancel the amount, select x.
Specify a minimum bandwidth of 50 Mbps and a maximum bandwidth of the maximum
remaining licensed bandwidth.
STEP 8 | (Optional, Deployments with Autonomous DEM for Remote Networks Licenses Only) Enable
Autonomous DEM Allocation for the compute location for which you allocated bandwidth.
If you enable Autonomous DEM for the compute location, the amount of bandwidth used
by the Autonomous DEM license is the same as the bandwidth you specify for the compute
location. The Autonomous DEM Allocated Total shows you how much bandwidth is used by
Autonomous DEM and how much is remaining. See the Autonomous DEM guide for more
information.
Prisma Access Administrator’s Guide (Panorama Managed) 282 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 9 | Wait for the bandwidth to be reflected in the Allocated Total field at the top of the page;
then, click OK.
STEP 10 | (Optional) If you want to configure your remote network to provide secure inbound access
to remote network locations, click the Inbound Access Remote Networks tab and follow the
workflow to configure secure inbound access for a remote network.
You cannot change the name of the remote network location after you enter it.
Make sure you know your naming scheme for your remote networks before you begin
onboarding.
STEP 12 | (Optional, BGP deployments only) Create a configuration so that your remote network
connection can use up to four IPSec tunnels for its traffic (ECMP Load Balancing).
Static routes are not supported (BGP is required), and, if you have QoS configured, you cannot
change the Allocation Ratio for ECMP links. If your deployment uses one IPSec tunnel for its
Prisma Access Administrator’s Guide (Panorama Managed) 283 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
remote network connection or uses static routes, select None for ECMP Load Balancing and
continue to Step 12.
1. Select one of the choices to enable or disable ECMP load balancing.
• None—Do not use ECMP load balancing (use a single remote network tunnel for this
remote network connection). This is the only choice you can make for static routes;
BGP is required for ECMP load balancing.
• Enabled with Symmetric Return—Specify up to four IPSec tunnels for this remote
network connection and force Prisma Access to use the same link for the return
traffic as it used to send the traffic.
Select this option if you use one or more tunnels as a backup tunnel to be used only if
one of the primary tunnels go down. If a link fails, Prisma Access uses one of the other
tunnels to send and receive traffic symmetrically.
2. Add an IPSec tunnel for the remote network connection and specify the following
values:
• Enable—Enables BGP for the IPSec tunnel.
This selection is not configurable; you must enable BGP to configure ECMP.
• Summarize Mobile User Routes before advertising—Reduces the number of mobile
user IP subnet advertisements over BGP to your customer premises equipment (CPE)
by summarizing them.
By default, Prisma Access advertises the mobile users IP address pools in blocks
of /24 subnets; if you summarize them, Prisma Access advertises the pool based
on the subnet you specified. For example, Prisma Access advertises a public user
mobile IP pool of 10.8.0.0/20 using the /20 subnet, rather than dividing the pool
into subnets of 10.8.1.0/24, 10.8.2.0/24, 10.8.3.0/24, and so on before advertising
them. Summarizing these advertisements can reduce the number of routes stored in
CPE routing tables. For example, you can use IP pool summarization with cloud VPN
Prisma Access Administrator’s Guide (Panorama Managed) 284 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
gateways (Virtual Private Gateways (VGWs) or Transit Gateways (TGWs)) that can
accept a limited number of routes.
If you enable route summarization for a location that uses ECMP, you must
enable route summarization on all links to that location, or you will receive an
error during commit.
Prisma Access sets the community string for aggregated mobile user routes to
0xFFFE:0xFFF0.
• Advertise Default Route—Prisma Access originates a default route advertisement for
the remote network using eBGP.
Be sure that your network does not have another default route being
advertised by BGP, or you could introduce routing issues in your network.
• Don’t Advertise Prisma Access Routes—Prevents the Prisma Access BGP peer from
forwarding routes into your organization’s network.
By default, Prisma Access advertises all BGP routing information, including local
routes and all prefixes it receives from other service connections, remote networks,
and mobile user subnets. Select this check box to prevent Prisma Access from sending
any BGP advertisements, but still use the BGP information it receives to learn routes
from other BGP neighbors.
Since Prisma Access does not send BGP advertisements if you select this option, you
must configure static routes on the on-premises equipment to establish routes back
to Prisma Access.
• Peer AS—Specify the autonomous system (AS) to which the firewall, virtual router, or
BGP router at your remote network belongs.
• Peer IP Address—Enter the IP address assigned as the Router ID of the eBGP router
on the remote network for which you are configuring this connection.
• Local IP Address (Optional)—Enter an address that Prisma Access uses as its Local
IP address for BGP.Specify the IP address to use on the Prisma Access side of the
tunnel.
Specifying a Local Address is useful where the device on the other side of the
connection (such as an Amazon Web Service (AWS) Virtual Private Gateway)
requires a specific local IP address for BGP peering to be successful. Make sure
Prisma Access Administrator’s Guide (Panorama Managed) 285 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
that the address you specify does not conflict or overlap with IP addresses in the
Infrastructure Subnet or subnets in the remote network.
• Secret and Confirm Secret (Optional)—Enter and confirm a passphrase to
authenticate BGP peer communications.
3. Repeat the previous step to add up to four tunnels to use with the remote network
connection.
STEP 13 | Select the Location in which Prisma Access will deploy the infrastructure required to secure
your remote network location. This region should be geographically located close to your
remote network location.
If you have not yet allocated bandwidth for the compute location to which the location maps,
Prisma Access prompts you to enter bandwidth for that compute location.
STEP 14 | Select the IPSec Termination Node that you want to use for this remote network.
Prisma Access uses this node to associate remote network locations with compute locations.
STEP 15 | (Static routing or single-tunnel deployments only) Select or add a new IPSec Tunnel
configuration to access the firewall, router, or SD-WAN device at the corporate location:
• Select one of the predefined IPSec templates in the Remote_Network_Template, or, if
you have added a template to the Remote_Network_Template_Stack (or modified the
predefined Remote_Network_Template) that includes an IPSec Tunnel configuration, select
that IPSec Tunnel from the drop-down. Note that the tunnel you are creating for each
Prisma Access Administrator’s Guide (Panorama Managed) 286 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
remote network connection connects Prisma Access to the IPSec-capable device at each
branch location.
Use the following guidelines when configuring an IPSec tunnel:
• The peer addresses in the IKE Gateway configuration must be unique for each tunnel.
You can, however, re-use some of the other common configuration elements, such as
crypto profiles.
• The IPSec Tunnel you select from a template must use Auto Key exchange and IPv4
only.
• The IPSec tunnel, IKE gateway, and crypto profile names cannot be longer than 31
characters.
• If you onboard multiple remote networks to the same location with dynamic IKE peers,
you must use the same IKE crypto profile for all remote network configurations.
• To create a new IPSec Tunnel configuration, click New IPSec Tunnel, give it a Name and
configure the IKE Gateway, IPSec Crypto Profile, and Tunnel Monitoring settings.
• If the IPSec-capable device at your branch location uses policy-based VPN, on the Proxy
IDs tab, Add a proxy ID that matches the settings configured on your local IPSec device
Prisma Access Administrator’s Guide (Panorama Managed) 287 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
to ensure that Prisma Access can successfully establish an IPSec tunnel with your local
device.
• Leave Enable Replay Protection selected to detect and neutralize against replay attacks.
• Select Copy TOS Header to copy the Type of Service (TOS) header from the inner IP header
to the outer IP header of the encapsulated packets in order to preserve the original TOS
information.
• To enable tunnel monitoring for the service connection, select Tunnel Monitor.
• Enter a Destination IP address.
Specify an IP address at your branch location to which Prisma Access can send ICMP
ping requests for IPSec tunnel monitoring. Make sure that this address is reachable by
ICMP from the entire Prisma Access infrastructure subnet.
• If you use tunnel monitoring with a peer device that uses multiple proxy IDs, specify a
Proxy ID or add a New Proxy ID that allows access from the infrastructure subnet to
your branch location.
The following figure shows a proxy ID with the service infrastructure subnet
(172.16.55.0/24 in this example) as the Local IP subnet and the branch location’s subnet
(10.1.1.0/24 in this example) as the Remote subnet.
The following figure shows the Proxy ID you created being applied to the tunnel monitor
configuration by specifying it in the Proxy ID field.
Prisma Access Administrator’s Guide (Panorama Managed) 288 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
You must configure a static route on your CPE to the Tunnel Monitor IP Address for
tunnel monitoring to function. To find the destination IP address to use for tunnel
monitoring from your branch location to Prisma Access, select Panorama > Cloud
Services > Status > Network Details, click the Service Infrastructure radio button,
and find the Tunnel Monitor IP Address.
STEP 16 | If you have a secondary WAN link at this location, select Enable Secondary WAN.
Be sure to create a unique IPSec tunnel for each remote network’s secondary WAN;
Prisma Access does not support reusing the same IPSec tunnel for secondary WANs in
multiple remote networks.
If you use a different BGP peer for the secondary (backup) connection, Prisma Access
does not honor the Multi-Exit Discriminator (MED) attributes advertised by the
CPE. This caveat applies if you use multiple BGP peers on either remote network
connections or service connections.
STEP 17 | Enable routing to the subnetworks or individual IP addresses at the remote network site that
your users will need access to.
Prisma Access uses this information to route requests to the appropriate site. The networks
at each site cannot overlap with each other or with IP address pools that you designated for
Prisma Access Administrator’s Guide (Panorama Managed) 289 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
the service infrastructure or for the Prisma Access for users IP pools. You can configure Static
Routes, BGP, or a combination of both.
• To configure Static Routes:
1. On the Static Routes tab, click Add and enter the subnetwork address (for example,
172.168.10.0/24) or individual IP address of a resource, such as a DNS server (for
example, 10.32.5.1/32) that your remote users will need access to.
2. Repeat for all subnets or IP addresses that Prisma Access will need access to at this
location.
• To configure BGP:
1. Select the BGP tab.
2. (Optional) Select the ECMP Load Balancing choices. See Step 9.
3. If you select None for ECMP Load Balancing, enter the BGP choices.
Prisma Access Administrator’s Guide (Panorama Managed) 290 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
When you enable BGP, Prisma Access sets the time to live (TTL) value for external
BGP (eBGP) to 8 to accommodate any extra hops that might occur between the Prisma
Access infrastructure and your customer premises equipment (CPE) that terminates the
eBGP connection.
5. To reduce the number of mobile user IP subnet advertisements over BGP to your
customer premises equipment (CPE) by summarizing them, select Summarize Mobile
User Routes before advertising.
By default, Prisma Access advertises the mobile users IP address pools in blocks of /24
subnets; if you summarize them, Prisma Access advertises the pool based on the
subnet you specified. For example, Prisma Access advertises a public user mobile IP
pool of 10.8.0.0/20 using the /20 subnet, rather than dividing the pool into subnets of
10.8.1.0/24, 10.8.2.0/24, 10.8.3.0/24, and so on before advertising them. Summarizing
these advertisements can reduce the number of routes stored in CPE routing tables. For
example, you can use IP pool summarization with cloud VPN gateways (Virtual Private
Gateways (VGWs) or Transit Gateways (TGWs)) that can accept a limited number of
routes.
Prisma Access sets the community string for aggregated mobile user routes to
0xFFFE:0xFFF0.
6. To allow Prisma Access to advertise a default route for the remote network using eBGP,
select Advertise Default Route.
If you select Advertise Default Route, be sure that your network does not have another
default route being advertised by BGP, or you could introduce routing issues in your
network.
You must publish your default routes before you make this selection to advertise
them. In addition, be sure that your network does not have another default route
being advertised by BGP, or you could introduce routing issues in your network.
7. To prevent the BGP peer on the Prisma Access firewall from forwarding routes into your
organization’s network, select Don’t Advertise Prisma Access Routes.
By default, Prisma Access advertises all BGP routing information, including local routes
and all prefixes it receives from other service connections, remote networks, and mobile
user subnets. Select this check box to prevent Prisma Access from sending any BGP
advertisements, but still use the BGP information it receives to learn routes from other
BGP neighbors.
Since Prisma Access does not send BGP advertisements if you select this option, you
must configure static routes on the on-premises equipment to establish routes back to
Prisma Access.
8. Enter the Peer AS, which is the autonomous system (AS) to which the firewall, virtual
router, or BGP router at your remote network belongs.
9. Enter the IP address assigned as the Router ID of the eBGP router on the remote
network for which you are configuring this connection as the Peer Address.
10.(Optional) Enter an address that Prisma Access uses as its Local IP address for BGP.
Specifying a Local Address is useful where the device on the other side of the
connection (such as an Amazon Web Service (AWS) Virtual Private Gateway) requires
Prisma Access Administrator’s Guide (Panorama Managed) 291 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
a specific local IP address for BGP peering to be successful. Make sure that the address
you specify does not conflict or overlap with IP addresses in the Infrastructure Subnet or
subnets in the remote network.
You must configure a static route on your CPE to the BGP Local Address.
For BGP deployments with secondary WANs, Prisma Access sets both the
primary and secondary tunnels in an UP state, but follows normal BGP active-
backup behavior for network traffic. Prisma Access sets the primary tunnel
as active and sends and receives traffic through that tunnel only; if the
primary tunnel fails, Prisma Access detects the failure using BGP rules, sets the
secondary tunnel as active, and uses only the secondary tunnel to send and
receive traffic.
STEP 18 | (Optional) Enable QoS for the location and specify a QoS Profile.
You specify QoS options and overall settings on a per-compute location basis in the Settings;
however, you can enable or disable QoS or change the QoS profile on a per-location basis
here.
STEP 19 | Commit the configuration changes to Panorama and push the configuration out to Prisma
Access for networks.
1. Click Commit > Commit to Panorama.
2. Click Commit > Commit and Push. Click Edit Selections > Prisma Access, and select
both Prisma Access for networks and Prisma Access for service setup to push the
configuration out to the service.
Prisma Access Administrator’s Guide (Panorama Managed) 292 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 20 | Configure the IPSec-capable device at the remote network location to set up an IPSec
connection with Prisma Access for networks.
1. Find the Service IP Address for this remote network connection by selecting Panorama
> Cloud Services > Status > Network Details, clicking the Remote Networks radio
button, and viewing the Service IP Address field. Prisma Access for networks
infrastructure has assigned this IP address for the Prisma Access remote network
connection, and you must configure this as the peer IP address to set up the IPSec
tunnel between the remote network location and Prisma Access for networks.
2. Check the Local IP address for the device at the remote network location on the
Panorama > Cloud Services > Status > Network Details > Remote Networks page. If
you are performing NAT at the remote network location, the Local IP address displays
the IP address of the device after NAT.
STEP 21 | To secure traffic at the remote network location you must create security policy rules.
1. Select Policies.
2. Select the Device Group in which to add policy rules. You can select the
Remote_Network_Device_Group or the parent device group that you selected for
defining policies to secure the remote network location.
3. Create security policy rules. Make sure that you do not define security policy rules to
allow traffic from any zone to any zone. In the security policy rules, use the zones that
you defined in your template.
If a user on your network is denied access to a website, report website access issues
before you open a ticket with Palo Alto Networks.
STEP 22 | Enable logging to Cortex Data Lake. You must create and attach a log forwarding profile to
each policy rule for which you want to forward logs.
1. Select Objects > Log Forwarding.
2. Select the Device Group in which you added the policy rules, for example,
Remote_Network_Device_Group.
3. Add a Log Forwarding profile. In the log forwarding profile match list, Add each Log
Type that you want to forward.
4. Select Panorama/Cortex Data Lake as the Forward Method to enable Prisma Access to
forward the logs to Cortex Data Lake. You will be able to monitor the logs and generate
reports from Panorama. Cortex Data Lake provides a seamless integration to store
Prisma Access Administrator’s Guide (Panorama Managed) 293 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
logs without backhauling them to your Panorama at the corporate headquarters, and
Panorama can query Cortex Data Lake as needed.
The following example enables forwarding of Traffic, Threat Prevention, WildFire
Submission, URL Filtering, Data Filtering, and Authentication logs to Cortex Data Lake.
5. Select Policies > Security and edit the policy rule. In Actions, select the Log Forwarding
profile you created.
STEP 23 | Commit all your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit and Push.
2. Edit Selections and, in the Prisma Access tab, make sure Prisma Access for networks is
selected in the Push Scope, then click OK.
3. Commit and Push your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 294 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
over the same settings specified in templates lower in the stack. Note that you cannot
move the default template from the top of the stack.
Although you can add existing templates to the stack from the plugin, you
cannot create a new template from the plugin. Instead, use the workflow to add
a new template.
2. Select the Parent Device Group for Prisma Access for remote networks. You can select
an existing device group or use Shared.
You will push all of the configuration—including the security policy, security profiles, and
other policy objects (such as application groups and objects, and address groups), HIP
objects and profiles and authentication policy—that Prisma Access for networks needs to
Prisma Access Administrator’s Guide (Panorama Managed) 295 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
enforce consistent policy to your remote network users using the device group hierarchy
you specify here.
You don’t need to define all of the policy that you will push to the remote
network yet. Instead, configure the settings to onboard the remote site. You
can then go back and add the templates and device groups with the complete
configurations to push consistent policy out to your remote networks.
3. (Optional) If you have configured an on-premises next-generation firewall as a master
device, select the Master Device you configured.
When you select the Master Device, Prisma Access auto-populates user and group
information in the security policy rules in Panorama for mobile user and remote network
device groups.
4. If you will be configuring remote networks that have overlapping subnets, select the
Overlapped Subnets check box to enable outbound internet access for those locations.
While configuring Remote Network Locations with Overlapping Subnets introduces
some limitations, it is acceptable in some cases (for example, if you want to add a guest
network at a retail store location).
Prisma Access Administrator’s Guide (Panorama Managed) 296 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 2 | (Optional) Configure DNS Proxy settings for your remote network.
Prisma Access allows you to specify DNS servers to resolve both domains that are internal to
your organization and external domains. If you do not specify any settings, Prisma Access does
not proxy DNS requests for remote networks.
1. In the Remote_Network_Device_Group device group, select Policies > Security and Add
a security policy rule with an Application of DNS and an Action of Allow to allow DNS
traffic.
Without a security policy rule to allow DNS traffic, DNS resolution does not occur.
2. If you configure Prisma Access to proxy the DNS requests from your remote networks,
update the DNS settings on all the endpoints in that network to use the Prisma Access
Remote Network DNS Proxy IP Address as the primary DNS server and use your DNS
server as secondary DNS server. You can get this DNS proxy IP from Panorama > Cloud
Services > Status > Network Details > Service Infrastructure.
3. Add one or more DNS proxy settings, entering the following values:
• For Internal Domains:
• Select a Region (North America & South America, Africa, Europe & Middle East, or
Asia, Australia & Japan), or specify Worldwide to apply the DNS settings globally.
You can add multiple region-specific DNS proxy settings, or specify a DNS proxy
for one or more regions and specify another worldwide DNS proxy for the rest of
the world. If you specify only a regional setting and onboard remote networks in
that region only, Prisma Access does not proxy the DNS requests, and the source
IP address of the DNS request is the remote network’s EBGP Router IP address. If
you specify multiple proxy settings with a mix of regional and worldwide regions,
Prisma Access Administrator’s Guide (Panorama Managed) 297 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access uses the regional settings for the Locations in the region you
specify; otherwise, Prisma Access uses the worldwide settings.
• Specify the IP addresses of the Primary DNS and Secondary DNS servers that your
remote network should use to resolve internal domains.
• (Optional) If you want your internal DNS server to only resolve the domains you
specify, enter the domains to resolve in the Domain List.
You can use a wildcard (*) in front of the domains in the domain list, for example
*.acme.local or .acme.com. You can specify a maximum of 1,024 domain entries.
• For External Domains:
• Enter a Primary DNS choice.
To use the default Prisma Access DNS server, select Use Cloud Default. To use
the same server that you use to resolve internal domains, select Same as Internal
Domains. To use third-party or public DNS server, select Custom DNS Server, then
specify the IP address of the DNS server.
• Enter a Secondary DNS choice, choosing from the same options you chose for the
Prisma DNS.
STEP 3 | (Optional) Configure Prisma Access to use the Directory Sync component of the Cloud
Identity Engine to retrieve user and group information using Group Mapping Settings.
You must configure the Cloud Identity Engine to retrieve user and group information from
your Active Directory (AD) before you enable group mapping in Prisma Access using Group
Mapping Settings.
STEP 4 | Create new zones in the one of the templates in the stack (Network > Zones> Add) or map
the zones referenced in existing templates you added to the stack as trusted or untrusted.
On Panorama, policy rules are defined in device groups, and zones are defined in templates.
Prisma Access Administrator’s Guide (Panorama Managed) 298 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Therefore, you need to make sure that you add the templates that reference the zones
included in your policy rules to the template stack.
On a Palo Alto Networks® next-generation firewall, security policy is enforced between zones,
which map to physical or virtual interfaces on the firewall. But as Prisma Access for networks
has only two zones, trust and untrust, you need to map any zone with traffic bound to the
Internet (including your sanctioned SaaS applications) as untrust and all internal zones as trust.
1. (Optional) Edit the zone mapping settings.
By default, all of the zones in Prisma Access for networks template stack a are classified
as Untrusted Zones. If you have not yet defined zones or if the templates in the
Remote_Network_Template_Stack do not have zone configurations, you can come back
and add them when you push policy to Prisma Access for networks.
2. For each zone you want to designate as trusted, select it and click Add to move it to the
list of Trusted Zones.
3. Click OK to save the mappings.
STEP 5 | Click Add in the Onboarding settings, and specify a Name to identify the infrastructure that
will secure the remote network location you are onboarding.
You cannot change the name of the remote network location after you enter it.
Make sure you know your naming scheme for your remote networks before you begin
onboarding.
Prisma Access Administrator’s Guide (Panorama Managed) 299 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 6 | (BGP deployments only) Create a configuration so that your remote network connection can
use up to four IPSec tunnels for its traffic (ECMP Load Balancing).
QoS is not supported with ECMP load balancing, and static routes are not supported (BGP is
required). If your deployment uses one IPSec tunnel for its remote network connection or uses
static routes, select None for ECMP Load Balancing and continue to Step 9.
Specify a minimum Bandwidth of 50 Mbps.
Prisma Access divides the bandwidth you select by the number of tunnels; for example, if you
specify 300 Mbps and add four tunnels, each tunnel carries 75 Mbps. If one of the tunnels
goes down, your network connection will now carry 225 Mbps instead of 300 Mbps.
1. Select one of the choices to enable or disable ECMP load balancing.
• None—Do not use ECMP load balancing (use a single remote network tunnel for this
remote network connection). This is the only choice you can make for static routes;
BGP is required for ECMP load balancing.
• Enabled with Symmetric Return—Specify up to four IPSec tunnels for this remote
network connection and force Prisma Access to use the same link for the return
traffic as it used to send the traffic.
Select this option if you use one or more tunnels as a backup tunnel to be used only if
one of the primary tunnels go down. If a link fails, Prisma Access uses one of the other
tunnels to send and receive traffic symmetrically.
2. Add an IPSec tunnel for the remote network connection and specify the following
values:
• Enable—Enables BGP for the IPSec tunnel.
This selection is not configurable; you must enable BGP to configure ECMP.
Prisma Access Administrator’s Guide (Panorama Managed) 300 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
If you enable route summarization for a location that uses ECMP, you must
enable route summarization on all links to that location, or you will receive an
error during commit.
Prisma Access sets the community string for aggregated mobile user routes to
0xFFFE:0xFFF0.
• Advertise Default Route—Allows Prisma Access to advertise a default route for the
remote network using eBGP.
You must publish your default routes before you make this selection to
advertise them. In addition, be sure that your network does not have another
default route being advertised by BGP, or you could introduce routing issues
in your network.
• Don’t Advertise Prisma Access Routes—Prevents the Prisma Access BGP peer from
forwarding routes into your organization’s network.
By default, Prisma Access advertises all BGP routing information, including local
routes and all prefixes it receives from other service connections, remote networks,
and mobile user subnets. Select this check box to prevent Prisma Access from sending
Prisma Access Administrator’s Guide (Panorama Managed) 301 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
any BGP advertisements, but still use the BGP information it receives to learn routes
from other BGP neighbors.
Since Prisma Access does not send BGP advertisements if you select this option, you
must configure static routes on the on-premises equipment to establish routes back
to Prisma Access.
• Peer AS—Specify the autonomous system (AS) to which the firewall, virtual router, or
BGP router at your remote network belongs.
• Peer IP Address—Enter the IP address assigned as the Router ID of the eBGP router
on the remote network for which you are configuring this connection.
• Local IP Address (Optional)—Enter an address that Prisma Access uses as its Local
IP address for BGP.Specify the IP address to use on the Prisma Access side of the
tunnel.
Specifying a Local Address is useful where the device on the other side of the
connection (such as an Amazon Web Service (AWS) Virtual Private Gateway)
requires a specific local IP address for BGP peering to be successful. Make sure
Prisma Access Administrator’s Guide (Panorama Managed) 302 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
that the address you specify does not conflict or overlap with IP addresses in the
Infrastructure Subnet or subnets in the remote network.
• Secret and Confirm Secret (Optional)—Enter and confirm a passphrase to
authenticate BGP peer communications.
3. Repeat the previous step to add up to four tunnels to use with the remote network
connection.
STEP 7 | Select the Location in which Prisma Access will deploy the infrastructure required to secure
your remote network location. This region should be geographically located close to your
remote network location.
STEP 8 | Select the Bandwidth you want to allocate to this remote network location. The bandwidth
you select cannot exceed the total amount of bandwidth you have licensed. Use this setting
to define the amount of the total licensed bandwidth you want to allocate to this location.
To help you determine how much bandwidth a specific site needs, consider the bandwidth
available from your ISP at each location. If you enable ECMP Load Balancing, you must specify
a minimum of 50 Mbps.
You can change the bandwidth of a remote network connection after you onboard it,
with the exception of the 500 Mbps (w/o SSL Decryption) or 1000 Mbps (Preview)
bandwidth choices. If you select either of these preview choices and then need to
change the bandwidth, you must first add an identical network with the only change
being the lower, non-Preview bandwidth choice, commit your changes, make a note
of the Service IP address and reconfigure your IPSec tunnel to use that address, then
delete the existing remote network with the preview bandwidth choice.
Prisma Access Administrator’s Guide (Panorama Managed) 303 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 9 | (Static routing or single-tunnel deployments only) Select or add a new IPSec Tunnel
configuration to access the firewall, router, or SD-WAN device at the corporate location:
• If you have added a template to the Remote_Network_Template_Stack (or modified the
predefined Remote_Network_Template) that includes an IPSec Tunnel configuration, select
that IPSec Tunnel from the drop-down. Note that the tunnel you are creating for each
remote network connection connects Prisma Access to the IPSec-capable device at each
branch location.
Use the following guidelines when configuring an IPSec tunnel:
• The peer addresses in the IKE Gateway configuration must be unique for each tunnel.
You can, however, re-use some of the other common configuration elements, such as
crypto profiles.
• The IPSec Tunnel you select from a template must use Auto Key exchange and IPv4
only.
• If you onboard multiple remote networks to the same location with dynamic IKE peers,
you must use the same IKE crypto profile for all remote network configurations.
• To create a new IPSec Tunnel configuration, click New IPSec Tunnel, give it a Name and
configure the IKE gateway, IPSec crypto profile, and tunnel monitoring settings.
• If the IPSec-capable device at your branch location uses policy-based VPN, on the Proxy
IDs tab, Add a proxy ID that matches the settings configured on your local IPSec device
Prisma Access Administrator’s Guide (Panorama Managed) 304 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
to ensure that Prisma Access can successfully establish an IPSec tunnel with your local
device.
• Leave Enable Replay Protection selected to detect and neutralize against replay attacks.
• Select Copy TOS Header to copy the Type of Service (TOS) header from the inner IP header
to the outer IP header of the encapsulated packets in order to preserve the original TOS
information.
• To enable tunnel monitoring for the service connection, select Tunnel Monitor.
• Enter a Destination IP address.
Specify an IP address at your branch location to which Prisma Access can send ICMP
ping requests for IPSec tunnel monitoring. Make sure that this address is reachable by
ICMP from the entire Prisma Access infrastructure subnet.
• If you use tunnel monitoring with a peer device that uses multiple proxy IDs, specify a
Proxy ID or add a New Proxy ID that allows access from the infrastructure subnet to
your branch location.
The following figure shows a proxy ID with the service infrastructure subnet
(172.16.55.0/24 in this example) as the Local IP subnet and the branch location’s subnet
(10.1.1.0/24 in this example) as the Remote subnet.
The following figure shows the Proxy ID you created being applied to the tunnel monitor
configuration by specifying it in the Proxy ID field.
Prisma Access Administrator’s Guide (Panorama Managed) 305 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
You must configure a static route on your CPE to the Tunnel Monitor IP Address for
tunnel monitoring to function. To find the destination IP address to use for tunnel
monitoring from your branch location to Prisma Access, select Panorama > Cloud
Services > Status > Network Details, click the Service Infrastructure radio button,
and find the Tunnel Monitor IP Address.
STEP 10 | If you have a secondary WAN link at this location, select Enable Secondary WAN.
Be sure to create a unique IPSec tunnel for each remote network’s secondary WAN;
Prisma Access does not support reusing the same IPSec tunnel for secondary WANs in
multiple remote networks.
If you use static routes, tunnel failover time is less than 15 seconds from the time of detection,
depending on your WAN provider.
If you configure BGP routing and have enabled tunnel monitoring, the shortest default hold
time to determine that a security parameter index (SPI) is failing is the tunnel monitor, which
removes all routes to a peer when it detects a tunnel failure for 15 consecutive seconds. In this
way, the tunnel monitor determines the behavior of the BGP routes. If you do not configure
tunnel monitoring, the hold timer determines the amount of time that the tunnel is down
before removing the route. Prisma Access uses the default BGP HoldTime value of 90 seconds
as defined by RFC 4271, which is the maximum wait time before Prisma Access removes a
Prisma Access Administrator’s Guide (Panorama Managed) 306 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
route for an inactive SPI. If the peer BGP device has a shorter configured hold time, the BGP
hold timer uses the lower value.
When the secondary tunnel is successfully installed, the secondary route takes precedence
until the primary tunnel comes back up. If the primary and secondary are both up, the primary
route takes priority.
If you use a different BGP peer for the secondary (backup) connection, Prisma Access
does not honor the Multi-Exit Discriminator (MED) attributes advertised by the
CPE. This caveat applies if you use multiple BGP peers on either remote network
connections or service connections.
STEP 11 | Enable routing to the subnetworks or individual IP addresses at the remote network site that
your users will need access to.
Prisma Access uses this information to route requests to the appropriate site. The networks
at each site cannot overlap with each other or with IP address pools that you designated for
Prisma Access Administrator’s Guide (Panorama Managed) 307 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
the service infrastructure or for the Prisma Access for users IP pools. You can configure Static
Routes, BGP, or a combination of both.
• To configure Static Routes:
1. On the Static Routes tab, click Add and enter the subnetwork address (for example,
172.168.10.0/24) or individual IP address of a resource, such as a DNS server (for
example, 10.32.5.1/32) that your remote users will need access to.
2. Repeat for all subnets or IP addresses that Prisma Access will need access to at this
location.
• To configure BGP:
1. Select the BGP tab.
2. Select the ECMP Load Balancing choices. See Step 6.
3. If you select None for ECMP Load Balancing, enter the BGP choices.
Prisma Access Administrator’s Guide (Panorama Managed) 308 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 309 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Gateways (VGWs) or Transit Gateways (TGWs)) that can accept a limited number of
routes.
Prisma Access sets the community string for aggregated mobile user routes to
0xFFFE:0xFFF0.
6. To allow Prisma Access to advertise a default route for the remote network using eBGP,
select Advertise Default Route.
If you select Advertise Default Route, be sure that your network does not have another
default route being advertised by BGP, or you could introduce routing issues in your
network.
You must publish your default routes before you make this selection to advertise
them. In addition, be sure that your network does not have another default route
being advertised by BGP, or you could introduce routing issues in your network.
7. To prevent the BGP peer on the Prisma Access firewall from forwarding routes into your
organization’s network, select Don’t Advertise Prisma Access Routes.
By default, Prisma Access advertises all BGP routing information, including local routes
and all prefixes it receives from other service connections, remote networks, and mobile
user subnets. Select this check box to prevent Prisma Access from sending any BGP
advertisements, but still use the BGP information it receives to learn routes from other
BGP neighbors.
Since Prisma Access does not send BGP advertisements if you select this option, you
must configure static routes on the on-premises equipment to establish routes back to
Prisma Access.
8. Enter the Peer AS, which is the autonomous system (AS) to which the firewall, virtual
router, or BGP router at your remote network belongs.
9. Enter the IP address assigned as the Router ID of the eBGP router on the remote
network for which you are configuring this connection as the Peer Address.
10.(Optional) Enter an address that Prisma Access uses as its Local IP address for BGP.
Specifying a Local Address is useful where the device on the other side of the
connection (such as an Amazon Web Service (AWS) Virtual Private Gateway) requires
a specific local IP address for BGP peering to be successful. Make sure that the address
you specify does not conflict or overlap with IP addresses in the Infrastructure Subnet or
subnets in the remote network.
You must configure a static route on your CPE to the BGP Local Address.
Prisma Access Administrator’s Guide (Panorama Managed) 310 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
as Primary WAN and enter a unique Peer and, optionally, Local IP address for the
secondary WAN.
In some deployments (for example, when using BGP to peer with an AWS VPN gateway),
the BGP peer for the primary and secondary WAN might be different. In those scenarios,
you can choose to set a different BGP peer for the secondary WAN.
For BGP deployments with secondary WANs, Prisma Access sets both the
primary and secondary tunnels in an UP state, but follows normal BGP active-
backup behavior for network traffic. Prisma Access sets the primary tunnel
as active and sends and receives traffic through that tunnel only; if the
primary tunnel fails, Prisma Access detects the failure using BGP rules, sets the
secondary tunnel as active, and uses only the secondary tunnel to send and
receive traffic.
STEP 12 | If required, enable Quality of Service for the remote network connection and specify a QoS
profile or add a New QoS Profile.
You can create QoS profiles to shape QoS traffic for remote network and service connections
and apply those profiles to traffic that you marked with PAN-OS security policies, traffic that
Prisma Access Administrator’s Guide (Panorama Managed) 311 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 14 | Commit the configuration changes to Panorama and push the configuration out to Prisma
Access for networks.
1. Click Commit > Commit to Panorama.
2. Click Commit > Commit and Push. Click Edit Selections > Prisma Access, and select
both Prisma Access for networks and Prisma Access for service setup to push the
configuration out to the service.
Prisma Access Administrator’s Guide (Panorama Managed) 312 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 15 | Configure the IPSec-capable device at the remote network location to set up an IPSec
connection with Prisma Access for networks.
1. Find the Service IP Address for this remote network connection by selecting Panorama
> Cloud Services > Status > Network Details, clicking the Remote Networks radio
button, and viewing the Service IP Address field. Prisma Access for networks
infrastructure has assigned this IP address for the Prisma Access remote network
connection, and you must configure this as the peer IP address to set up the IPSec
tunnel between the remote network location and Prisma Access for networks.
2. Check the Local IP address for the device at the remote network location on the
Panorama > Cloud Services > Status > Network Details > Remote Networks page. If
you are performing NAT at the remote network location, the Local IP address displays
the IP address of the device after NAT.
STEP 16 | To secure traffic at the remote network location you must create security policy rules.
1. Select Policies.
2. Select the Device Group in which to add policy rules. You can select the
Remote_Network_Device_Group or the parent device group that you selected for
defining policies to secure the remote network location.
3. Create security policy rules. Make sure that you do not define security policy rules to
allow traffic from any zone to any zone. In the security policy rules, use the zones that
you defined in your template.
If a user on your network is denied access to a website, report website access issues
before you open a ticket with Palo Alto Networks.
STEP 17 | Enable logging to Cortex Data Lake. You must create and attach a log forwarding profile to
each policy rule for which you want to forward logs.
1. Select Objects > Log Forwarding.
2. Select the Device Group in which you added the policy rules, for example,
Remote_Network_Device_Group.
3. Add a Log Forwarding profile. In the log forwarding profile match list, Add each Log
Type that you want to forward.
4. Select Panorama/Cortex Data Lake as the Forward Method to enable Prisma Access to
forward the logs to Cortex Data Lake. You will be able to monitor the logs and generate
reports from Panorama. Cortex Data Lake provides a seamless integration to store
Prisma Access Administrator’s Guide (Panorama Managed) 313 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
logs without backhauling them to your Panorama at the corporate headquarters, and
Panorama can query Cortex Data Lake as needed.
The following example enables forwarding of Traffic, Threat Prevention, WildFire
Submission, URL Filtering, Data Filtering, and Authentication logs to Cortex Data Lake.
5. Select Policies > Security and edit the policy rule. In Actions, select the Log Forwarding
profile you created.
STEP 18 | Commit all your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit to Panorama.
2. Click Commit > Push to Devices and click Edit Selections.
3. On the Prisma Access tab, make sure Prisma Access for networks is selected and then
click OK.
4. Click Push.
STEP 2 | To display a map that shows the locations of the remote networks in the regions you have
selected, select Panorama > Cloud Services > Status > Monitor and click the Remote
Networks tab.
Prisma Access Administrator’s Guide (Panorama Managed) 314 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 4 | Click the tabs below the map to see additional remote network statistics.
Status tab:
Prisma Access Administrator’s Guide (Panorama Managed) 315 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
pass through the various BGP states (idle, active, open send, open pend, open confirm,
most commonly, the BGP status shows:
• Connect—The router at the remote network location is trying to establish the BGP peer
relationship with Prisma Access.
• Established—The BGP peer relationship has been established.
This field will also show if the BGP connection is in an error state:
• Warning—There has not been a BGP status update in more than eight minutes. This may
indicate an outage on the firewall.
• Error—The BGP status is unknown.
• Tunnel Status—The operational status of the connection between Prisma Access and the
remote network.
Statistics tab:
For the Ingress Bandwidth, Ingress Peak Bandwidth, Egress Bandwidth, and Egress
Peak Bandwidth fields, when the bandwidth consumption on a remote network
goes beyond 80% of the allocated bandwidth, the numbers display in a red color.
• Ingress Peak Bandwidth (Mbps)—The peak load from the remote network location into the
cloud service.
Prisma Access Administrator’s Guide (Panorama Managed) 316 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
• Egress Bandwidth (Mbps)—The bandwidth from Prisma Access into the remote network
location.
• Egress Peak Bandwidth (Mbps)—The peak load from Prisma Access into the remote
network location.
To find statistics about locations in the region, select Bandwidth Usage.
Select the check mark for a location to see detailed bandwidth usage. For deployments that
allocate bandwidth by compute location, select an IPSec termination node to view statistics
for that node. Prisma Access uses the 95th percentile standard to gather statistics, which
Prisma Access Administrator’s Guide (Panorama Managed) 317 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
tracks bandwidth at peak utilization and ignores the top 5 percent of utilization peaks and large
bursts.
Prisma Access Administrator’s Guide (Panorama Managed) 318 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
The BGP Status dialog displays. This table provides you with the following information:
• Peer—Routing information for the BGP peer, including status, total number of routes,
configuration, and runtime statistics and counters. The total number of routes display in the
bgpAfiIpv4-unicast Counters area, in the Incoming Total and Outgoing Total fields.
• Local RIB—Routing information that has been received from different peers and is stored in the
Routing Information Base (RIB).
• RIB Out—Routing information that Prisma Access advertises to its peers through BGP update
messages. See How BGP Advertises Mobile User IP Address Pools for Service Connections and
Remote Network Connections for an example of this table and for information about how BGP
utilizes the IP address pool you create for mobile users.
Prisma Access Administrator’s Guide (Panorama Managed) 319 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 320 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
If you’re not sure which model your deployment is using, Select Panorama > Cloud Services >
Configuration > Remote Networks.
• If you see a Bandwidth field in the Remote Networks area, you are allocating bandwidth by
Prisma Access location, and you can migrate to the aggregate bandwidth model.
• If you see an IPSec Termination Node, you have already migrated to the aggregate
bandwidth model.
After you migrate to the aggregate bandwidth model, the change is permanent and you cannot
revert to having a deployment that allocates bandwidth by Prisma Access location.
You must have a minimum of 50 Mbps of available bandwidth to migrate to the aggregate
bandwidth model.
Prisma Access Administrator’s Guide (Panorama Managed) 321 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
If you want to implement QoS after migration, learn the differences about configuring QoS for
an aggregate bandwidth deployment.
• Be sure to use a Class Bandwidth Type of Percentage instead of Mbps in your QoS profiles.
Prisma Access does not support bandwidth types of Mbps in QoS profiles for deployments
that allocate bandwidth by compute location.
• Understand how to specify a guaranteed bandwidth ratio and how to customize bandwidth
per site.
Using a guaranteed bandwidth ratio, you can allocate a percentage of the total allocated
bandwidth in the compute location. Prisma Access divides the guaranteed bandwidth
equally by the number of IPSec termination nodes in the compute location.
By customizing the bandwidth per site, you can apply an Allocation Ratio for the sites an
a single IPSec termination node and specify QoS profiles per site in the remote network
Settings. Alternatively, you can specify a QoS profile during remote network configuration
by selecting the remote network and specifying a QoS profile in the QoS tab.
If you have configured your remote networks to provide secure inbound access to your remote
network locations, all existing inbound access features are supported, such as enabling a
secondary WAN link (Enable Secondary WAN), BGP, QoS and source NAT options. There
is also no change to the bandwidth that is consumed by the public IP addresses that Prisma
Access allocates (5 IP addresses take 150 Mbps from your remote network license allocation,
and 10 IP addresses take 300 Mbps).
If you need to configure inbound access after you migrate, use the inbound access procedure
that is specific to the aggregate bandwidth model.
Palo Alto Networks recommends that you take a note of your existing bandwidth settings and
total licensed bandwidth before you migrate.
Although Prisma Access migrates your bandwidth during migration; you should note
your current settings as a best practice and make any adjustments to the compute
location bandwidth after you migrate.
• Check your existing bandwidth settings by selecting Panorama > Cloud Services >
Configuration > Remote Networks and make a note of the existing Bandwidth that is
available for each remote network connection.
• Navigate to Panorama > Licenses and check your total licensed bandwidth in Mbps for
remote networks. This information is included under Prisma Access Net Capacity or
GlobalProtect Cloud Service for Mobile Users, depending on your license type.
After you migrate, make a note of the following differences to your deployment:
Prisma Access Administrator’s Guide (Panorama Managed) 322 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
• You onboard all new remote networks using the aggregate bandwidth remote network
onboarding procedure.
• When you view Bandwidth Usage Statistics, you view them at a per-IPSec termination node
level.
Prisma Access Administrator’s Guide (Panorama Managed) 323 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
• Prisma Access uses IPSec termination nodes in aggregate bandwidth deployments. During
migration, Prisma Access provides one IPSec termination node per compute location for every
1,000 Mbps of allocated bandwidth. For example, if you allocate 1500 Mbps of bandwidth in a
compute location, Prisma Access provides that location with two IPSec termination nodes.
You assign IPSec termination nodes to a remote network during remote network onboarding.
In an aggregate bandwidth migration, Prisma Access associates the IPSec termination nodes
to the remote networks during migration. The following list provides some examples of IPSec
termination node association for a migration:
• If you have four remote networks that are in the same compute location, and those
remote networks have 50 Mbps of bandwidth each, Prisma Access allocates 200 Mbps
of bandwidth to that compute location, provides a single IPSec termination node to that
compute location, and associates that IPSec termination node to all four remote networks.
• If you have three remote networks in the same compute location with 100 Mbps each,
Prisma Access allocates 300 Mbps of bandwidth to that compute location, provides a single
IPSec termination node to that compute location, and associates that IPSec termination
node to all three remote networks.
• If you have seven remote networks in the same compute location, with two remote
networks having 500 Mbps and five remote networks having 100 Mbps each, Prisma Access
allocates 1500 Mbps of bandwidth to that compute location. Because the total allocated
bandwidth in that compute location is greater than 1,000 Mbps, Prisma Access allocates
two IPSec termination nodes and makes the following associations:
• The two 500 Mbps remote networks are assigned one IPSec termination node (one node
for each 1,000 Mbps remote network).
• The five 100 Mbps remote networks are assigned one IPSec termination node.
After you migrate, you can change the IPSec termination node association to increase
bandwidth for a location. For example, given a compute location with two IPSec termination
nodes, you could reassign a single IPSec termination node to a single location and reassign
the other IPSec termination node to the remaining locations, which effectively provides the
location that does not share an IPSec termination node with more bandwidth.
• If you reduce bandwidth sufficiently, you might have to release an IPSec termination node. For
example, if you reduce the bandwidth in a compute location from 1500 Mbps to 800 Mbps,
you would need to remove one of the existing IPSec termination nodes. If any of those nodes
are being used by existing locations, you must reassign the IPSec termination node before you
delete the IPSec termination node.
Prisma Access Administrator’s Guide (Panorama Managed) 324 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Palo Alto Networks makes the following recommendations and requirements for QoS in an
aggregate bandwidth deployment.
• Because bandwidth is shared for all locations in a single compute location, you should change
the Class Bandwidth Type of Mbps to Percentage. The only time that a bandwidth type of
Prisma Access Administrator’s Guide (Panorama Managed) 325 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Mbps is supported is when you have an existing deployment that allocates bandwidth by
location and you then migrate to an aggregate bandwidth deployment.
• You cannot adjust QoS bandwidth allocation based on Mbps in the profile; for profiles that use
a Percentage bandwidth type, you can change the QoS bandwidth per location by adjusting the
Guaranteed Bandwidth Ratio and customizing the QoS profile per site.
Prisma Access Administrator’s Guide (Panorama Managed) 326 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
• You cannot mix bandwidth types in a compute location; if you do, you receive an error
message during commit.
• If you add new locations and those locations belong to a new compute location, you will only
be able to create profiles that have a Class Bandwidth Type of Percentage in the new compute
location.
• If you retain QoS profiles that have a Class Bandwidth Type of Mbps, any changes you make
to the Guaranteed Bandwidth Ratio or customize the QoS profile per site are ignored.
• After migration, any locations who use QoS profiles with a Class Bandwidth Type of Mbps
show a QoS Class Type For Sites of Mbps for their corresponding compute location in the QoS
tab. QoS Profiles with a Class Bandwidth Type of Percentage show a QoS Class Type For Sites
of Percentage.
In addition, you cannot select any QoS profiles that have a Class Bandwidth Type of Mbps.
The following screenshot shows the US Southwest compute location using a QoS profile with
Prisma Access Administrator’s Guide (Panorama Managed) 327 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
a Class Bandwidth Type of Mbps. That choice is not selectable in the drop-down in the QoS
Profile area.
However, you can select a QoS Profile that uses a Class Bandwidth Type of Percentage
(QoS-2 in this example).
Prisma Access Administrator’s Guide (Panorama Managed) 328 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
• If you change the QoS profile for a compute location from a Class Bandwidth Type of Mbps
to Percentage, you should make the change during a maintenance window or during off peak
hours. Changing the QoS profile might change the traffic prioritization.
• You can only select QoS profiles with a Class Bandwidth Type of Percentage when you
customize the QoS profile per site.
Prisma Access Administrator’s Guide (Panorama Managed) 329 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 2 | Edit the settings by clicking the gear icon in the Bandwidth Allocation area.
The migration to the aggregate bandwidth model is permanent and not reversible.
Before you migrate, review the pre-migration checklist. You must Commit and Push
your changes for them to take effect.
If you have QoS Profiles with a Class Bandwidth Type of Mbps, Prisma Access notifies
you that you should plan to change these profiles to a Class Bandwidth Type of
Percentage.
Prisma Access Administrator’s Guide (Panorama Managed) 330 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 4 | Review the information in the Migration Confirmation window; then, click OK.
If all the location or locations in a compute location have a total bandwidth of less
than 50 Mbps, Prisma Access will increase the bandwidth to 50 Mbps for that
compute location. Prisma Access provides you with the locations that require the
bandwidth increase during the migration process.
Prisma Access migrates your allocated remote network bandwidth to the aggregate bandwidth
model and displays a confirmation window. Click Close to close the window.
Prisma Access Administrator’s Guide (Panorama Managed) 331 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Remote network connections with overlapped subnets support outbound internet only.
Refer to the table in the following figure for more details. You can bypass these limitations
by configuring source NAT on the on-premise Palo Alto Networks next-generation firewall
(if present) or networking device (router, switch, or SD-WAN device) that connects to the
IPSec tunnel used for the remote network connection with overlapped subnets.
Prisma Access Administrator’s Guide (Panorama Managed) 332 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
If you add a location with overlapping subnets, it has no effect on locations that don’t use
overlapping subnets; those sites retain their existing functionality.
Prisma Access Administrator’s Guide (Panorama Managed) 333 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 334 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
To set up this configuration, create a remote network connection and create a service connection
to onboard the remote network and HQ locations. The details below show how to set up the
router configuration at each location to ensure optimal routing:
STEP 1 | Add the static routes on your router or on-premises IPSec capable device at the remote
network location.
If you have a Palo Alto Networks firewall at the edge of the WAN link, on Network > Virtual
Routers > Static Routes, Add the static routes:
STEP 2 | Configure the routes that you want to advertise to another directly connected location over
the WAN link.
In this example, you need to configure this on the at HQ location. If you have an on-premises
Palo Alto Networks firewall at the edge of the WAN link, you can set up route redistribution
and configure which BGP routes to export on Network > Virtual Routers > BGP.
Prisma Access Administrator’s Guide (Panorama Managed) 335 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
In addition to the following templates, we provide a Generic template that you can use
with any on-premises device that is not listed here.
• Cisco appliances:
• Cisco Integrated Services Routers (ISRs)
• Cisco Adaptive Security Appliances (ASAs)
• Citrix
• Prisma SD-WAN (formerly CloudGenix)
• Riverbed
• Silver Peak
Use the following workflows to onboard service connections or remote network connections
using the predefined IPSec templates.
Prisma Access Administrator’s Guide (Panorama Managed) 336 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
You can also complete this step if you delete these templates and need to retrieve
them.
• For service connections, select Panorama > Cloud Services > Configuration > Service
Setup, click the gear icon in the Settings area to open the Settings, then click OK.
• For remote network connections, select Panorama > Cloud Services > Configuration >
Remote Networks, click the gear icon in the Settings area to open the Settings, then click
OK.
STEP 2 | Select Network, then select the correct Template (either Remote_Network_Template if you
are creating a remote network connection or Service_Conn_Template if you are creating a
service connection).
STEP 3 | Determine the type of device that is used to terminate the service connection or remote
network connection, and find a template to use with that device.
If your SD-WAN or IPSec device is not on the list, use the generic profiles.
Prisma Access Administrator’s Guide (Panorama Managed) 337 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 4 | Select Network > Network Profiles > IKE Gateways and make the following changes to the
IKE gateway profile for your device:
You can use the IPSec crypto and IKE crypto profiles with no changes; however, you must
make specific changes to the IKE gateway profile to match the network settings.
• (Optional) If you know the public IP address of the on-premises device that will be used to
set up the IPSec tunnel with Prisma Access, set a static IP address by specifying a Peer IP
Address Type of IP and enter the Peer Address for the IPSec tunnel.
• If using a pre-shared key for the IPSec tunnel, specify a Pre-shared Key.
• Specify a Peer Identification of either IP Address or User FQDN.
Be sure that you match the settings you specify here when you configure the device used
to terminate the other side of the IPSec tunnel.
STEP 5 | Onboard the service connection or remote network connection, specifying the IPSec tunnel
configuration that matches the device on the other side of the IPSec tunnel.
Prisma Access Administrator’s Guide (Panorama Managed) 338 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 6 | (Optional) If you need to add a backup tunnel (Secondary WAN) for a service connection or
remote connection, perform the following additional configuration steps.
Configuring a Secondary WAN is not supported in the following deployments:
• If your secondary WAN is set up in active-active mode with the Primary IPSec tunnel.
• If your customer premises equipment (CPE) is set up in an Equal Cost Multipath (ECMP)
configuration with the Primary and Secondary IPSec tunnel.
1. Create a new IKE Gateway for the backup tunnel, copying the settings from the
predefined template you want to duplicate.
The following example creates a backup tunnel configuration for generic networking
devices.
2. Under Advanced Options, specify the IKE Crypto Profile for the predefined template
you want to use.
Palo Alto Networks recommends that you use GCM ciphers instead of CBC ciphers for
IPSec tunnels.
If you are onboarding a Prisma SD-WAN, select Enable Passive Mode.
Prisma Access Administrator’s Guide (Panorama Managed) 339 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
3. Create a new IPSec Tunnel, specifying the new IKE gateway you created, but copying all
the other settings from the default template.
4. When you onboard the service connection or remote network connection, Enable
Secondary WAN and specify the tunnel you created for the backup WAN.
Prisma Access Administrator’s Guide (Panorama Managed) 340 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 7 | Complete the configuration of the service connection or remote network connection by
matching the cryptos, pre-shared key, and Peer identifiers on the device that is used to
terminate the other side of the IPSec tunnel.
STEP 8 | (Optional) If you need to onboard multiple remote network connections that use the same
types of networking devices, Export the configuration of the remote network, edit the
settings, then Import that configuration.
See Onboard Multiple Remote Network Connections of the Same Type for details.
Prisma Access Administrator’s Guide (Panorama Managed) 341 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 342 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 2 | Select a location, then Export the configuration of a remote network that you have
previously onboarded.
If you have not yet added any locations, you need to Add a location, then download its
configuration. You must select a remote network and click Export. A CSV file that includes the
settings is downloaded to your computer.
STEP 3 | (Deployments that allocate bandwidth by compute location only) Make sure that you have
allocated bandwidth for the locations to onboard.
Each location you onboard has a corresponding compute location for which bandwidth is
allocated.
1. Select Panorama > Cloud Services > Configuration > Remote Networks and click the
gear in the Bandwidth Allocation area.
2. Check the Bandwidth Allocation field in the table that displays.
The table in this area shows the compute location-to-Prisma Access location mapping.
You must have bandwidth allocated for the compute locations that are associated with
the locations you want to onboard. For example, to onboard the Japan Central location,
make sure that you have allocated bandwidth in the Asia Northeast compute location.
3. If you have not yet allocated bandwidth for the compute locations that are associated
with the locations you want to onboard, add it now.
Prisma Access Administrator’s Guide (Panorama Managed) 343 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
STEP 4 | (Deployments that allocate bandwidth by compute location only) Find the IPSec Termination
Node associated with the location or locations you want to onboard.
You assign an IPSec Termination Node to the remote network during onboarding, and you enter
this value in the spn-name column of the CSV file.
To find the IPSec Termination Node, perform one of the following actions:
• Select Panorama > Cloud Services > Configuration > Remote Networks, Add a remote
network and select the location you want to onboard, and make a note of the IPSec
Termination Node choices in the onboarding area.
• Open a command-line interface (CLI) session with the Panorama that manages Prisma
Access and enter the show plugins cloud_services remote-networks agg-
bandwidth region compute-location-name, where compute-location-name is the compute
location that is associated with the location you want to onboard. The IPSec Termination
Node displays in the spn-name-list field.
STEP 5 | Modify the CSV file to add configuration for remote networks.
See Fields in Remote Networks Table for a description of the fields and the possible values in
this file.
You must rename the network(s) listed in the exported file. If the file has duplicate names the
import will fail.
Prisma Access Administrator’s Guide (Panorama Managed) 344 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 345 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
proxy_ids The proxy IDs that are configured for the peer. N
For route-based VPNs, leave this field blank.
Specify the Proxy ID in the following CSV
configuration format:
[{"name":"proxyidname", "local":"1.2.3.4/32",
"remote":"4.3.2.1/32", "protocol":{"udp":
{"local-port":123, "remote-port":234}}},
Prisma Access Administrator’s Guide (Panorama Managed) 346 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 347 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
sec_proxy_ids The proxy IDs that are configured for the peer N
for the secondary IPSec tunnel. For route-based
VPNs, leave this field blank. Specify the Proxy ID
in the following CSV configuration format:
[{"name":"proxyidname", "local":"1.2.3.4/32",
"remote":"4.3.2.1/32", "protocol":{"udp":
{"local-port":123, "remote-port":234}}},
{"name":"proxyidname2", "local":"2.3.4.5/32",
"remote":"3.4.5.6/32", "protocol":{"tcp":
{"local-port":234,"remote-port":345}}}]
Prisma Access Administrator’s Guide (Panorama Managed) 348 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 349 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 350 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 351 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 352 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 353 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Use Remote Networks to Secure Branches
Prisma Access Administrator’s Guide (Panorama Managed) 354 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based
Policies with Prisma Access
Prisma Access requires that you configure IP address-to-username mapping to consistently
enforce user-based policy for mobile users and users at remote network locations. In addition, you
need to configure username to user-group mapping if you want to enforce policy based on group
membership.
To select users and groups from a drop-down list when you create and configure policies in
Panorama, you can also configure Panorama to obtain the list of user groups retrieved from the
username-to-user group mapping.
The following sections provide an overview and the steps you perform to configure and
implement User-ID and use the Cloud Identity Engine to get IP address-to-username and
username-to-user group mapping in Prisma Access.
• Configure User-ID in Panorama Managed Prisma Access
• Configure User-ID for Remote Network Deployments
• Get User and Group Information Using the Cloud Identity Engine
• Populate User and Group Names in Security Policy Rules
• Redistribute User-ID Information Between Prisma Access and On-Premises Firewalls
355
Configure User-ID and User-Based Policies with Prisma Access
STEP 2 | Configure username-to-user group mapping for your mobile users and users at remote
network locations.
For Mobile Users—GlobalProtect, Explicit Proxy, and remote network deployments, configure
the Directory Sync component of the Cloud Identity Engine to retrieve user and group
information from your Active Directory (AD); then, configure Group Mapping Settings in your
Mobile Users—GlobalProtect or remote network deployment
Alternatively, you can enable username-to-user group mapping for mobile users and users at
remote networks using an LDAP server profile.
We recommend using a Group Include List in the LDAP server profile, so that you can
specify which groups you want to retrieve, instead of retrieving all group information.
STEP 3 | Allow Panorama to use username-to-user group mapping in security policies by completing
one of the following actions:
• Configure the Directory Sync component of the Cloud Identity Engine to retrieve user
and group information from your Active Directory (AD); then, configure Group Mapping
Settings in your Mobile Users—GlobalProtect, Mobile Users—Explicit Proxy, or remote
network deployment.
The Cloud Identity Engine does not auto-populate user and group information to
security policy rules and to Panorama. To simplify rule creation based on user and
group information, configure a master device or the Cloud Identity Engine and
specify it during your Prisma Access configuration.
• Configure group-based policy by specifying the full distinguished name (DN) of the group.
Prisma Access Administrator’s Guide (Panorama Managed) 356 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 357 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
Kerberos is not supported for use with Authentication Portal in conjunction with
Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 358 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
Address (Panorama > Cloud Services > Status > Network Details > Service Infrastructure >
Captive Portal Redirect IP Address.
• To obtain user mappings from existing network services that authenticate users—such as
wireless controllers, 802.1x devices, Apple Open Directory servers, proxy servers, or other
Network Access Control (NAC) mechanisms—Configure User-ID to Monitor Syslog Senders
for User Mapping.
While you can configure either the Windows agent or the PAN-OS integrated User-ID
agent on to listen for authentication syslog messages from the network services, because
only the PAN-OS integrated agent supports syslog listening over TLS, it is the preferred
configuration.
• To include the username and domain in the headers for outgoing traffic so other devices in
your network can identify the user and enforce user-based policy, you can Insert Username
in HTTP Headers.
STEP 2 | Configure username-to-user group mapping for your mobile users and users at remote
network locations.
• Configure the Directory Sync component of the Cloud Identity Engine to retrieve user and
group information from the supported directory types; then, configure Group Mapping
Settings in your remote network deployment.
• Alternatively, you can enable group mapping using an LDAP server profile.
STEP 3 | Allow Panorama to populate users and groups drop-down lists in security policies by
completing one of the following actions:
• Configure one or more next-generation firewalls or the Cloud Identity Engine to populate
usernames and user groups in security policies.
• Configure group-based policy by specifying the full distinguished name (DN) of the group.
STEP 4 | (Optional) If you have on-premise firewalls in your deployment, redistribute the user-ID
information from Prisma Access to on-premise firewalls and from on-premise firewalls to
Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 359 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 360 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
STEP 2 | Configure the Cloud Identity Engine to retrieve your directory data.
STEP 3 | (Deployments with on-premises Active Directory only) If you use an on-premises Active
Directory, Install and configure the Cloud Identity Agent to communicate with your on-
premises AD and configure mutual authentication between the Cloud Identity Engine service
and the agent.
Prisma Access Administrator’s Guide (Panorama Managed) 361 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
attribute, you can specify it here to ensure consistency for logging and reporting
across your organization.
If you configure Azure AD or Okta Directory as the identity provider (IdP) in the
Cloud Identity Engine, specify the Primary Username as userPrincipalName. Prisma
Access supports the userPrincipalName (UPN) attribute that is used with Azure AD
and Okta Directory.
• (Optional) Enter the E-Mail attribute (such as mail).
• (Optional) If you use alternate name attributes for the user, enter them. You can enter
up to three alternate user names (Alternate User Name 1, Alternate User Name 2,
and Alternate User Name 3).
4. Click OK when complete.
STEP 5 | Commit and push (Commit > Commit and Push) your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 362 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 363 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
The region you select must match the region you select when you activated
your Cloud Identity Engine tenant.
• Cloud Identity Engine Instance—Select the Cloud Identity Engine instance to
associate with the profile.
• Domain—Select the domain that contains the directories you want to use.
• Update Interval (min)—Enter the number of minutes that you want Panorama to wait
between updates from the Cloud Identity Engine app to Panorama (also known as a
refresh interval). The default is 60 minutes and the range is 5—1440.
3. Verify that the profile is Enabled.
4. For the User Attributes, select the format for the Primary Username. You can optionally
select the formats for the E-Mail and an Alternate Username. You can configure up to
three alternate username formats if your users log in using multiple username formats.
When you view users in security policy rules, the username displays in the primary
username format you select here.
Prisma Access Administrator’s Guide (Panorama Managed) 364 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
5. For the Group Attributes, select the format for the Group Name.
Prisma Access Administrator’s Guide (Panorama Managed) 365 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 366 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
STEP 5 | Verify that Prisma Access has the mapping information from the Cloud Identity Engine.
1. Select Panorama > Device Groups > <template-name>, where <template-name> is the
template for the deployment you are configuring, and verify that the Cloud Identity
Engine profile is attached to the device group.
The following example shows that the device group is successfully attached to the
Explicit_Proxy_Device_Group.
2. Select Objects > Security > Pre Rules, Add a security policy rule, and verify that the
groups are populated in the user area.
Prisma Access Administrator’s Guide (Panorama Managed) 367 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 368 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
You can only use one Master Device per device group; if you need to configure a Master
Device for different device groups, you need to create a separate Master Device for each
device group.
STEP 1 | Make sure that the device you want to use as a Master Device is managed by the same
Panorama that manages Prisma Access.
You can check your managed devices under Panorama > Managed Devices.
Prisma Access Administrator’s Guide (Panorama Managed) 369 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
STEP 2 | Add the master device to your Prisma Access mobile user or remote network deployment.
• For a Mobile Users—GlobalProtect deployment, select Panorama > Cloud Services >
Configuration > Mobile Users—GlobalProtect, click the gear icon in the Settings, and
select the on-premise firewall you want to specify as a Master Device.
• For a Mobile Users—Explicit Proxy deployment, select Panorama > Cloud Services >
Configuration > Mobile Users—Explicit Proxy, click the gear icon in the Settings, and
select the Master Device you created.
Prisma Access Administrator’s Guide (Panorama Managed) 370 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
• For remote network deployments, the device group with a remote network connection,
select Panorama > Cloud Services > Configuration > Remote Networks, click the gear
icon in the Settings, and select the Master Device you created.
Prisma Access Administrator’s Guide (Panorama Managed) 371 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 372 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
Prisma Access uses the service connection or remote network connection as an IPSec
tunnel that serves as the underlay path to the Layer 3 network. You can use any route
path over an IPSec trusted tunnel for privately addressed destinations to redistribute this
mapping.
Prisma Access Administrator’s Guide (Panorama Managed) 373 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
To redistribute User-ID mappings from Prisma Access to an on-premises firewall, complete the
following steps.
Make sure you do not apply any SSL decryption on any connection that redistributes user
identity to the on-premises firewall (the SC-CAN or RN-SPN), including any firewalls that
are in the redistribution path. Alternatively, you can apply a decryption exclusion to the
redistribution traffic.
Prisma Access Administrator’s Guide (Panorama Managed) 374 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
STEP 1 | Make a note of the IP address to use when you configure the data redistribution agent.
• For remote network connections, find the EBGP Router address (Panorama > Cloud
Services > Status > Network Details > Remote Networks > EBGP Router).
• For service connections, find the User-ID Agent Address (Panorama > Cloud Services >
Status > Network Details > Service Connection > User-ID Agent Address).
Prisma Access Administrator’s Guide (Panorama Managed) 375 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
STEP 2 | Configure Prisma Access as a User-ID agent that redistributes user mapping information.
1. In the Panorama that manages Prisma Access, select Device > Data Redistribution >
Collector Settings.
To configure the collector on a service connection, select the Service_Conn_Template;
to configure the collector on a remote network connection, select the
Remote_Network_Template
2. Click the gear icon to edit the settings.
3. Provide a Collector Name and a Collector Pre-Shared Key to identify Prisma Access as a
User-ID agent.
4. Click OK to save your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 376 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
STEP 3 | Configure the on-premises firewall to collect the User-ID mapping from Prisma Access.
1. From the on-premises firewall, select Device > Data Redistribution > Agents.
2. Add a User-ID Agent and give it a Name.
3. Select Host and Port.
4. Enter the User-ID Agent Address (for a service connection) or EBGP Router Address (for
a remote network connection) from Prisma Access in the Host field.
5. Enter the Collector Name and Collector Pre-Shared Key for the Prisma Access collector
you created in Step 2.
6. Select IP User Mappings.
7. Click OK.
8. Repeat these steps for each service connection or remote network connection for which
you want to redistribute mappings.
Prisma Access Administrator’s Guide (Panorama Managed) 377 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
The following figure shows a Prisma Access service connection or remote network connection
being used to redistribute the mapping. You can use any route path over an IPSec trusted tunnel
for privately addressed destinations to redistribute this mapping.
To redistribute User-ID mappings from an on-premises firewall to Prisma Access, complete the
following steps.
STEP 1 | Configure the on-premises firewall to redistribute User-ID information to Prisma Access.
1. From the on-premises firewall, select Device > Data Redistribution > Collector Settings.
2. Click the gear icon to edit the settings.
3. Provide a Collector Name and a Collector Pre-Shared Key to identify the on-premises
firewall as a User-ID agent.
4. Click OK to save your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 378 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
STEP 2 | Configure Prisma Access to collect the User-ID mapping from the on-premises firewall.
1. From the Panorama that manages Prisma Access, select Device > Data Redistribution >
Agents.
Make sure that you have selected the Service_Conn_Template (for service connections)
or the Remote_Network_Template (for remote network connections) in the Templates
drop-down at the top of the page.
2. Add a User-ID Agent and give it a Name.
3. Select Host and Port.
4. Enter the IP address of the MGT interface or service route that the firewall uses to send
user mappings in the Host field.
For the MGT interface, you can enter a hostname instead of the IP address.
5. Enter a Port.
The default port is 5007.
6. Enter the Collector Name and Collector Pre-Shared Key, using the values for the
collector you used for the on-premises firewall in Step 1.
7. Select IP User Mappings.
8. Click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 379 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Configure User-ID and User-Based Policies with Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 380 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma
Access
Quality of Service ( QoS) is a set of technologies that work on a network to guarantee its ability
to dependably run high-priority applications and traffic under limited network capacity. You
can configure QoS in Prisma Access to prioritize business-critical traffic or traffic that requires
low latency, such as VoIP or videoconferencing. You can also reserve a minimum amount of
bandwidth for business-critical applications.
Prisma Access uses the same QoS profiles and supports the same Differentiated Services
Code Point (DSCP) markings as next-generation Palo Alto Networks firewalls. However, the
configuration process is different than configuring QoS on next-generation firewalls, in particular
when your deployment allocates bandwidth by compute location.
Prisma Access can either mark ingress traffic using a security policy or it can honor DSCP
markings set by your organization's on-premises device.
Prisma Access for Clean Pipe also supports QoS.
Use the following sections to learn how QoS works, including examples, and how to configure it.
• QoS Examples
• Configure QoS in Prisma Access
• QoS for Remote Networks
• Configure Quality of Service in Prisma Access
• Configure Quality of Service for Clean Pipe
381
Quality of Service in Prisma Access
QoS Examples
The following examples show how Prisma Access marks and shapes traffic.
In the following example, the administrator created a security policy on the
Mobile_User_Device_Group to mark incoming mobile user traffic. These policies assign traffic an
IP precedence value of AF11.
The administrator also created QoS profiles with QoS policy rules, enabled QoS on the service
connection and remote network connection, and applied the profiles to those connections to
shape the traffic at the traffic’s egress point based on the QoS markings.
Prisma Access marks traffic at its ingress point based on security policies or honors
marking set by your on-premises devices, and shapes the traffic on egress to your service
connections or remote network connections using QoS profiles.
The following example shows the QoS traffic flow from a branch office to an HQ/data center.
The administrator creates a security policy on the Remote_Network_Device_Group to mark the
incoming traffic from the remote network connection and enabled QoS and applied a QoS profile
on the service connection to shape the outgoing traffic.
Prisma Access Administrator’s Guide (Panorama Managed) 382 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
The following example shows a hybrid deployment with an on-premises firewall at a branch that
is connected by Prisma Access with a remote network connection, and the on-premises firewall
marks the traffic. This deployment honors the marking set on the on-premises firewall. You must
enable QoS and apply a QoS profile on the service connection, so that Prisma Access can shape
the traffic at egress.
Prisma Access honors all DSCP marking from the on-premises device as long as that traffic does
not match an overriding security policy on Prisma Access.
The following example shows a Prisma Access for Clean Pipe Overview configuration that shapes
on ingress (from the internet to Clean Pipe side). See Configure Quality of Service for Clean Pipe
for configuration details.
Prisma Access Administrator’s Guide (Panorama Managed) 383 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 384 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
STEP 4 | Enable QoS on the service connection or remote network connection and bind the QoS
profile to the connection.
The following figure shows the available QoS deployments in Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 385 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
The QoS settings you specify here apply only to outbound traffic for remote networks, and
do not affect secure inbound access traffic.
In the following example, you have allocated 1500 Mbps bandwidth in the Canada Central
compute location, which is the compute location for the Canada Central and Canada East
locations.
Since you allocated 1500 Mbps for the compute location, Prisma Access gives you two IPSec
termination nodes.
You should now determine whether you want to allocate your locations to the same IPSec
termination node, or to use separate IPSec termination nodes. If you expect you will add more
remote network locations to this compute location, you could leave one IPSec termination node
available to onboard more remote networks at a later time.
For this example, you onboarded two remote networks, also known as Remote Network Security
Processing Nodes (RN-SPNs), one in Canada East (RN-8) and one in Canada Central (RN-9), using
the same IPSec termination node for both locations.
You Enable QoS in the QoS area by selecting Panorama > Cloud Services > Configuration >
Remote Networks > Settings, clicking the gear to edit the settings, selecting QoS, and enabling
Prisma Access Administrator’s Guide (Panorama Managed) 386 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
QoS for the Canada Central compute location. See Configure Quality of Service in Prisma Access
for the detailed steps.
In this example, you want the compute location to receive a guaranteed bandwidth ratio of
60%; to do so, enter a Guaranteed Bandwidth Ratio of 60% to the Canada Central compute
location. This action reserves 900 Mbps (60% of the overall bandwidth allocation) for guaranteed
bandwidth.
Prisma Access divides up the guaranteed bandwidth equally between IPSec termination nodes;
therefore, each IPSec termination node receives 450 Mbps of guaranteed bandwidth (900 Mbps
divided by the total number of IPSec termination nodes). When you select Customize Per Site,
you can view the bandwidth that is allocated for each location. By default, the Allocation Ratio
is divided equally between all remote networks in an IPSec termination node. In the following
example, since there are two remote networks in the IPSec termination node, each remote
network receives an Allocation Ratio of 50%.
If you select Customize Per Site and then onboard additional remote networks in the same
IPSec termination node, the newly-onboarded sites receive an allocation ratio of 0, and
you must manually rebalance the allocation ratio between existing sites and the newly-
onboarded site.
If you do not Customize Per Site, the bandwidth percentage automatically rebalances
when you add remote networks. For example, if you did not select Customize Per Site and
have four remote networks onboarded, each of those remote networks have an allocation
ratio of 25%. If you add a fifth remote network, all five sites rebalance and receive a
guaranteed bandwidth of 20%.
Prisma Access Administrator’s Guide (Panorama Managed) 387 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Canada East location to receive more bandwidth then the Canada Central location; to do so,
complete the following steps.
STEP 1 | Select Panorama > Cloud Services > Configuration > Remote Networks > Settings.
STEP 2 | Click the gear to edit the settings and select QoS.
STEP 3 | Enable QoS, assign a QoS Profile (Default-Profile in this example) and a Guaranteed
Bandwidth Ratio to the Canada Central compute location.
Prisma Access Administrator’s Guide (Panorama Managed) 388 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
STEP 4 | Select Customize Per Site, enable Customize Per Site, then apply a higher bandwidth
Allocation Ratio for the RN-8 remote network (for the Canada East location) than the RN-9
remote network (for the Canada Central location).
The following example shows an Allocation Ratio of 70% for RN-8 and 30% for RN-9. The
Guaranteed Bandwidth (Mbps) changes accordingly, showing the new guaranteed bandwidth
amounts.
When complete, your configuration has the following guaranteed bandwidth allocation for the
two sites.
If you have a remote network that has ECMP enabled to use multiple IPSec tunnels for a single
remote network, you can change the Allocation Ratio for the IPSec tunnels you use for that
remote network location.
Prisma Access Administrator’s Guide (Panorama Managed) 389 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 390 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
When complete, the locations have the following QoS profiles attached.
Prisma Access Administrator’s Guide (Panorama Managed) 391 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Be sure that you select the correct Device Group. To create a security rule for a
remote network, select the device group for the remote network (for example,
Remote_Network_Device_Group); for mobile users, select the device group for
the mobile users (for example, Mobile_User_Device_Group).
2. Add a security policy rule.
3. Enter a Name for the rule.
4. Define the matching criteria for the source or destination fields in the packet.
See Create a Security Policy Rule for details.
5. Click Actions, then select a QoS Marking of either IP DSCP or IP Precedence.
6. Enter the QoS value in binary form, or select the value from the drop-down.
The following screenshot shows a security policy rule that matches traffic marked with
an IP DSCP value of af11.
Prisma Access Administrator’s Guide (Panorama Managed) 392 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Service connections do not support QoS Post Rules; use Pre Rules only with
Service Connections.
Be sure that you select the correct Device Group for the service connection (for
example, Service_Conn_Device_Group) or remote network connection (for example,
Remote_Network_Device_Group). If a rule in a Shared device group has defined values
other than the values in the General, DSCP/ToS, and Other settings areas, Prisma
Access does not apply the rule on the remote network and service connection.
2. Add a QoS policy rule.
3. Click General and enter a name for the policy rule.
4. Click the DSCP/ToS tab, then click Codepoints and Add one or more new codepoints.
For Clean Pipe deployments, you can specify additional QoS settings in policy, such as
source, destination, or application.
5. Specify a Name for the DSCP/ToS rule, then select a Type and Codepoint.
Alternatively, keep the default value (Any) to allow the policy to match to traffic
regardless of the Differentiated Services Code Point (DSCP) value or the IP Precedence/
Type of Service (ToS) defined for the traffic.
6. Click the Other Settings tab, then Choose the QoS Class to assign to the rule.
You define class characteristics in the QoS profile.
7. Click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 393 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
STEP 3 | Create one or more QoS profiles to shape QoS traffic on egress for service connections and
remote network connections.
You use profiles to shape the traffic at egress point by defining QoS classes and assigning a
bandwidth to them. You must select either an existing QoS profile or create a new QoS profile
when you enable QoS for Prisma Access.
1. Select the correct template the profile you want to create (Remote_Network_Template
or Service_Conn_Template); then, select Network > Network Profiles > QoS Profile and
2. Add a profile.
3. Enter a profile Name.
4. Set the overall bandwidth limits for the QoS profile rule.
• Enter an Egress Max that represents the maximum throughput (in Mbps) for traffic
leaving the service connection or remote network connection.
• For service connections, specify a number of up to 1 Gbps (1,000 Mbps).
Prisma Access Administrator’s Guide (Panorama Managed) 394 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Max for a QoS class must be less than or equal to the Egress Max for the QoS
profile.
• Enter the Egress Guaranteed percentage or bandwidth in Mbps for each QoS class.
For QoS profiles for remote networks, enter a percentage.
Guaranteed bandwidth assigned to a class is not reserved for that class—bandwidth
that is unused continues to remain available to all traffic. When a class of traffic
exceeds the egress guaranteed bandwidth, Prisma Access passes that traffic on a
best-effort basis.
• Enter a Class Bandwidth Type for the profile.
6. Click OK.
STEP 4 | (Service Connections Only) Enable QoS for the service connection and apply the QoS profile
to the connection.
1. Enable QoS by selecting Panorama > Cloud Services > Configuration > Service Setup,
selecting a Connection Name, clicking the QoS tab; then Enable QoS.
If you allocate your remote network bandwidth by Prisma Access Remote Network
Deployments instead of by compute location, configure QoS in the same way as you
do service connections. Select Panorama > Cloud Services > Configuration > Remote
Networks, select the hypertext for a remote network connection Name, click the
Prisma Access Administrator’s Guide (Panorama Managed) 395 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
QoS tab, and Enable QoS. If you allocate bandwidth by compute location (the default
method), continue to Step 5 to configure QoS for remote networks.
2. Select a QoS profile and click OK.
STEP 5 | (Remote network deployments that allocate bandwidth by compute location only) Enable
QoS for your remote network locations.
1. Determine the Prisma Access locations where you want to deploy QoS; then find the
compute location that corresponds to each location.
Each location is allocated bandwidth from its compute location, and you must know the
name of the compute location for the locations where you want to allocate QoS. For a
list of compute location-to-location mapping, see Prisma Access Locations by Compute
Location, or select Panorama > Cloud Services > Configuration > Remote Networks
Prisma Access Administrator’s Guide (Panorama Managed) 396 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
> Aggregate Bandwidth and click the gear icon; the mappings display in the Compute
Location and Prisma Access Location columns.
2. Select Panorama > Cloud Services > Configuration > Remote Networks > Settings, click
the gear to edit the settings, and select QoS.
3. Enable QoS at a compute location level.
Whatever settings you enter apply to all locations that correspond to this compute
location.
4. Enter the QoS Profile, Guaranteed Bandwidth Ratio, and Reserved for Guaranteed
Bandwidth (Mbps).
• Enter the QoS Profile to use with this compute location.
If you want to use different QoS Profiles per remote networks, use Customize Per
Site as described in a later step.
• Enter the Guaranteed Bandwidth Ratio, which is a ratio based on the entire allocated
bandwidth for the compute location.
For example, If you have allocated bandwidth of 800 Mbps for the Canada Central
compute location, and you enter a Guaranteed Bandwidth Ratio of 60%, the
guaranteed bandwidth for that compute location is 480 Mbps.
• Enter the amount of bandwidth that is Reserved for Guaranteed Bandwidth (Mbps)
for the QoS profile and compute location you selected.
The following screenshot shows QoS enabled for the Canada Central, Ireland, and South
Korea compute locations.
5. (Optional) if you have multiple remote network connections per compute location and
want to change either the bandwidth ratio or QoS profile for each location, onboard your
Prisma Access Administrator’s Guide (Panorama Managed) 397 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
remote network locations; then, select Customize Per Site and change the bandwidth
allocation ratio, QoS profile, or both.
• To customize the guaranteed bandwidth, click the number in the Customize Per Site
area, select Customize Per Site, and change the Allocation Ratio.
By default, each remote connection is given a percentage that is equal to the number
of connections. For example, given 4 connections in a compute location and a total
guaranteed bandwidth of 100 Mbps, each location receives 25% of that bandwidth or
25 Mbps.
If you select Customize Per Site and then onboard additional remote
networks in the same IPSec termination node, the newly-onboarded sites
receive an allocation ratio of 0, and you must manually rebalance the
allocation ratio between existing sites and the newly-onboarded site.
If you do not Customize Per Site, the bandwidth percentage automatically
rebalances when you add remote networks. For example, if you did not select
Customize Per Site and have four remote networks onboarded, each of those
remote networks have an allocation ratio of 25%. If you add a fifth remote
network, all five sites rebalance and receive a guaranteed bandwidth of 20%.
• If you want to specify a QoS profile at a per-remote network level, select a different
QoS Profile for the remote network.
Prisma Access Administrator’s Guide (Panorama Managed) 398 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Remote network statistics display for the 10 IPSec termination nodes that have the
highest throughput. Prisma Access uses the 95th percentile standard to gather statistics,
Prisma Access Administrator’s Guide (Panorama Managed) 399 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
which tracks bandwidth at peak utilization and ignores the top 5 percent of utilization
peaks and large bursts.
Select the time range (Last hour, Last 24 hours, Last 7 days, or Last 30 days) to view
statistics for that time period.
The remote networks with the highest egress bandwidth usage displays in the Site area,
along with the remote networks locations’ statistics for Guaranteed Bandwidth, Average
Prisma Access Administrator’s Guide (Panorama Managed) 400 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Throughput, Average Packet Loss, and the IPSec Termination Node and QoS Profile used
by the remote network. You can also Search for a location.
To view the remote networks associated with a specific IPSec termination node, change
the drop-down at the top of the page from All to a specific IPSec termination node to
view statistics for that IPSec termination node and the remote networks for that site.
To view specific traffic for a site sorted by QoS class, slick the Site Name. The guaranteed
bandwidth, egress throughput, and throughput over time displays for the remote network
Prisma Access Administrator’s Guide (Panorama Managed) 401 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
site. You can also sort this information over the last hour, last 24 hours, last 7 days, or last
30 days.
Hover over the graph on the right to get detailed information for a specific period of time.
• For service connections, select Panorama > Cloud Services > Status > Monitor > Service
Connection, select a region, then Monitor the Statistics.
Click QoS to view a page with QoS statistics.
Prisma Access Administrator’s Guide (Panorama Managed) 402 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
This page displays a chart with real-time and historical QoS statistics, including the number of
dropped packets per class. This chart displays only for service connections or remote network
Prisma Access Administrator’s Guide (Panorama Managed) 403 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
connections that have QoS enabled, shows the last five minutes of the connection’s network
activity, and refreshes every 10 seconds.
The following figure shows traffic being passed for classes 1,2,3, and 4. The data below the
figure shows the number of packets dropped based on the QoS configuration for classes 2, 3,
and 4.
Prisma Access Administrator’s Guide (Panorama Managed) 404 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 405 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Quality of Service in Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 406 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in
Prisma Access
To allow you to create and manage multiple Prisma Access instances, Prisma Access offers
multitenancy, which enables you to create up to 200 instances (tenants) on a single Panorama
appliance (or 2 appliances in high availability (HA) mode), with each tenant having their own
separate templates and template stacks, device groups, and access domains.
Existing or future non-multitenant deployments are not affected by multitenancy and will
continue to function normally. We recommend that you enable multitenancy only if your
organization has a need to manage multiple tenants in Prisma Access.
Follow this workflow to create multiple tenants in Panorama for Prisma Access:
• Multitenancy Overview
• Multitenancy Configuration Overview
• Plan your Multitenant Deployment
• Enable Multitenancy and Migrate the First Tenant
• Add Tenants to Prisma Access
• Delete a Tenant
• Create Administrative Users for a Single Tenant
• Control Role-Based Access for Tenant-Level Administrative Users
• Sort Logs by Device Group ID for External Logging
This section only provides the tasks you perform to configure tenants for remote networks,
mobile users, or a combination of remote network and mobile user deployments. To configure the
Clean Pipe service, see Create and Configure Prisma Access for Clean Pipe.
407
Manage Multiple Tenants in Prisma Access
Multitenancy Overview
Enabling multitenancy allows you to host multiple instances of Prisma Access on a single
Panorama appliance. Each instance is known as a Tenant.
Prisma Access tenants get their own dedicated Prisma Access instances and they are not shared
between tenants.
Prisma Access Administrator’s Guide (Panorama Managed) 408 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 409 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
To determine the type of Prisma Access license you have from Panorama, select
Panorama > Licenses. See Determine Your Prisma Access License Type from
Panorama for details.
• If you have a Business, Business Premium, Zero Trust Network Access (ZTNA) Secure
Internet Gateway (SIG), or Enterprise license, use the following minimums as a guideline:
Prisma Access for Networks and Prisma Access for Users:
If you have a Local Edition, a minimum quantity of 200 units is required for each tenant, and
all tenants will be Local.
If you have a Worldwide Edition, a minimum quantity of 1,000 units is required to create a
Worldwide tenant. If you allocate between 200 and 999 units for a tenant, Prisma Access
creates a Local tenant; if you allocate 1,000 or more units for a tenant, then Prisma Access
creates a Worldwide tenant.
Units correspond to bandwidth in Mbps for Prisma Access for Remote Networks and the
number of mobile users for Prisma Access for Users.
• If your license type starts with GlobalProtect Cloud Service, use the following minimums as
a guideline:
Prisma Access for Networks—You must have a minimum of 200 Mbps available in your
license for each tenant.
Prisma Access for Users—You must have a minimum of 200 mobile users available in your
license for each tenant.
In both types of Prisma Access configurations, you can add additional licensing (above
these minimums) of either type. You can increase or decrease the bandwidth or mobile
user allocation for any tenants after onboarding, as long as you keep the minimum required
allocation per tenant, and the overall licensed capacity is not exceeded.
You can set up a multitenant configuration for only remote networks, only mobile users, or
both. You allocate licenses accordingly to each tenant when you enable multitenancy.
If you have a license for remote networks and mobile users, you can set up an individual
tenant with only mobile users or only remote networks. For example, if your Prisma Access
deployment has a Worldwide edition license for mobile users and remote networks, you could
set up a tenant for mobile users only, as long as you specify a minimum of 1,000 mobile users
for the tenant.
For each tenant you create after the first, Prisma Access automatically creates templates,
template stacks, and device groups for each tenant and associates them to the access domain
you create. Prisma Access creates this environment to allow you to create a tenant-level
administrative user using an administrative role based on the tenant’s device groups and
templates, then creating an administrative user based on that role. In this way, you create an
Prisma Access Administrator’s Guide (Panorama Managed) 410 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
administrative user that has access to a single tenant without allowing that user access to the
other tenants that are managed by the Panorama appliance.
Prisma Access creates template stacks, templates, and device group using the following naming
convention:
• A service connection template stack with the name of sc-stk-tenant, where tenant is the
tenant’s name.
• A service connection template with the name of sc-tpl-tenant.
• A service connection device group with the name of sc-dg-tenant.
• A mobile user template stack with the name of mu-stk-tenant.
• A mobile user template with the name of mu-tpl-tenant.
• A mobile user device group with the name of mu-dg-tenant.
• A remote network template stack with the name of rn-stk-tenant.
• A remote network template with the name of rn-tpl-tenant.
• A remote network device group with the name of rn-dg-tenant.
• An Explicit Proxy template stack with the name of ep-stk-tenant.
• An Explicit Proxy template with the name of ep-tpl-tenant.
• An Explicit Proxy device group with the name of ep-dg-tenant.
• A Clean Pipe template stack with the name of cp-stk-tenant.
• A Clean Pipe template with the name of cp-tpl-tenant.
• A Clean Pipe device group with the name of cp-dg-tenant.
Template stacks, templates, and device groups are created for all Prisma Access types, even
those for which you might not be licensed. For example, if you purchase a license for remote
networks, Prisma Access automatically creates template stacks, templates, and device groups
for remote networks, mobile users, and Clean Pipe.
If you add custom templates, they cannot take precedence over the Prisma Access-created
templates.
You allocate remote network and mobile user license resources for each tenant based on the
license that is associated with the Cloud Services plugin in Panorama.
The following figure shows a sample Prisma Access deployment using a license with a
20,000 Mbps remote network bandwidth pool and 20,000 mobile users. The administrator
allocated 5,000 Mbps in remote network bandwidth and 5,000 mobile users for the existing
configuration. After the administrator enabled multitenancy, the license allocation migrated
along with all other configuration to the first tenant. The administrator then created additional
tenants, each with a 5,000 Mbps bandwidth pool for remote networks and 5,000 mobile
users for each tenant. Prisma Access allocates the license resources from the overall license
Prisma Access Administrator’s Guide (Panorama Managed) 411 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
allocation. After you complete this configuration, there is 5,000 Mbps of remote network
bandwidth and 5,000 mobile users available in the license.
Prisma Access Administrator’s Guide (Panorama Managed) 412 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
You should also make a note of the bandwidth and mobile users allocation for your
existing configuration. After you migrate your configuration to the first tenant, check
these values to verify that the first tenant migrated correctly.
Make a list of the names you will use to identify each tenant.
When you create tenant names, avoid using names like Tenant-1, Tenant-2, Tenant-3,
and so on. The system logs reserve a small number of characters for the tenant name
in the log output and, if tenants have similar names, it can be difficult to associate the
tenant with the logs. We recommend using a unique and short name for tenants (for
example, Acme or Hooli).
Make a list of the administrative users you will create and assign for each tenant, and note the
maximum number of administrative users that can be logged in concurrently.
When administrative users are performing normal multitenant operations such as configuration
changes and commit operations, we recommend having a maximum of 12 administrative users
logged in to Panorama concurrently.
An administrative user who can manage multiple tenants can provision up to 200 tenants at
the same time with a single commit operation.
Be sure that you have sufficient license resources to enable multiple tenants.
The minimum license allocation for each tenant is 200 Mbps for each remote network or 200
mobile users. You can also create a tenant with only remote networks or mobile users, and can
configure tenants in differing configurations on the same Panorama. For example, you could
create a tenant with remote networks only, a tenant with mobile users only, or a tenant with
both mobile users and remote networks, as long as each tenant meets the minimum license
allocation and the relevant licenses are activated and associated with the Panorama where you
configure the tenants.
Prisma Access Administrator’s Guide (Panorama Managed) 413 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
When configuring a tenant in multitenancy mode, create a unique name for each IPSec tunnel
and IKE gateway for service connections and remote network connections, and try to use a
name that will not be duplicated by another tenant. While there is no effect to functionality,
you cannot delete an IPSec tunnel or IKE gateway if another tenant is using a tunnel or
gateway with the same name.
This caveat applies to all objects, including QoS profiles (you cannot delete objects with
duplicate names in a multi-tenant deployment if one of the objects is being referenced by
another tenant).
Single-tenant users cannot view system logs; only superusers can. You can, however, sort logs
by tenant.
When a mobile user logs into a single Prisma Access tenant, the user consumes one license
unit. If a user logs into additional tenants under a single multitenant deployment, the user
consumes one license unit for each tenant they are logged in. For example, if a single user is
logged into five tenants, the user consumes five mobile user license units in total.
When using the multitenancy feature and logged in as a tenant-level administrative user,
opening the Panorama Task Manager (clicking Tasks at the bottom of the Panorama web
interface) shows all tasks for all tenants, including any tasks done at the superuser (Admin)
level.
Some Prisma Access features are not supported for use with multitenancy. See Multitenancy
Unsupported Features in the Palo Alto Networks Compatibility Matrix for details.
If you back up a Panorama configuration, then revert it to an earlier saved configuration,
Panorama cannot revert to the configuration you saved if you perform the following actions in
the following order:
1. Backup a Panorama configuration.
2. Delete a tenant.
3. Restore the configuration.
If you delete a tenant, you cannot use any of the previous backups you saved before you
deleted the tenant. However, you can use any backups you make after you delete the tenant.
Prisma Access Administrator’s Guide (Panorama Managed) 414 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
When you create the first tenant with no existing configuration, make sure of the following
differences and guidelines to follow:
• Since there is no configuration to move over, Prisma Access creates templates, template stacks,
and device groups for each tenant and associates them to the access domain you create during
tenant creation. See Multitenancy Configuration Overview for the naming convention that
Prisma Access uses.
• Optionally, after you create the tenant-level access domain, you could create an administrative
user that allows administration for a single tenant by associating an administrator with the
access domain.
• If you have any existing templates or device groups (for example, templates from an on-
premises device that is managed by Panorama that should also be used by Prisma Access),
be sure to add those device groups and templates domains to the Access Domain when you
create and configure it. If you do not add device groups and templates to the access domain,
you cannot view or select them when you configure the Prisma Access components in the
Cloud Services plugin.
Prisma Access Administrator’s Guide (Panorama Managed) 415 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
If you don’t have an existing Prisma Access configuration, and you are creating an all-new
multitenant deployment, do not use this workflow; instead, complete the steps in Add
Tenants to Prisma Access to create the first tenant.
STEP 1 | Determine the number of licensed units you want to allocate to this deployment.
While Prisma Access migrates your configuration to the first tenant, you need to specify:
• The Bandwidth to allocate for the tenant’s remote users deployment (if applicable).
• The Users to allocate for the tenant’s mobile users deployment (if applicable).
• The number of ADEM units to allocate for mobile uses and remote networks (if applicable).
Prisma Access Administrator’s Guide (Panorama Managed) 416 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 3 | Select Enable Multitenancy (located on the upper right of the page).
After you enable multitenancy, Panorama displays a notification informing you that the
existing Prisma Access configuration are moved to the first tenant.
STEP 5 | Choose the type of deployment you want to use for the tenant.
• For a remote network, mobile user deployment, or to configure both deployment types for
a tenant, select Remote Networks/Mobile Users.
• For a clean pipe deployment, select Clean Pipe.
This section only describes how to configure tenants for remote network, mobile user,
or both remote network and mobile user deployment types. To configure the clean pipe
service, see Create and Configure Prisma Access for Clean Pipe.
Prisma Access Administrator’s Guide (Panorama Managed) 417 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
4. (Optional) Click Templates to verify that Prisma Access added the following templates
and template stacks:
• Explicit_Proxy_Template
Prisma Access Administrator’s Guide (Panorama Managed) 418 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
• Explicit_Proxy_Template_Stack
• Mobile_User_Template
• Mobile_User_Template_Stack
• Remote_Network_Template
• Remote_Network_Template_Stack
• Service_Conn_Template
• Service_Conn_Template_Stack
These are the default template stacks and templates for a standard Prisma Access
deployment; if you added other templates, be sure that Prisma Access added them.
5. (Optional) If you have other templates associated with this configuration, select them.
6. Click OK to close the Access Domain page and return to the Tenants page.
Prisma Access Administrator’s Guide (Panorama Managed) 419 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 7 | Enter the values in Bandwidth (Mbps) for remote networks, Users for mobile users, and the
number of Autonomous DEM Users you want to allocate for each deployment type.
Use the following guidelines when allocating ADEM units for a tenant:
• The number of ADEM units you can allocate for mobile users and remote networks can be
only equal to or less than base license.
• The minimum number of units you can allocate is 200.
• After you allocate the ADEM units for a tenant, you can edit or remove those units.
• If you did not purchase an ADEM license for your deployment type (Mobile Users or
Remote Networks), that choice is grayed out.
STEP 9 | Select the tenant you created in the Tenants drop-down to verify that all settings were
onboarded.
Prisma Access Administrator’s Guide (Panorama Managed) 420 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 10 | Select Commit > Commit to Panoramato save your changes locally on the Panorama that
manages Prisma Access.
If you do not perform a local commit, Prisma Access components do not display in the Push
Scope when you Commit and Push your changes.
STEP 11 | Commit and push your changes to make them active in Prisma Access.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope.
2. Select Prisma Access, then select the tenant you created, Service Setup, Remote
Networks, and Mobile Users.
Selecting a tenant from the drop-down list returns you to the Status page for that tenant.
Prisma Access Administrator’s Guide (Panorama Managed) 421 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
If you are creating an all-new multitenant deployment, use this workflow to add the first
tenant, as well as additional tenants. See Create an All-New Multitenant Deployment
for more information.
STEP 3 | Specify the amount of Bandwidth (Mbps) to allocate for the Remote Networks and the
number of Users to allocate for the Mobile Users.
Prisma Access Administrator’s Guide (Panorama Managed) 422 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 4 | (Deployments with Autonomous DEM Only) If you have purchased an Autonomous DEM
(ADEM) license, select the number of units to allocate for ADEM.
Use the following guidelines when allocating ADEM units for a tenant:
• The number of ADEM units you can allocate for mobile users and remote networks can be
only equal to or less than base license.
• The minimum number of units you can allocate is 200.
• After you allocate the ADEM units for a tenant, you can edit or remove those units.
• If you did not purchase an ADEM license for your deployment type (Mobile Users or
Remote Networks), that choice is grayed out.
Prisma Access Administrator’s Guide (Panorama Managed) 423 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 6 | Make sure that Prisma Access applied the template stack, template, and device group service
settings to the service connection settings of the tenant you just created.
1. Select the tenant you created from the Tenant drop-down.
2. Select Panorama > Cloud Services > Configuration > Service Setup.
3. Click the gear icon to the right of the Settings area to edit the settings.
4. Make sure that Prisma Access has associated the template stack (sc-stk-tenant), template
(sc-tpl-tenant), and device group (sc-dg-tenant) to your service connection settings.
5. Make sure that the Parent Device Group is set to Shared and click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 424 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 7 | Make sure that Prisma Access applied the template stack, template, and device group to the
remote network settings.
1. Select Panorama > Cloud Services > Configuration > Remote Networks and click the
gear icon to the right of the Settings area to edit the settings.
2. Make sure that the Prisma Access has associated the template stack (rn-stk-tenant),
template (rn-tpl-tenant), and device group (rn-dg-tenant) to your remote network
settings.
3. Make sure that the Parent Device Group is set to Shared and click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 425 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 8 | Make sure that Prisma Access applied the template stack, template, and device group to the
mobile user settings.
1. Select Panorama > Cloud Services > Configuration > Mobile Users and click the gear
icon to the right of the Settings area to edit the settings.
2. Make sure that the Prisma Access has associated the template stack (mu-stk-tenant),
template (mu-tpl-tenant), and device group (mu-dg-tenant) to your remote network
settings.
3. Make sure that the Parent Device Group is set to Shared and click OK.
STEP 9 | Mobile User deployments only—Add an infrastructure subnet, then commit and push your
changes to make them active in Prisma Access.
These steps are required for the mobile user changes to take effect.
1. Select Panorama > Cloud Services > Configuration > Service Setup, click the gear icon
to edit the Settings, and configure an infrastructure subnet.
2. Select Commit > Commit and Push, Edit Selections in the Push Scope, and make sure
that Mobile Users is selected.
3. Click OK to save your changes to the Push Scope.
4. Commit and Push your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 426 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 10 | Select the new tenant you created by selecting Panorama > Cloud Services > Configuration
> tenant-name and continue the configuration of your tenant.
1. Configure the Service Infrastructure.
2. Create a Service Connection to Allow Access to Private Apps.
3. Onboard and Configure Remote Networks if you are licensed for remote networks.
4. Set Up GlobalProtect on Panorama Managed Prisma Access if you are licensed for
remote users.
Prisma Access Administrator’s Guide (Panorama Managed) 427 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
Delete a Tenant
To delete a tenant, complete the following task.
While you can delete all tenants in a multitenant deployment, you cannot delete the
admin-level Prisma Access configuration where you add or delete tenants.
STEP 1 | Select the tenant, and delete all configuration associated with it.
This includes any Service Connection, Mobile User, Remote Network, or Clean Pipe
configuration.
3. Click Push.
Prisma Access Administrator’s Guide (Panorama Managed) 428 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 3 | Select Panorama > Cloud Services > Configuration, select the tenant, then Delete it.
Deleting a tenant also deletes any public IP addresses Prisma Access has assigned for service
connections, remote networks, and mobile users.
When you delete a tenant, Prisma Access deletes the template and device group set
for which you are licensed, but does not delete the unlicensed set. For example, if you
have a Prisma Access for Users license and delete a tenant, Prisma Access deletes the
mobile user-related template stacks, templates, and device groups but does not delete
the set it created for the unlicensed Prisma Access for Networks. You can manually
delete these unused template and device group sets after you delete the tenant.
STEP 4 | Select Commit > Commit to Panorama and Commit your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 429 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
Users who manage single tenants cannot see the system logs because the Monitor > Logs
> System choice is not available. This limitation applies to all Administrators who have an
administrative role of Device Group and Template. Only superusers can view system logs
in multitenancy mode.
Prisma Access Administrator’s Guide (Panorama Managed) 430 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 1 | Create an administrative role with a type of Device Group and Template.
1. Select Panorama > Admin Roles.
2. Add an Admin Role Profile with a Role of Device Group and Template.
3. Click OK.
You can create a single Admin Role Profile and share it across multiple tenants; however,
you must create a separate administrator for each tenant.
While you tailor the administrative role for the needs of your organization, we
recommend deselecting Commit for Other Admins. Deselecting this choice
allows a tenant-level user to commit only the changes they have made, and
prevents them from unintentionally committing other changes that other
tenant-level administrative users have made that are not yet committed.
Prisma Access Administrator’s Guide (Panorama Managed) 431 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 432 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 4 | Repeat Steps 2 and 3 to add additional users to manage your tenants as required.
STEP 5 | Select Commit > Commit to Panorama and Commit your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 433 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
You can either enable or disable access to the Cloud Services plugin for a user, but you
cannot give a user read-only access; if a user has access to view the Cloud Services plugin,
the user can also make configuration changes to its components, including Prisma Access.
The following table shows sample tenant-level administrative roles and the steps you perform to
create those roles.
Prisma Access Administrator’s Guide (Panorama Managed) 434 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
Create a hybrid user who: This configuration is not possible. You cannot make the
Cloud Services plugin read-only. You can only provide
• Has read-only access to the Cloud
access to admin users to view it and use it to make
Services plugin
configuration changes, or disallow them from viewing
• Has read-write access to the it.
security policy
• Cannot push the configuration
to Prisma Access (requires
the superuser to push the
configuration)
This task assumes that you have Add Tenants to Prisma Access templates, template
stacks, and device groups for the tenant; you’ll be associating them to the tenant-level
administrative user.
Prisma Access Administrator’s Guide (Panorama Managed) 435 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 1 | Create an administrative role with a type of Device Group and Template.
1. Select Panorama > Admin Roles.
2. Add an Admin Role Profile with a Role of Device Group and Template.
3. Click OK.
You can create a single Admin Role Profile and share it across multiple tenants.
Prisma Access Administrator’s Guide (Panorama Managed) 436 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 437 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 2 | Select Panorama > Access Domain and Add an Access Domain.
Prisma Access Administrator’s Guide (Panorama Managed) 438 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 3 | Specify the Device Groups and Templates associated with the tenant.
If you created any device groups that are children or grandchildren of other device
groups under the Shared parent device group, select only the device group at the
lowest hierarchical level (child or grandchild); do not select the parent or you will have
errors on commit.
Prisma Access Administrator’s Guide (Panorama Managed) 439 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 4 | Create and configure an Administrator for the tenant-level administrative user, specifying the
Access Domain you just created.
1. Select Panorama > Administrators.
2. Add an Administrator.
3. Enter and confirm a Password for the new Administrator.
4. Specify an Administrator Type of Device Group and Template Admin.
5. Specify the Access Domain that is associated with the device groups for that tenant.
6. Specify the Admin Role that you created in Step 1 for the tenant.
When you complete this example, the abcd-tenant-no-plugin-access Administrative user
will have permissions based on what you defined in the Admin Role profile, but will not
Prisma Access Administrator’s Guide (Panorama Managed) 440 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
be able to view or configure the Cloud Services plugin (including Prisma Access). Note,
however, that they will not be able to push any changes that they make to the cloud.
STEP 5 | Select Commit > Commit to Panorama and Commit your changes.
Prisma Access Administrator’s Guide (Panorama Managed) 441 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 442 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
hooli-mu {
/api/?type=op&cmd=<show><dg-hierarchy></dg-hierarchy></show>
For more information about using APIs with logs, see Retrieve Logs (API).
STEP 2 | Use the device group ID-to-device group name mapping to associate the logs with a tenant.
The following example shows an administrator retrieving the logs for Acme using the Log
Forwarding App to create a Syslog Forwarding Profile. Since the mapping example in Step 1
Prisma Access Administrator’s Guide (Panorama Managed) 443 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
retrieves the device group-to-device ID of 20 for Acme and the hierarchy is at Level 1, you use
that in the query, along with the following parameters:
• A descriptive Name for the profile.
• The Syslog Server IP address (you can also specify an FQDN).
• The Port on which the server is listening.
The default port for Syslog messages over TLS is 6514.
• The Facility selected from the drop-down.
Prisma Access Administrator’s Guide (Panorama Managed) 444 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
STEP 3 | Add the Forwarding parameters that select the logs you want to forward.
The following example shows the administrator creating a Traffic log using a Custom filter with
a Query that selects the logs for Acme, based on the hierarchy level (DG Hierarchy Level 1)
and the device group (20) you retrieved in Step 1.
Prisma Access Administrator’s Guide (Panorama Managed) 445 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Manage Multiple Tenants in Prisma Access
Prisma Access Administrator’s Guide (Panorama Managed) 446 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced
Deployments
Some Prisma Access routing and networking deployments require a thorough understanding of
your organization’s topology and routing devices, along with an understanding of how Prisma
Access routing works. Read about these advanced deployments and how to configure them in this
section.
Advanced Deployments that Apply to Service Connections, Mobile Users, and Remote Networks:
• Add a New Compute Location for a Deployed Prisma Access Location
• IPv6 Support for Private App Access
• DNS Resolution for Mobile Users—GlobalProtect and Remote Network Deployments
• How BGP Advertises Mobile User IP Address Pools for Service Connections and Remote
Network Connections
• Proxy Support for Prisma Access and Cortex Data Lake
Service Connection Advanced Deployments:
• Service Connection Multi-Cloud Redundancy
• Use Traffic Steering to Forward Internet-Bound Traffic to Service Connections
• Routing for Service Connection Traffic
• Create a High-Bandwidth Network Using Multiple Service Connections
Mobile Users—GlobalProtect Advanced Deployments:
• Configure Multiple Portals in Prisma Access
• Dynamic DNS Registration Support for Mobile Users—GlobalProtect
• Identification and Quarantine of Compromised Devices in a Prisma Access GlobalProtect
Deployment
• Sinkhole IPv6 Traffic In Mobile Users—GlobalProtect Deployments
• Redistribute HIP Information with Prisma Access
• View HIP Reports from Panorama
• Support for Gzip Encoding in Clientless VPN
Mobile Users—Explicit Proxy Advanced Deployments:
• Secure Users and Devices at Remote Networks With an Explicit Proxy
Remote Network Advanced Deployments:
• Provide Secure Inbound Access to Remote Network Locations
• Create a High-Bandwidth Network for a Remote Site
447
Prisma Access Advanced Deployments
To reduce down time for mobile user deployments, use the API to pre-allocate the new
mobile user gateway and portal IP addresses before you perform these steps.
STEP 1 | (Remote Network deployments only) Add bandwidth for the new remote network compute
locations.
1. (Remote Network deployments that allocate remote network bandwidth by compute
locations only) Select Panorama > Cloud Services > Configuration > Remote Networks.
2. Click the gear icon in the Bandwidth Allocation area and add Bandwidth Allocation
(Mbps) for the new compute location.
3. Wait for the bandwidth to be reflected in the Allocated Total field at the top of the page;
then, click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 448 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 2 | Delete the Service Connection, Remote Network connection, or Mobile User location
associated with the new compute location.
For Mobile User—GlobalProtect deployments, if you have added the location to the Manual
Gateway Locations tab, be sure to delete it from there as well as the Locations tab.
STEP 6 | (Mobile User deployments only) Retrieve the new gateway and portal IP addresses using the
API script and add them to your allow lists.
STEP 7 | (Remote Network and Service Connection deployments only) Change your CPE to point to
the new IP addresses for the IPSec tunnel for the remote network connection or service
connection.
For remote network connections, select Panorama > Cloud Services > Status > Network
Details > Remote Networks, make a note of the Service IP Address, and configure the new
Service IP Address as the peer address for the remote network IPSec tunnel on your CPE.
For service connections, select Panorama > Cloud Services > Status > Network Details >
Service Connection, make a note of the Service IP Address, and configure the new Service IP
Address as the peer address for the service connection IPSec tunnel on your CPE.
STEP 8 | Select Panorama > Cloud Services > Status > Network Details > Remote Networks, make
a note of the Service IP Address, and configure the new Service IP Address as the peer
address for the remote network IPSec tunnel on your CPE.
When you delete and re-add a remote network connection, the IP address of the IPSec tunnel
on the Prisma Access side changes.
You cannot access external SaaS or public apps using IPv6; IPv4 networking is still
required to access external apps.
Users access internal apps through GlobalProtect (for external GlobalProtect mobile users) or
through a remote network IPSec tunnel (for internal GlobalProtect mobile users in a branch
office accessing Prisma Access through a remote network connection). Either internal or external
GlobalProtect mobile users can access private apps over IPv6.
• External GlobalProtect mobile users connect to the Prisma Access network using an IPv4
VPN tunnel, and you configure internal IPv6 addressing in Prisma Access to allow the users to
access private apps behind an IPv6 network.
Prisma Access Administrator’s Guide (Panorama Managed) 449 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• Internal GlobalProtect mobile users at a remote network connect to Prisma Access using an
IPv4 IPSec tunnel, and you configure internal IPv6 addressing in Prisma Access so that those
users can access private apps behind an IPv6 network. See Private App Access Over IPv6
Examples for examples.
You configure IPv6 in the following Prisma Access network components:
• Enable IPv6 and specify an IPv6 subnet in your Infrastructure Subnet to establish an IPv6
network infrastructure to enable communication between your remote networks (branch
locations), mobile users, and service connections (data center or headquarters locations).
• For a Mobile Users—GlobalProtect deployment, specify whether or not IPv6 networking should
be utilized for the compute locations that are associated with your mobile user locations.
You can specify IPv6 mobile user IP address pools and IPv6 DNS server addresses as required.
• For service connections and remote network connections, you can specify IPv6 addressing for
the type of routing the connection uses (either static or BGP routes).
• For static routes, specify an IPv6 address for the subnets used for the static routes.
• For BGP routes, specify an IPv6 Peer Address and Local Address.
You can also specify the transport method used to exchange BGP peering information.
You can specify to use IPv4 to exchange all BGP peering information (including IPv4 and
IPv6), use IPv6 to exchange all BGP peering information, or use IPv4 to exchange IPv4 BGP
peering information and IPv6 to exchange IPv6 BGP peering information.
• For remote networks, you can add IPv6 addresses for DNS servers.
The following deployments do not support IPv6 addressing:
• Clean Pipe deployments
• Traffic Steering (using traffic steering rules to redirect internet-bound traffic using a service
connection)
Prisma Access Administrator’s Guide (Panorama Managed) 450 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The following figure shows a mobile user accessing a private app that is hosted at a data center
connected to Prisma Access by a service connection. You can configure the Mobile User IP
address pool (for mobile users) and Infrastructure Subnet (for service connections) to use IPv6
addressing to access the app.
The following figure shows an internal GlobalProtect user at a branch location connected to
Prisma Access by a remote network accessing a private app that is hosted at a data center
connected to Prisma Access by a service connection. You can configure the Infrastructure Subnet
(for service connections) and static or BGP routing (for the service connections and remote
network connections) to use IPv6 addressing to access the app.
Prisma Access Administrator’s Guide (Panorama Managed) 451 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The following figure shows a user at a branch location connected to Prisma Access by a remote
network accessing a private app that is hosted at another branch location connected by a remote
network connection. You can configure IPv6 addressing for static or BGP routing for the remote
network connections to access the app.
The following figure shows a user at a branch location with IPv6 addressing accessing an external
app. In this case, IPv4 routing is required to access the external app, regardless of your Prisma
Access IPv6 configuration.
Prisma Access Administrator’s Guide (Panorama Managed) 452 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The same IPv4 requirement applies for external GlobalProtect users who access a public app.
Enable and Configure IPv6 Networking and IP Pools in Your Prisma Access
Infrastructure
For any Prisma Access deployment, you need to enable IPv6 globally and specify an IPv6 subnet
in your Infrastructure Subnet so that Prisma Access can establish an IPv6 network infrastructure
between your remote network locations, mobile users, and service connections. To do so,
complete the following steps.
STEP 1 | Select Panorama > Cloud Services > Configuration > Service Setup and click the gear icon to
edit the Settings.
Prisma Access Administrator’s Guide (Panorama Managed) 453 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
If you need to delete IPv6, delete all configuration (including for mobile users, remote
network, and service connections as applicable) before deselecting the Enable IPv6
check box.
Prisma Access Administrator’s Guide (Panorama Managed) 454 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 4 | Enter the Infrastructure BGP AS you want to use within the Prisma Access infrastructure.
If you want to use dynamic routing to enable Prisma Access to dynamically discover routes to
resources on your remote networks and HQ/data center locations, specify the autonomous
system (AS) number. If you do not supply an AS number, the default AS number 65534 will be
used.
STEP 5 | If you have not yet completed the service setup configuration, enter the Internal Domain
List, Cortex Data Lake, and Advanced settings.
See Configure the Service Infrastructure for details.
STEP 6 | (Mobile User Deployments Only) Add IPv6 IP address pools for your Mobile Users—
GlobalProtect deployment.
A Mobile Users—GlobalProtect deployment requires IP address pools. Both IPv4 and IPv6 IP
address pools are required to enable IPv6 functionality. You apply IPv4 addresses at a regional
or Worldwide level; you apply IPv6 addresses at a Worldwide level. Specify a minimum /80
subnet.
Prisma Access subdivides the Worldwide IPv6 addresses using the following method:
• Prisma Access assigns each location (gateway) a pool from a /112 subnet. Because each
GlobalProtect connection uses one IP address from the pool, this allocation allows over
65,000 available IPv6 addresses to be assigned to users’ endpoints per location.
If you experience an auto-scale event (if a large number of users log in to a single Prisma
Access location), Prisma Access can add another location with another /112 subnet.
• When you enable a location to use IPv6, Prisma Access assigns an IPv6 address pool to the
region to which the location belongs, and divides up the pool between the total number of
regions that have IPv6 enabled.
1. Select Panorama > Cloud Services > Configuration > Mobile Users—GlobalProtect.
2. In the Onboarding section, select the portal Hostname or select Configure.
3. Select the IP Pools tab.
4. Enter an IP Pool IPv6.
• You must enter both IPv4 and IPv6 IP addresses for mobile users. Prisma Access
requires IPv4 and IPv6 addresses to support its internal infrastructure when using
Prisma Access Administrator’s Guide (Panorama Managed) 455 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 8 | Select Panorama > Cloud Services > Status > Network Details > Service Infrastructure and
make a note of the following IPv6 addresses:
• Captive Portal Redirect IP Addresses—Used with Authentication Portal-based User-ID
address mapping
• Tunnel Monitor IP Address—Used for Tunnel Monitoring
Because GlobalProtect mobile users require an IPv4 address for the VPN tunnels, loopback
addresses, whose IP addresses are taken from the Infrastructure Subnet, still use IPv4
addresses.
Prisma Access Administrator’s Guide (Panorama Managed) 456 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 2 | Configure IPv6 availability for the regions where you want to deploy IPv6.
1. In the IPv6 Availability tab, Enable IPv6 for the locations for which you want to enable
IPv6.
All locations are associated to a compute location. If locations in a compute location do
not have IPv6 enabled, leave that compute location deselected.
STEP 3 | (Optional) If your internal DNS servers use are reachable by IPv6 addresses, click the
Network Services tab, Add a rule or specify the default rule, and specify Custom DNS Server
IPv6 addresses for the Primary DNS and Secondary DNS server.
If you enter IPv6 addresses for DNS servers, you must also have IPv6 addresses in your mobile
user IP address pool.
You can enter any combination of IPv4 or IPv6 addresses for primary and secondary DNS
servers. If you enter an IPv6 address for the primary DNS server and an IPv4 address for the
secondary DNS server, and a DNS query is received from a compute location that does not
have IPv6 Availability enabled, Prisma Access uses the secondary DNS server because it uses
an IPv4 address.
IPv4 addresses use A records, while IPv6 addresses use AAAA records. Some DNS
servers can perform AAAA DNS lookups over IPv4 transport; therefore, you might not
need a server with an IPv6 IP address.
STEP 4 | (Optional) If you have not yet completed the your mobile users configuration, complete it
now. See Set Up GlobalProtect on Panorama Managed Prisma Access for details.
Prisma Access Administrator’s Guide (Panorama Managed) 457 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 2 | Add a new service connection or select an existing service connection to edit it.
Prisma Access Administrator’s Guide (Panorama Managed) 458 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
2. (BGP Routing Deployments Only) Specify the method to exchange IPv4 and IPv6 BGP
routes; then, enter an IPv6 Peer Address and Local Address.
• To use a single IPv4 BGP session to exchange both IPv4 and IPv6 BGP peering
information, select Exchange both IPv4 and IPv6 routes over IPv4 peering.
• To an IPv4 BGP session to exchange IPv4 BGP peering information and an IPv6
session to exchange IPv6 BGP peering information, select Exchange IPv4 routes over
IPv4 peering and IPv6 routes over IPv6 peering.
• To use a single IPv6 BGP session to exchange IPv6 BGP peering information, select
Exchange IPv6 routes over IPv6 peering.
3. If your secondary WAN uses a different peer or local address, deselect Same as Primary
WAN and enter the IPv6 Peer Address and Local Address for the secondary WAN.
Prisma Access Administrator’s Guide (Panorama Managed) 459 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 4 | If you have not yet completed the your service connection setup, complete it now. See
Create a Service Connection to Allow Access to Private Apps for details.
Prisma Access Administrator’s Guide (Panorama Managed) 460 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 6 | Select Panorama > Cloud Services > Status > Network Details > Service Connection and
make a note of the IPv6 User-ID Agent Address and EBGP Router addresses.
After you commit your changes, you will have an IPv6 User-ID Agent Address (used for User-
ID retrieval and distribution) and EBGP Router addresses for service connections.
Because the IPSec tunnel used for the service connection uses IPv4 addressing, the Service IP
Address is an IPv4 address.
STEP 7 | If you have not yet completed the your mobile users configuration, complete it now. See
Create a Service Connection to Allow Access to Private Apps for details.
STEP 2 | Select Panorama > Cloud Services > Configuration > Remote Networks.
STEP 3 | Add a new remote network connection or select an existing service connection to edit it.
Prisma Access Administrator’s Guide (Panorama Managed) 461 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
2. (BGP Routing Deployments Only) Specify the method to exchange IPv4 and IPv6 BGP
routes; then, enter an IPv6 Peer Address and Local Address.
• To use a single IPv4 BGP session to exchange both IPv4 and IPv6 BGP peering
information, select Exchange both IPv4 and IPv6 routes over IPv4 peering.
• To an IPv4 BGP session to exchange IPv4 BGP peering information and an IPv6
session to exchange IPv6 BGP peering information, select Exchange IPv4 routes over
IPv4 peering and IPv6 routes over IPv6 peering.
• To use a single IPv6 BGP session to exchange IPv6 BGP peering information, select
Exchange IPv6 routes over IPv6 peering.
3. If your secondary WAN uses a different peer or local address, deselect Same as Primary
WAN and enter the IPv6 Peer Address and Local Address for the secondary WAN.
Prisma Access Administrator’s Guide (Panorama Managed) 462 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 5 | (Optional) If your internal DNS servers use are reachable by IPv6 addresses, select Panorama
> Cloud Services > Configuration > Remote Network > Settings, click the gear icon to edit
Prisma Access Administrator’s Guide (Panorama Managed) 463 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
the settings, select the DNS Proxy tab, Add a rule or specify the default rule, and specify
Custom DNS Server IPv6 addresses for the Primary DNS and Secondary DNS server.
Prisma Access allows you to specify DNS servers to resolve both domains that are internal to
your organization and external domains. If you do not specify any settings, Prisma Access does
not proxy DNS requests for remote networks. You also need to select a Region. See Onboard
and Configure Remote Networks for more information.
You can enter any combination of IPv4 or IPv6 addresses for primary and secondary DNS
servers.
IPv4 addresses use A records, while IPv6 addresses use AAAA records. Some DNS
servers can perform AAAA DNS lookups over IPv4 transport; therefore, you might not
need a server with an IPv6 IP address.
STEP 6 | If you have not yet completed the your remote network connection setup, complete it now.
See Onboard and Configure Remote Networks for details.
STEP 8 | Select Panorama > Cloud Services > Status > Network Details > Remote Networks and
make a note of the EBGP Router addresses.
After you commit your changes, you will have an IPv6 EBGP Router addresses for service
connections.
Because the IPSec tunnel used for the remote network connection uses IPv4 addressing, the
Service IP Address stays as an IPv4 address.
Prisma Access Administrator’s Guide (Panorama Managed) 464 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
configuration of your DNS servers. The following table shows the supported DNS resolution
methods for internal and external domains and indicates when Prisma Access proxies the DNS
requests.
Internal DNS Resolution External DNS Resolution Prisma Access Proxies the
Method Method DNS Request (Yes/No)
No configuration No configuration No
Prisma Access Administrator’s Guide (Panorama Managed) 465 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The source IP address of the DNS request depends on whether or not Prisma Access proxies the
DNS request.
• When Prisma Access does not proxy the DNS requests, the source IP address of the DNS
request changes to the IP address of the device that requested the DNS lookup. This source IP
address allows you to enforce source IP address-based DNS policies or identify endpoints that
communicate with malicious domains. This behavior applies for both mobile users and remote
network deployments.
• When Prisma Access proxies the DNS requests, the source IP address of the DNS request
changes to the following addresses:
• Mobile User deployments—The source IP address of the DNS request is an IP address taken
from the mobile user IP address pool for internal requests and the mobile user location’s
gateway IP address for external requests.
• Remote Network deployments—The source IP address of the DNS request is the EBGP
Router Address for internal requests and the Service IP Address of the remote network
connection for external requests.
The following guidelines and restrictions apply to using DNS resolution with Prisma Access:
• The maximum number of concurrent pending TCP DNS requests ( Max Pending Requests) that
Prisma Access supports is 64.
• For UDP queries, the DNS proxy sends another request if it hasn’t received a response in 2
seconds, and retries a maximum of 5 times before trying the next DNS server.
• Prisma Access caches the DNS entries with a time-to-live (TTL) value of 300 seconds. EDNS
responses are also cached.
Prisma Access Administrator’s Guide (Panorama Managed) 466 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The following figure shows the DNS requests for internal domains being resolved by the DNS
server in the headquarters or data center location, while requests for external domains are
resolved by Prisma Access’ Cloud Default DNS server. In this case, Prisma Access proxies the
requests for the external request, and the source IP address is the mobile user location’s gateway
IP address (15.1.1.1 in this example), while the internal source IP remains as Mobile User 1’s
GlobalProtect client IP address.
The following figure shows the organization using a third-party or public DNS server accessible
through the internet for requests to external domains. Prisma Access proxies these requests as
well.
Prisma Access Administrator’s Guide (Panorama Managed) 467 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 468 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
If Prisma Access proxies the DNS request, the source IP addresses of the proxied DNS requests
changes to the EBGP Router Address for internal requests and the Service IP Address of the
remote network connection for external requests, as shown in the following figure.
When you configure the DNS address in your network to use for Prisma Access proxied
external requests, specify the Remote Network DNS Proxy IP Address ( Panorama >
Cloud Services > Status > Service Infrastructure > Remote Network DNS Proxy IP
Address). In the following example, you would specify 172.1.255.254 in your network for
the DNS server.
Prisma Access Administrator’s Guide (Panorama Managed) 469 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The RIB Out table, from Panorama > Cloud Services > Status > Network Details > Service
Connection > Show BGP Status (in the Branch AS and Router area), shows the mobile users
address pool divided into blocks of /24 subnets for BGP route advertisements. Note that the
entire /20 subnets are not advertised.
Prisma Access Administrator’s Guide (Panorama Managed) 470 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 471 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 472 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
If you use service connections to provide mobile users and users at remote sites access to internal
resources and apps in an HQ or data center, you can ensure more resilient access to those
resources by creating active and backup service connections in different cloud providers. You can
specify these active and backup service connections in the same location or at different locations
in different geographical regions, which allows you to access resources via service connections
even when a cloud provider or region becomes unavailable.
You specify active and backup service connections in a site. A site is a customer data center or
headquarters location (on-premises or in the public cloud) where one or more service connections
terminate. After you create service connections, you create a site, add service connections to that
site, and then specify the service connections you added as either active or backup.
If a cloud provider or regional outage causes an active service connection in a site to go down,
Prisma Access reroutes the traffic using these rules, which lets your mobile users continue to
access the resources in that HQ or data center:
• If there is a single active service connection in a site, Prisma Access selects the backup service
connection in that site to route the traffic.
• If there are multiple active service connections in a site, Prisma Access selects another of the
active service connections to route the traffic, and the backup service connection is only used
to route traffic when all active service connections go down.
To utilize a site that uses active and backup locations in the same country, you onboard service
connections using in-country Preferred and Alternate locations, then create a site and add those
in-country locations to the site.
Prisma Access also provides you with status messages regarding the service connections you have
onboarded in a site (for example, if all the service connections in a site are deployed in a single
region).
The following examples show how you can take advantage of creating sites and adding service
connections to it:
Prisma Access Administrator’s Guide (Panorama Managed) 473 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• Different Cloud Providers in the Same Geographical Region—If you are an organization
(such as a bank) that requires your data to be accessed in a specific country, you can select a
Preferred location from that country and an Alternate location from that same country. The
following example shows an organization in the UK that onboards their service connections
in the UK to follow data location regulations. In this case, the organization’s administrator
onboards two service connections in UK, UK-Active in the UK location and UK-Backup in the
UK PA-A location. The UK location is hosted by the preferred cloud provider (GCP) in the UK,
and the UK PA-A location is hosted by the alternate cloud provider (AWS) in that country. The
list of in-country locations shows the preferred and alternate cloud provider for a country.
The administrator then creates a site and designates UK-Active as the active location and UK-
Backup as the backup location in that site.
During normal operation, mobile users access internal resources at the HQ or data center using
the UK-Active service connection.
If a GCP outage affects the UK-Active service connection, Prisma Access fails over to the UK-
Backup service connection, which is hosted on AWS. In this way, Prisma Access allows mobile
Prisma Access Administrator’s Guide (Panorama Managed) 474 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
users access to the resources at the data center or HQ, even in the event of a cloud provider
outage. The following diagram shows the traffic flow.
Prisma Access Administrator’s Guide (Panorama Managed) 475 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
US-Backup in the US Northwest PA-A location) and created a site making US-Active the active
service connection in the site and US-Backup the backup.
Since you have onboarded service connections that are in different compute locations as
well as different cloud providers, you have configured a site that provides you with both
geographical and cloud provider redundancy.
If the US-Active location goes down (either because of a cloud provider or regional outage), the
service connection fails over to the US-Backup location, which uses a different cloud provider
Prisma Access Administrator’s Guide (Panorama Managed) 476 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
and compute location from the US-Active service connection, as shown in the following
diagram.
Prisma Access Administrator’s Guide (Panorama Managed) 477 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
as active effectively gives you three times the bandwidth to your internal resources when
compared to a single service connection.
If one of the active service connections goes down, the backup connection is not put into use;
instead, Prisma Access diverts the traffic to the remaining active service connections that are
up, as shown in the following diagram.
If all the active service connections go down, then the backup service connection is put into
use and made the active connection.
Prisma Access Administrator’s Guide (Panorama Managed) 478 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Use the following guidelines when configuring redundant cloud provider service connections:
• You can add service connections using either Preferred or Alternate locations in a site.
Palo Alto Networks highly recommends that you use the preferred cloud provider as the active
service connection in a site.
• All service connections in a site must point to the same resource in the same HQ or data
center location. You cannot have service connections in a site pointing to different resources in
different locations.
• You must select at least one active service connection in a site; however, you can also have
multiple active service connections in a single site. The following site configuration is valid:
• US Central (active)
• US Central PA-A (backup)
• US East (active)
• US East PA-A (backup)
• If you have multiple active service connections in a site and an active service connection goes
down, traffic is diverted to the other active service connection (that is, the backup service
connection is not utilized as long as one of the active service connections is up).
• Use the following guidelines for static and dynamic service connection routing:
• If you use static routing for service connections, make sure that the subnets you specify for
the service connections point to the same subnets.
For example, if you have a site that uses 192.168.41.0/24, 192.168.44.0/24, and
192.168.47.0/24 as the subnets for the active service connections, make sure that you
specify the same subnets for the backup service connections.
• If you use dynamic (BGP) routing for service connections, make sure that all service
connections advertise the same prefixes to the same data center or HQ.
• Prisma Access uses BGP Multi Exit Discriminator (MED) values to distinguish between active
and backup service connections in a site as shown in the following table. Note that the MED
Prisma Access Administrator’s Guide (Panorama Managed) 479 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
values for active service connections change depending on whether or not you have enabled a
secondary IPSec tunnel for the active service connection. Prisma Access advertises these MED
values to the CPE (BGP peer).
• You can add multiple sites in a single Prisma Access deployment, as shown in the following
diagram.
Prisma Access Administrator’s Guide (Panorama Managed) 480 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• You can still use a single, standalone service connection to access internal resources. You an
also mix standalone service connections with active and backup service connections, as shown
in the following diagram.
• Service Connection multi-cloud redundancy is not supported when using Hot Potato routing
for service connections.
• Do not use CLI to enable regional redundancy.
Configure and Activate Service Connection Cloud Provider Redundancy for Panorama
Managed Prisma Access
To configure multiple service connections for cloud providers, complete the following steps.
STEP 1 | (Existing Prisma Access Deployments Only) If you have upgraded your plugin to a version
that supports cloud provider redundancy, perform a Commit and Push operation after you
upgrade to the supported plugin.
Service connection multi-cloud redundancy is supported starting with Prisma Access 3.1
Innovation. After you upgrade the Cloud Services plugin, you must perform a Commit and
Push to have the cloud redundancy changes appear in the UI.
If you have a new deployment (not an upgrade), skip this step.
Prisma Access Administrator’s Guide (Panorama Managed) 481 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 2 | Create the service connections to be used as active and backup service connections in a site.
1. Select Panorama > Cloud Services > Configuration > Service Connection.
2. Add a service connection that you will designate as an active service connection in a site.
Select from either the list of Preferred or Alternate Locations.
3. Add a service connection that you will designate as a backup service connection in a site.
Prisma Access Administrator’s Guide (Panorama Managed) 482 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 3 | Create a site; then, designate the service connections you added as active or backup service
connections in the site.
1. In Manage Sites, Add a new site.
2. Add the service connections you onboarded.
3. Designate the service locations you added as active and backup in the site.
You can create multiple active and backup sites. Specify at least one site to be an active
site.
4. Click OK.
5. (Optional) Continue to add sites for your active and backup service connections, as
required.
Prisma Access Administrator’s Guide (Panorama Managed) 483 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 484 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
UK UK PA-A
Prisma Access Administrator’s Guide (Panorama Managed) 485 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 486 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
criteria including IP addresses, Custom URL categories, service type (HTTP or HTTPS), User-ID,
Dynamic Address Groups (DAGs) and IP-based External Dynamic Lists (EDLs).
There are two action types supported with traffic steering:
• Forward to the target—Use the criteria in traffic steering rules to forward internet-bound
traffic through a target you create that uses one or more service connections.
• Forward to the internet—Use the criteria in traffic steering rules to directly forward traffic
from its source (mobile user location or remote network connection) to the internet, without
being forwarded to a service connection.
If you forward to a target, you can choose to create two types of target groups: dedicated and
non-dedicated.
• A service connection that is used only for traffic steering-related traffic is a dedicated service
connection. To set a service connection to be used as a dedicated service connection, select
Dedicated for Traffic Steering Only when you Configure Traffic Steering in Prisma Access in
Panorama.
You might want to configure a dedicated service connection if you use a third-party security
stack that is outside of your organization’s internal network to process traffic before it is sent
to a public SaaS application or the internet. Because the security stack is not a part of your
organization’s network, you don’t want this service connection to process any internal network
traffic.
• A service connection that is used for traffic steering and for standard service connection-
related traffic (such as traffic going to an authentication server in the data center) is a non-
dedicated service connection.
Setting a service connection as a dedicated service connection causes the following changes to
your deployment:
• The zone for all service connections associated with this target changes from Trust to Untrust.
Check your zone mapping and Configure Zone Mapping and Security Policies for Traffic
Steering Dedicated Connections to make sure that your network reflects this change.
• Service connections that are configured as dedicated service connections do not participate in
BGP routing, either internally or externally.
• If your dedicated service connection uses BGP, the BGP status shows as Not Enabled
when you open the status page (Panorama > Cloud Service > Status > Monitor > Service
Connection), select a region, then select the Status tab. To check the BGP status of a service
connection, check the service connections configuration page (Panorama > Cloud Services >
Configuration > Service Connection).
• By default, the service connections apply source NAT to the forwarded traffic. The source IP
address is the User-ID Agent Address of the service connection (Panorama > Cloud Services >
Status > Network Details > Service Connection > User-ID Agent Address), which is taken from
the Infrastructure Subnet (Panorama > Cloud Services > Status > Network Details > Service
Infrastructure).
You can disable source NAT and use your organization’s source IP addresses for the dedicated
service connection; to do so, select Disable Source NAT for Dedicated SC when you Add a
target in the Target Service Connections for Traffic Steering area.
Prisma Access Administrator’s Guide (Panorama Managed) 487 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 488 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Do not use service connections that are Dedicated for Traffic Steering Only with default
routes; dedicated service connections do not participate in BGP routing, so they cannot
receive BGP advertisements from the HQ or data center.
To enable default routes, select Accept Default Route over Service Connections when you
configure traffic steering settings. After you configure this setting and commit and push your
changes, Prisma Access sends internet-bound traffic over the service connections.
Prisma Access Administrator’s Guide (Panorama Managed) 489 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
To allow Prisma Access to route Office 365 traffic directly to the internet, perform the following
actions:
• Create an EDL (Object > External Dynamic Lists) with IP addresses that match the Office 365
addresses.
• Create a Custom URL category (Objects > Custom Objects > URL Category) with URLs that
match Office 365 URL.
• create Configure Traffic Steering in Prisma Access and specify the EDL and URL category you
created as destination match criteria with an Action of Forward to the internet.
This configuration sends Office 365 traffic directly to the internet, while other internet-bound
traffic is sent to the data center for further processing before egressing to the internet.
Default Routes with Traffic Steering and Dedicated Service Connection Example
In this example, in addition to the previous configuration, you have a third-party internet security
service, and you want to send traffic from box.com to be processed by the security service before
egressing to the internet. You do not want to send any other internet-bound traffic to the security
service; for this reason, you create a dedicated service connection for the box.com traffic. After
your configuration is complete, Prisma Access sends *.box.com destination traffic to the stack.
Prisma Access Administrator’s Guide (Panorama Managed) 490 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
To enable this deployment, you perform the following actions in the Traffic Steering tab:
• Create a Target Service Connection group that assigns one or more service connections to
the target and select Dedicated for Traffic Steering Only, which makes the target service
connection or connections dedicated.
If you create a target with more than one service connection, Prisma Access chooses
the best service connection to forward the internet-bound traffic.
Prisma Access Administrator’s Guide (Panorama Managed) 491 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• Create a traffic steering rule that forwards traffic to the URL. The following screenshot shows
the traffic destination being assigned a custom URL category that contains the URL *.box.com.
• Create an Action in the traffic steering rule of Forward to the target and specify the target
group name you created (dedicated in this case).
Prisma Access Administrator’s Guide (Panorama Managed) 492 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• Create multiple rules with fewer matching criteria, instead of creating fewer rules with multiple
types of criteria. Creating simpler rules both speeds up rule creation and makes it easier to
modify a rule.
• Since you cannot move a rule up or down in a list after you create it, carefully plan your rule
order before you create the rules.
• Rules that specify Any source address and User, Any source destination and URL Category,
and Any service are not supported. Use more specific rules; for example, specify a rule with
Any source or destination traffic and a service of service-http and service-https.
• If you are going to specify rules for users in the Source User field, make sure that Prisma
Access can distinguish between users if the same username is shared between users who
authenticate locally and users who authenticate using LDAP by authenticating LDAP users in
the format of domain/username and authenticating local users in the format of username
(without the domain name).
• If an EDL (type IP List) is used in a Traffic Steering Rule, and the EDL source URL of the EDL is
updated to a URL that is not accessible, Prisma Access may continue to use the cached IP list
from the previous URL.
• Prisma Access bypasses Traffic Steering for rules with a service type of HTTP or HTTPS if you
use an application override policy for TCP ports 80 and 443.
In addition, traffic steering does not work for URLs from URL categories referenced in the
traffic steering rule if you have configured an application override policy for TCP ports 80 or
443.
• You can specify destination IP addresses and URL categories in the same rule. If you do, Prisma
Access uses a logical OR to process the destination criteria in the rule, but processes the URLs
and URL category traffic based on TCP ports 80 and 8080 for HTTP and TCP port 443 for
HTTPS.
For a rule with IP addresses and URL categories, traffic matches the rule if either the IP address
or the URL category matches, but processes the URL category traffic based on ports 80, 443,
and 8080 only. Palo Alto Networks does not recommend creating a rule of this type; instead,
create simpler rules.
For example, you want to enforce the following rules for your network traffic:
• You have an internal HTTP server with an IP address of 10.1.1.1 in the data center, and you
want to direct internal HTTP and HTTPS traffic to this server. The IP address of the server is
10.1.1.1.
Traffic to this server should not go to the internet and should be processed internally;
therefore, choose a non-dedicated target for this traffic, because this type of target processes
both internal and internet-bound traffic.
• You want office365.com traffic to be routed directly to the internet.
• You want traffic from *.example.com or any traffic defined in a custom URL category of
custom-social-networking to be routed to a dedicated connection.
• You want any other HTTP and HTTPS traffic to use the same non-dedicated service
connection target as that used for the internal HTTP server.
For this example, create the rules from the most specific to the least specific, as shown in the
following screenshot. Do not add the rule that allows all HTTP and HTTPS traffic first, or Prisma
Prisma Access Administrator’s Guide (Panorama Managed) 493 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Access would direct all HTTP and HTTPS traffic to the non-dedicated connection without
evaluating any of the other rules.
Configure Zone Mapping and Security Policies for Traffic Steering Dedicated
Connections
If you create a target that uses a dedicated service connection, the zone for the dedicated
service connection changes from Trust to Untrust (non-dedicated service connection targets
do not change their zones). Since you cannot create zones or configure zone mapping for
service connections, you make zone mapping and security policy changes for dedicated service
connections to the mobile users and device groups instead. Complete the following steps to
configure zone mapping for dedicated connections.
These steps show a sample configuration; you can tailor this example to suit your
deployment.
STEP 2 | Select the correct Template from the drop-down list (either Mobile_User_Template for
mobile users or Remote_Network_Template for remote networks).
If you have a mobile user and a remote network deployment, you need to perform these steps
twice; once in the Mobile_User_Template and once in the Remote_Network_Template.
STEP 3 | Add two zones for your trusted and untrusted zones.
This example creates two zones called Trust and Untrust.
Prisma Access Administrator’s Guide (Panorama Managed) 494 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
4. Add a default policy to use for Trust zone-to-Untrust zone traffic, using the same
parameters you used for the Trust-to-Trust policy.
When complete, you have two security policies, one for Trust-to-Trust traffic and one
for Trust-to-Untrust traffic.
Prisma Access Administrator’s Guide (Panorama Managed) 495 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 5 | Define Zone Mapping for the remote networks, mobile users, or both, as required for your
deployment.
1. Set the zone mapping for the remote networks, mobile users, or both.
• For mobile users, select Panorama > Cloud Services > Configuration > Mobile Users.
• For remote networks, select Panorama > Cloud Services > Configuration > Remote
Networks.
2. Click the gear icon next to Zone Mapping to edit the settings.
3. Set the Zone Mapping for your deployment, moving the zone for trusted traffic to the
Trusted Zones and the zone for untrusted traffic to the Untrusted Zones; then, click OK.
STEP 2 | Select Panorama > Cloud Services > Configuration > Traffic Steering.
STEP 3 | (Optional, mobile user deployments only) Allow Prisma Access to accept and install the
default route advertised over one or more service connections from the CPE by clicking
the gear icon to open the Settings and selecting Accept Default Route over Service
Connections.
Default routes have guidelines that you must follow when using them; for example, default
routes are supported for mobile user deployments only and have no effect on remote network
Prisma Access Administrator’s Guide (Panorama Managed) 496 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
deployments. Be sure to review these guidelines before implementing default routes with
traffic steering.
STEP 4 | (Optional) Create a target group and assign a service connection to it.
1. In the Target Service Connections for Traffic Steering area, Add a group and give it a
Group Name.
2. Add a Target for the traffic, specifying the Service Connection to use with the target;
then, click OK.
Palo Alto Networks does not recommend using multiple service connections (whether
dedicated or non-dedicated) in a target service connection group that is referenced in a
traffic steering rule. In addition, a given service connection can only exist in one target
and you cannot add a single service connection to two different targets.
3. Choose whether to make the service connections associated with this target a dedicated
service connection.
• You can use a dedicated service connection to steer traffic to a third-party security
stack or cloud that is not on your premises and does not need to participate in
routing. To set a service connection to be used as a dedicated service connection,
select Dedicated for Traffic Steering Only.
• Deselect Dedicated for Traffic Steering Only if you will send both normal service
connection-related and traffic steering traffic through the service connection; with
this choice, the zone for the service connection remains as Trust.
4. Choose whether to enable or disable source NAT.
To disable source NAT for Dedicated service connections, select Disable Source NAT for
Dedicated SC. Source NAT is enabled by default (the check box is deselected).
If you disable source NAT, Prisma Access uses your organization’s source IP addresses
for the dedicated service connection. If you enable source NAT, Prisma Access uses the
EBGP Router address of the service connection (Panorama > Cloud Services > Status >
Prisma Access Administrator’s Guide (Panorama Managed) 497 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Network Details > Service Connection > EBGP Router) as the source IP address, even
after the traffic egresses from the dedicated service connection.
Prisma Access Administrator’s Guide (Panorama Managed) 498 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 5 | Create rules for the target you created and apply them to the target.
1. In the Traffic Steering Rules area, Add a traffic steering rule.
2. in the General tab, Name the traffic steering rule.
3. In the Source tab, specify rules for source traffic.
• In the Source Address field, specify one or more of the following objects, or select
Any to have traffic from any source go to this target:
• An IP address
• An address object that you created in Panorama (Objects > Addresses)
• A Dynamic Address Group (DAG)
• An External Dynamic List (EDL) using IP addresses or URLs
• In the Source User field, specify rules for source user traffic. You can specify the
following user information:
• Users
Enter users in either the domain/user or the user@domain format.
• User groups
Use full distinguished names (DNs) when entering user groups.
• Users configured on Panorama (Device > Local User Database > Users)
• User groups configured on Panorama (Device > Local User Database > User
Groups)
If you use address objects, DAGs, EDLs, users, or user groups, specify them as Shared to
share them with all device groups in Prisma Access. In addition, do not enter 0.0.0.0/0 in
address objects, DAGs, or EDLs; instead, enter 0.0.0.0/0 directly in the rule.
Prisma Access automatically populates users from the mobile users device group
only.
4. In the Destination tab, specify the following values:
• In the Destination area, specify one of the following criteria, or select Any to have
traffic processed by the rules in the URL Category field:
• An IP address or prefix
• An address object that you created in Panorama (Objects > Addresses)
• A Dynamic Address Group (DAG)
• An IP address-based External Dynamic List (EDL)
Leave Any selected to pass all traffic to be processed by the rules in the URL
Category area. If you specify rules in the Destination, and URL Category areas,
Prisma Access processes the rules in the Destination category first.
Prisma Access Administrator’s Guide (Panorama Managed) 499 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• In the URL Category field, enter a custom URL category (Objects > Custom Objects >
URL Category) When you create a custom URL category, enter URLs in all lower case.
Traffic steering supports custom URL and predefined URL categories.
You can use wildcards with the URLs in URL categories. The following wildcard
formats are supported:
• *.example.com
• *.fqdn.example.com
The following formats are not supported:
• *
• *.*
• *example.com
• example.com/ (trailing slashes in URLs are not supported in URL categories that
are used with Traffic Steering)
• example.com/path (only domain names are supported)
• *fqdn.example.com
• fqdn.example.*
URLs in custom URL categories use the same URL pattern matching as that used by
next-generation firewalls.
Use the following guidelines when configuring destination options:
• If you specify a URL category, Prisma Access only matches HTTP and HTTPS traffic,
even when service is set to Any.
• Do not create a custom URL category with a type of Category Match.
• Do not create a custom URL category with the name Custom_URL_Category_TFR
because, for deployments that are migrated from Prisma Access 1.7 to 2.0, URLs
entered in the URL area from 1.7 are moved to a custom URL category named
Prisma Access Administrator’s Guide (Panorama Managed) 500 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 501 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 7 | Commit and push your changes to make them active in Prisma Access.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope.
2. Select Prisma Access, then select Service Setup, Remote Networks, and Mobile Users.
Prisma Access uses BGP for dynamic routing, and uses BGP path selection to install routes in the
route table. When Prisma Access routes traffic to your headquarters or data center using service
connections, it uses routing methods that direct that traffic effectively. Prisma Access uses a
default routing model that was designed to fit the majority of network deployments; however,
not all organization’s networks are the same. To fit a wider range of deployments, Prisma Access
allows you choose another mode for service connection routing.
Changing the Prisma Access service connection routing method requires a thorough
understanding of your organization’s topology and routing devices, along with an
understanding of how Prisma Access works as described in this section. Read this section
carefully before changing the routing method from the default setting.
Prisma Access Administrator’s Guide (Panorama Managed) 502 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access supports static routing and dynamic routing using BGP for service connections
and remote network connections. When you use BGP routing for your connections, your
organization’s network learns BGP information from Prisma Access.
Before you decide which service connection routing to use, you should understand how Prisma
Access routes traffic between mobile users, remote networks, and service connections, because
the routing used by mobile user traffic and remote network traffic between service connections is
different.
Mobile User-service connection routing—The mobile user connection forms an IPSec tunnel
with the nearest service connection. Prisma Access uses iBGP for internal routing and eBGP to
peer with the customer premises equipment at the data center. The following diagram shows
mobile users in Regions 1 and 2 being routed to the respective service connections in that region.
Mobile users in Region 1 are accessing applications A and B located at Data Center 1. If your
organization’s network uses BGP routing for their service connections and a service connection
experiences an ISP failure at Data Center 1, Prisma Access detects the failure and routes the
traffic for applications A and B to Data Center 2 after BGP convergence, providing redundancy to
your network’s data centers.
Prisma Access uses the following timing with BGP when it detects a failure: If you
configure BGP routing and have enabled tunnel monitoring, the shortest default hold
time to determine that a security parameter index (SPI) is failing is the tunnel monitor,
which removes all routes to a peer when it detects a tunnel failure for 15 consecutive
seconds. In this way, the tunnel monitor determines the behavior of the BGP routes. If you
do not configure tunnel monitoring, the hold timer determines the amount of time that the
tunnel is down before removing the route. Prisma Access uses the default BGP HoldTime
value of 90 seconds as defined by RFC 4271, which is the maximum wait time before
Prisma Access removes a route for an inactive SPI. If the peer BGP device has a shorter
configured hold time, the BGP hold timer uses the lower value. When the secondary tunnel
is successfully installed, the secondary route takes precedence until the primary tunnel
comes back up. If the primary and secondary are both up, the primary route takes priority.
Remote Network-service connection routing—Prisma Access creates a full mesh network with
other remote networks and service connections. As with mobile users, Prisma Access uses iBGP
for its internal routing and eBGP to peer with customer premises equipment to exchange routes.
Prisma Access Administrator’s Guide (Panorama Managed) 503 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
If a user in Branch 1 is accessing application A from Data Center 1 in your organization’s data
center and the link between Branch 1 and Data Center 1 goes down, Prisma Access routes the
traffic for application A to Data Center 2 after BGP convergence.
After you understand Prisma Access service connection routing and how it relates to your
network, you can choose one of the following routing modes for service connections:
• Default routing—This is the default routing model that Prisma Access uses.
Use this routing mode if you want Prisma Access to use BGP best path-selection mechanisms
without adjusting any of the BGP attributes. In this mode, Prisma Access will honor any
attribute advertised by the customer premises equipment (CPE).
• Hot Potato routing—Prisma Access hands off the traffic as quickly as it can to your
organization’s network.
Use this routing method if you want your organization’s network to perform the majority of
routing decisions.
Prisma Access Administrator’s Guide (Panorama Managed) 504 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Australia & Japan region, 192.168.72.0/20 for the Africa, Europe & Middle East region, and
192.168.48.0/20 for the North America & South America region. Prisma Access divides
these routes into block of /24 and advertises them with an AS number of 65534, but also
appends the BGP community values to the advertisements (Z for Asia, Y for EU, and X for US).
Those routes are shown in the middle of the figure. In this way, you can differentiate service
connections in your network, even though Prisma Access assigns the same AS number to them.
You can view the community string by selecting Panorama > Cloud Services > Status > Network
Details > Service Connection > Show BGP Status and find the Community field in the Peer tab.
The following figure shows a more common network with a full-mesh eBGP backbone. The figure
shows the routes that Prisma Access has learned from your organization’s network on the top
right. Note the extra routes that Prisma Access has learned through the Prisma Access backbone
(iBGP) and your organization’s backbone (eBGP).
For traffic between mobile users in the North America & South America region (US in the
diagram) and the data center in your organization’s Africa, Europe & Middle East region (EU in the
diagram), Prisma Access chooses the path through the EU service connection because it prefers
routes with a shorter AS-PATH.
Prisma Access Administrator’s Guide (Panorama Managed) 505 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
In deployments with a full-mesh eBGP backbone, asymmetry can arise when Prisma Access
cannot reach a particular data center due to an ISP/CPE failure at the customer’s data center.
The following figure shows what could happen when the link to the EU service connection goes
down. Your network detects the link failure and builds a new route table for AS 200. Traffic from
the US service connection to AS 200 uses the path through AS 100 because the eBGP route
for your backbone between AS 200 and AS 100 is preferred to the iBGP route between service
connections EU and US. However, return traffic is not guaranteed through the same path because
the on-premises CPE can choose either path (shown in red) to return the traffic.
The previous examples show a network whose routes have not been aggregated (that is, you
have not performed route summarization before you send the BGP route advertisements to
Prisma Access). The following example shows a network that summarizes its routes to 10.0.0.0/8
before sending to Prisma Access. If you select default routing, this configuration can lead to
asymmetric routing issues, because Prisma Access cannot determine the correct return path from
the summarized routes.
If your Prisma Access deployment has Remote Networks, Palo Alto Networks does not
recommend the use of route summarization on Service Connections. Route summarization
on service connections is for Mobile Users deployments only.
Prisma Access Administrator’s Guide (Panorama Managed) 506 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
If you use route aggregation for mobile users, we strongly recommend that you enable hot
potato routing instead of default routing, where Prisma Access hands off the traffic as quickly as
possible to your organization’s network; in addition, we recommend that you select a Backup SC
as described in the following section for each service connection to have a deterministic routing
behavior.
Prisma Access Administrator’s Guide (Panorama Managed) 507 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
In hot potato routing mode, Prisma Access allows you to specify a backup service connection
during onboarding. Specifying a Backup SC informs Prisma Access to use that service connection
as the backup when a service connection link fails.
The following figure shows a hot potato routing configuration for traffic between the US service
connection and AS 200, with the EU service connection configured as the Backup SC of the
US connection. Using hot potato routing, Prisma Access sends the traffic from its closest exit
path through the US service connection. The return traffic takes the same path through AS100
because this path has a shorter AS-PATH to the mobile user pool in the US location. Prisma
Access prepends the AS-PATH to its prefix advertisements depending on whether the tunnel is a
primary tunnel, a backup tunnel, or not used for either primary or backup.
Because you have set up a backup service connection, if the link to the US service connection
goes down, hot potato routing sends the traffic out using its shortest route through the EU
service connection. This routing scenario also applies to networks that use route aggregation.
Prisma Access Administrator’s Guide (Panorama Managed) 508 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
You can also use backup service connections for multiple service connections in a single region.
The following figure shows a Prisma Access deployment with two service connections in the
North America region. In this case, you specify a Backup SC of US-E for the US-W service
connection, and vice versa, to ensure symmetric routing.
To configure these routing preferences, you must use BGP routing and not static routing
for your service connections.
STEP 2 | (Optional) Select the routing to use for your service connections.
1. From the Panorama that manages Prisma Access, go to Panorama > Cloud Services >
Configuration > Service Setup and click the gear to edit the Settings.
2. In the Advanced settings, select your Routing Preference (either Default or Hot Potato).
Prisma Access Administrator’s Guide (Panorama Managed) 509 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 3 | (Optional, Hot Potato Routing Deployments Only) To specify a preferred service connection
to use if a link fails, configure a Backup SC when you configure a service connection.
You can select any service connection that you have already added. Prisma Access uses
the Backup SC you select as the preferred service connection in the event of a link failure.
Selecting a backup service connection can prevent asymmetric routing issues if you have
onboarded more than two service connections. This choice is available in Hot potato routing
mode only.
1. Go to Panorama > Cloud Service > Configuration > Service Connection
2. Select the service connection to configure, or Add a new one.
3. Select a service connection to use as the preferred backup (Backup SC).
STEP 4 | Commit your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit and Push.
2. Edit Selections and, in the Prisma Access tab, make sure that Service Setup is selected in
the Push Scope, then click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 510 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 5 | Verify that your service connection is up by selectin Panorama > Cloud Services > Status >
Status and checking that its Status is OK.
The Deployment Status area allows you to view the progress of onboarding and deployment
jobs before they complete, as well as see more information about the status of completed jobs.
If the status is not OK, hover over the Status icon to view any errors.
To see a graphical representation of the service connection along with status details, select
Service Connection on the Monitor tab.
Prisma Access Administrator’s Guide (Panorama Managed) 511 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Click the tabs below the map to see additional information about the service connections.
Status tab:
• Location—The location where your service connection is deployed.
• Remote Peer—The corporate location to which this s service infrastructure is setting up an
IPSec tunnel.
• Allocated Bandwidth—The number of service connections you have allocated multiplied by
300 Mbps.
This number does not reflect the available service connection bandwidth.
Prisma Access Administrator’s Guide (Panorama Managed) 512 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
information. After committing and pushing the configuration to Prisma Access, the Config
Status changes to In sync.
• BGP Status—Displays information about the BGP state between the firewall or router at
your corporate/headquarters location and Prisma Access where the service connection is
established. Although you might temporarily see the status pass through the various BGP
Prisma Access Administrator’s Guide (Panorama Managed) 513 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
states (Idle, Active, Open send, Open pend, Open confirm, most commonly, the BGP status
shows:
• Connect—The router at your data center/headquarters is trying to establish the BGP
peer relationship with Prisma Access.
• Established—The BGP peer relationship has been established.
This field will also show if the BGP connection is in an error state:
• Warning—There has not been a BGP status update in more than eight minutes. This may
indicate an outage on the firewall.
• Error—The BGP status is unknown.
• Tunnel Status—The operational status of the connection between Prisma Access and your
service connection.
Statistics tab:
• Location—The location where your service connection is deployed.
• Remote Peer—The corporate location to which the service connection is setting up an IPSec
tunnel.
• Ingress Bandwidth (Mbps)—The bandwidth from the HQ/data center location to Prisma
Access.
• Ingress Peak Bandwidth (Mbps)—The peak load from the HQ/data center location into the
cloud service.
• Egress Bandwidth (Mbps)—The bandwidth from Prisma Access into the HQ/data center
location.
• Egress Peak Bandwidth (Mbps)—The peak load from Prisma Access into the HQ/data
center location.
• QoS—Select this button to display a graphic chart that shows a real-time and historical QoS
statistics, including the number of dropped packets per class. This chart displays only for
service connections or remote network connections that have QoS enabled.
If you configured BGP, you can check its status by selecting Panorama > Cloud Services >
Status > Network Details > Service Connection > Show BGP Status.
The BGP Status dialog displays. This table provides you with the following information:
• Peer—Routing information for the BGP peer, including status, total number of routes,
configuration, and runtime statistics and counters. The total number of routes display in the
bgpAfiIpv4-unicast Counters area, in the Incoming Total and Outgoing Total fields.
Prisma Access Administrator’s Guide (Panorama Managed) 514 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• Local RIB—BGP routes that Prisma Access uses locally. Prisma Access selects this
information from the BGP RIB-In table, which stores the information sent by neighboring
networking devices, applies local BGP import policies and routing decisions, and stores the
Local RIB information in the Routing Information Base (RIB).
Note that only the first 256 entries are shown. To view additional entries, enter a subnet or
IP address in the Filter field and click Apply Filter to view a subset of the routing entries up
to a maximum of 256.
• RIB Out—Routing information that Prisma Access advertises to its peers through BGP
update messages.
Prisma Access Administrator’s Guide (Panorama Managed) 515 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Each service connection is active and has its own Service IP Address; you use that address
to terminate the IPSec tunnel for each service connection. Prisma Access does not limit the
maximum number of service connections you can onboard to a single headquarters or data center
remote network location.
While each service connection provides approximately 1 Gbps of throughput, the actual
throughput is dependent on several factors, including:
• Traffic mix (for example, frame size)
• Latency and packet loss between the service connection and the headquarters location
or data center
• Service provider performance limits
• Customer termination device performance limits
• Other customer data center traffic
Prisma Access Administrator’s Guide (Panorama Managed) 516 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
This example, and the steps in this section, use a next-generation firewall to terminate the service
connections on the CPE; however, you can use any CPE that supports symmetric routing and PBF
or policy-based routing as the CPE.
Use these steps for guidance; each use case could require additional design and planning
that are beyond the scope of this document.
STEP 1 | Before you deploy multiple service connections from a single Prisma Access location to a
single site, make sure that your network has the following prerequisites:
• You must divide the subnets in the headquarters or data center location and advertise a
unique subnet on each service connection.
• Your customer premises equipment (CPE) must support, and you must be able to configure,
the following networking features:
• Policy-based forwarding (PBF) or policy-based routing—Your CPE must be able to
selectively pick a specific path for a specific local source IP address and subnet.
• Symmetric return—You must be able to configure your CPE to ensure symmetric traffic
flows to and from a specific IP address and subnet, and configure symmetric return for
failover tunnels if one of the tunnels goes down.
STEP 2 | Create the service connections and establish connectivity for the IPSec tunnels used for the
service connections.
1. On the Panorama that manages Prisma Access, Create a service connection, including
creating a new IPSec Tunnel configuration, IKE Gateway, IPSec Crypto Profile, and
Tunnel Monitoring settings.
Prisma Access offers predefined IPSec templates that you can use to simplify
the IPSec tunnel creation process.
2. Find the IP address to use as the remote side of the IPSec tunnel from your CPE to
Prisma Access by selecting Panorama > Cloud Services > Status > Network Details,
Prisma Access Administrator’s Guide (Panorama Managed) 517 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
clicking the Service Connection radio button, and noting the Service IP Address for the
site.
Prisma Access Administrator’s Guide (Panorama Managed) 518 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
for the service connections (10.0.2.12 for Service Connection 1 and 10.0.2.6 for Service
Connection 2 in this example).
• For the Local Address, you can specify the loopback address of the CPE (192.168.177.20 in
this example).
STEP 4 | Create a summarized subnet for the IP addresses used for both tunnels.
Providing a summarized subnet guarantees redundancy. When both tunnels are up, the traffic
uses the most specific routes to reach their destination; for example, 192.168.171.0/24
uses tunnel.1 to reach its destination. Adding a summarized subnet that covers all advertised
subnets (192.168.168.0/21 in this example) ensures that traffic from 192.168.171.0/24 is
Prisma Access Administrator’s Guide (Panorama Managed) 519 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
reachable from tunnel.2 if tunnel.1 goes down and traffic from 192.168.172.0/24 is reachable
from tunnel.1 if tunnel.2 goes down.
If you are using a next-generation firewall as the CPE, complete the following steps.
1. Continue to modify the virtual router profile and Add route aggregation parameters
(Network > Virtual Routers > BGP > Aggregate).
2. Enter summary subnets for the subnets you are advertising for the service connections.
In this example, enter a Prefix of 192.168.168.0/21, which summarizes the two data
center subnets.
3. Enter Export settings to ensure that the tunnels advertise the correct subnets.
In this example, you specify an Action of deny and allow for the subnets so that the
first subnet (192.168.171.0/24) is reachable from tunnel.1 and the second subnet
(192.168.172.0/24) is reachable from tunnel.2.
Prisma Access Administrator’s Guide (Panorama Managed) 520 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 5 | (Deployments with more than two service connections only) If you require more than
two service connections to connect the users to private resources for more than 2 Gbps
bandwidth, add AS-PATH prepends for the exported routes so that the service connections
use symmetric routing to and from the data center in the event of a failover. See Configure
More than Two Service Connections to a Headquarters or Data Center Location for details.
STEP 6 | To ensure symmetric return (to make sure that traffic from 192.168.171.0/24 always uses
tunnel.1 and traffic from 192.168.172.0 always uses tunnel.2), enter PBF or policy-based
routing rules.
By default, BGP installs routes in the routing table for all different destinations regardless of
the preferred tunnel. The following screenshot shows that BGP advertises all destinations from
Prisma Access Administrator’s Guide (Panorama Managed) 521 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
the 192.168.168.0/21 subnet for tunnel.2, which might cause asymmetric routing for traffic
from 192.168.171.0/24.
To ensure symmetric routing, configure a set of PBF or route-based forwarding rules. If you
are using a next-generation firewall as the CPE, complete the following steps.
1. Select Policies > Policy Based Forwarding and Add a PBF policy rule.
2. Select Source and Add a Source Address to use for the PBF.
In this case, you want to create a PBF for tunnel.1, so you enter the 192.168.171.0/24
subnet.
Prisma Access Administrator’s Guide (Panorama Managed) 522 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
4. Select Forwarding and specify the following parameters; then, click OK:
• Select an Action of Forward.
• Select an Egress Interface of the tunnel to which you want to forward the IP subnet
(tunnel.1 in this case).
• Select Monitor and select the following monitoring profiles:
• Select a Profile of default.
• Select Disable this rule if nexthop/monitor ip is unreachable.
• Specify an IP Address of the service connection’s EBGP Router address (Panorama
> Cloud Services > Status > Network Details > Service Connection > EBGP
Router).
Enabling monitoring and selecting the EBGP router address of the service connection
ensures that, if tunnel.1 goes down, the firewall disables the PBF policy and routes
the traffic on the tunnel that is still up (tunnel.2).
5. Repeat Step 6, substituting the EBGP Router address of Service Connection 1 with
the EBGP Router address of Service Connection 2 and the subnet of tunnel.1 with the
subnet of tunnel.2.
When complete, you have two PBF policies, one for tunnel.1 and one for tunnel.2.
Prisma Access Administrator’s Guide (Panorama Managed) 523 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 7 | Select Network > Virtual Routers > Static Routes and assign the EBGP Router address of
Service Connection 1 to the Interface of tunnel.1; then, assign the EBGP Router address of
Service Connection 2 to the Interface of tunnel.2
Entering specific static routes for each of the router BGP addresses ensures that tunnel
monitoring functions correctly, because the EBGP Router IP address of Service Connection
1 is reachable only by tunnel.1 and the EBGP Router IP address of Service Connection 2 is
reachable only by tunnel.2.
Prisma Access Administrator’s Guide (Panorama Managed) 524 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
If Tunnel 2 goes down, the more specific route to the resource in the 192.168.172.0/24
subnet is not available, so the service connection closest to the user uses the summarized
192.168.168.0/21 subnet. You have configured only one AS-PATH prepend for Service
Connection 1; therefore, Prisma Access chooses Tunnel 1 as the failover path because it has
fewer AS-PATH prepends.
To add prepends to routes if you are using a next-generation firewall as the CPE, complete the
following task.
STEP 1 | Select the virtual router BGP export profiles (Network > Virtual Routers > BGP > Export).
STEP 2 | Modify the export rule you created when you configured the service connections that has an
Action of Allow.
Prisma Access Administrator’s Guide (Panorama Managed) 525 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 3 | In the AS Path area, add a Prepend, then enter the number of AS-PATH prepends to add (2
in this example).
STEP 4 | Repeat Steps 2 and 3 for each export rule that has an Action of Allow, adding AS-PATH
prepends to match the failover scenarios you have planned for your deployment.
In the examples used in this section, you add an AS-PATH prepend of 1 for the tunnel to the
data center location for Service Connection 1 (tunnel.1), an AS-PATH prepend of 2 for the
tunnel used for Service Connection 2 (tunnel.2), and an AS-PATH prepend of 3 for the tunnel
used for Service Connection 3 (tunnel.3).
When complete, this example uses the following tunnels in the even of a failover:
• If tunnel.2 or tunnel.3 goes down, the traffic for the corresponding subnet fails over to
tunnel.1, which has the shortest advertised AS-PATH.
• If tunnel.1 goes down, the traffic for its subnet (192.168.171.0/24) fails over to tunnel.2,
which has the shortest advertised AS-PATH.
STEP 5 | Add backup PBF or policy-based routing policies to ensure symmetric return traffic in the
event of a tunnel failure.
While the AS-PATH prepends ensure that the traffic from Prisma Access to the data center
uses a specific tunnel in the event of a failover, you must also ensure a symmetric return path
for the traffic from the data center to Prisma Access. To ensure symmetric return, use PBF
or policy-based routing policies that mirror the failover scenarios you created for traffic from
Prisma Access to the data center.
In this example, for tunnel.1 traffic that has a source IP of 192.168.171.0/24, you create a
backup PBF Policy that forces return traffic to use tunnel.2 in the event of a failover. The first
PBF rule becomes disabled if the tunnel monitor IP address is not reachable; when this failover
occurs, the CPE (a next-generation firewall in this example) evaluates the next rule in the list.
You then add more PBF rules to match the failover scenarios you created for traffic from
Prisma Access to the data center.
Prisma Access Administrator’s Guide (Panorama Managed) 526 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 527 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Legacy, <auth profile Cloud, <auth profile User logon (always-on, on-
selection> AND Client selection> AND Client demand)
Certificate Certificate
Pre-logon (always-on, on-
Note: Certificate profile must Note: Certificate profile must demand)
be the same. be the same.
Legacy, <auth profile Cloud, <auth profile User logon (always-on, on-
selection> OR Client selection> OR Client demand)
Certificate Certificate
Pre-logon (always-on, on-
Multiple portal configurations Multiple portal configurations demand), if certificate
don't support clients using don't support clients using
only client certificate for only client certificate for
authentication authentication
When configuring multiple GlobalProtect portals with Traffic Steering, don't configure
Accept Default Routes over Service Connections (Panorama > Cloud Services >
Configuration > Traffic Steering > Settings > Accept Default Route over Service
Connection); if you do, mobile users can't connect to the secondary portal.
STEP 1 | Contact your Palo Alto Networks account team to activate this functionality.
Prisma Access Administrator’s Guide (Panorama Managed) 528 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 2 | Configure a mobile user and the authentication method for it.
STEP 3 | Select Cloud Services > Configuration > Mobile Users—GlobalProtect > Settings >
Advanced.
The new portal appears for the 8443 port for the same tenant. This portal inherits the
configuration settings from the original port, which is port 443.
Prisma Access Administrator’s Guide (Panorama Managed) 529 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
This feature enables the authentication override settings to generate and accept cookie for
both portals in the tunnel settings.
Prisma Access Administrator’s Guide (Panorama Managed) 530 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 6 | Commit all your changes to Panorama and push the configuration changes to Prisma Access.
1. Click Commit > Commit and Push.
2. Edit Selections and, in the Prisma Access tab, make sure that Mobile Users is selected in
the Push Scope, then click OK.
STEP 7 | Add the portals manually or using endpoint management software in the GlobalProtect app.
Prisma Access Administrator’s Guide (Panorama Managed) 531 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 8 | Verify if you can connect to both portals with different authentication profiles for the
gateway.
1. Log in to your Windows machine.
2. Connect to the portals in your GlobalProtect app.
When you change the connection between portals of different authentication methods,
authenticate the user login.
If the authentication cookie expires when you connect to the 8443 portal and
switch to the manual gateway, GlobalProtect connects to the Best Available
Gateway.
If your GlobalProtect app uses cached portal configurations, fall back to portal
does not work.
3. View logs for both portals in Monitor > Logs > GlobalProtect to see the portal and
authentication information.
If you're using SAML-based authentication for the secondary portal, enter the values as
follows while integrating:
• Single sign on URL: Enter https://Portal-FQDN:443/SAML20/SP/ACS
Portal-FQDN is the FQDN for the Prisma Access portal
Use portal 443 even if you have configured the secondary portal (8443).
• Audience URI (SP Entity ID): Enter https://Portal-FQDN:443/SAML20/SP
Prisma Access Administrator’s Guide (Panorama Managed) 532 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
When a mobile user connects remotely to Prisma Access using GlobalProtect, the DNS Servers
in your enterprise are not updated with the GlobalProtect gateway-assigned IP address. Before
enabling Dynamic DNS (DDNS), there is no mapping of tunnel IP addresses with the endpoint
name, which are logged as address and pointer (A and PTR) records. Hence, your IT administrator
or user management software cannot map the remote endpoint name to the IP address.
After you enable the DDNS feature on Prisma Access, Prisma Access Cloud Services plugin checks
GlobalProtect events in Cortex Data Lake every 15 minutes to capture endpoint hostname,
domain name and tunnel IP address. It dynamically creates A and PTR records in the DNS server
using NSUPDATE.
• No Commit is required after you change the time interval using the command.
• These numbers are from a controlled environment and real-world operating
conditions can affect these numbers.
Prisma Access Administrator’s Guide (Panorama Managed) 533 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
5. After receiving the updates from Cortex Data Lake, the Cloud Services plugin packages A and
PTR records as NSUPDATE, and updates the primary DNS server every 15 minutes.
If you changed the time interval to five minutes using the debug plugins
cloud_services set-gp-ddns-interval command, the plugin updates the DNS server
every five minutes.
If the plugin is unable to update the DNS server through NSUPDATE, the plugin retries the
update operation a maximum of five times. If the updates were not successful, the plugin
retries the update operation every 15 minutes, or every five minutes if you changed the
interval to five minutes, for a maximum of four times. Therefore, the plugin tries to update
the events that are logged for a maximum of one hour (if you use a 15-minute interval) or 20
minutes (if you use a five-minute interval), after which it starts afresh.
6. After the A and PTR records of GlobalProtect mobile users are available in the DNS server, an
IT administrator or an enterprise software uses these records through a DNS or RDNS lookup
and resolves the endpoint name or IP address.
7. The IT administrator or the endpoint management software uses this information to manage
the endpoint or push software updates.
The following figure illustrates this workflow.
To view the connection failure logs, select Dashboard > System Logs or Monitor > Logs >
System for Mobile_User_Device_Group.
Prisma Access Administrator’s Guide (Panorama Managed) 534 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• Update your GlobalProtect client to the following GlobalProtect app versions based on your
OS:
• Windows: 5.2.11 or later
• Mac: 5.2.11 or later
• Linux: 5.3.3 or later
• Enable Cortex Data Lake if you use an on-premises gateway other than Prisma Access.
• An Infoblox DNS server with a minimum version of 8.6.1 or later that supports DDNS updates
through NSUPDATE is required.
• Multitenant Prisma Access deployments do not support DDNS.
• Save the authentication key from your DNS server in base64 format with a file extension
of .key. You can upload the key only in this format in Prisma Access.
• Enable NTP on your DNS server and ensure that it is same as that of Prisma Access.
• Create zones in Infoblox for reverse PTR and forward A addresses.
Prisma Access Administrator’s Guide (Panorama Managed) 535 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
5. Copy the key data to a file in the following format and save the file with .key extension.
key "ddns-gp" {
algorithm hmac-sha256;
secret "wCJKVYUtQt644eVOWnowgw==";
};
You upload this key to Prisma Access Cloud Services plugin in a later step.
Prisma Access Administrator’s Guide (Panorama Managed) 536 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 2 | In your Prisma Access deployment, specify your DNS server as the primary DNS server.
1. Select Panorama > Setup > Services.
2. Edit the settings and update the primary DNS server details.
Prisma Access Administrator’s Guide (Panorama Managed) 537 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
4. Upload the DDNS authentication key that you created in Step 1 from your DNS server.
Prisma Access Administrator’s Guide (Panorama Managed) 538 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Check the gp_ddns_support.log command in Panorama CLI to view other DDNS logs.
A service connection (Service Connection 1 in this example) redistributes the quarantine list
information between all mobile user locations to which it is connected. Since Mobile User
Prisma Access Administrator’s Guide (Panorama Managed) 539 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Location 2 receives the redistributed quarantine list information by way of Service Connection
1, the GlobalProtect mobile user attempt to connect to Mobile User Location 2 is also blocked.
Prisma Access Administrator’s Guide (Panorama Managed) 540 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Mobile User Location 1. Mobile User Location 1 detects the GlobalProtect user endpoint as
compromised and quarantines it.
To redistribute the quarantine list information from Mobile User Location 1 to Mobile User
Location 2, perform the following actions:
• Redistribute the quarantine list information from Service Connection 1 to Panorama.
• Redistribute the quarantine list information from Panorama to Service Connection 2.
With this configuration, when the GlobalProtect user connects to Mobile User Location 1 and
is quarantined, then the quarantine list information redistributes from Mobile User Location 1
to Mobile User Location 2 and any connection attempts to Mobile User Location 2 are blocked.
This configuration is also valid if the GlobalProtect user connects to Mobile User
Location 2 and is quarantined; the quarantine list information redistributes from
Mobile User Location 2 to Mobile User Location 1.
Prisma Access Administrator’s Guide (Panorama Managed) 541 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 542 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
GlobalProtect detects that the on-premises gateway is configured as an internal gateway and
connects to the gateway without a tunnel.
Since the quarantine list information has been redistributed to the on-premises gateway, the
user is blocked at the gateway based on the configured user policies.
If you use a next-generation firewall or gateway with Prisma Access, you should configure
Panorama to redistribute quarantine list information to the firewall or gateway, all service
connections, and Panorama.
• Administrator Manually Quarantines Mobile User at Panorama—In this example, the Prisma
Access administrator has manually added a mobile user to the quarantine list at the Panorama
appliance that manages Prisma Access. The administrator has set up redistribution between
Panorama, the next-generation firewall, and the service connections. Panorama redistributes
the updated quarantine list information to the firewall and the service connections. The service
connections then redistribute the quarantine list information to the mobile user locations.
The mobile user was connected to Mobile User Location 1. After Mobile User Location 1
receives the updated quarantine list information, the user is disconnected. If the user attempts
Prisma Access Administrator’s Guide (Panorama Managed) 543 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
to connect to Mobile User Location 2, the connection is blocked and the mobile user receives a
quarantine notification.
• Mobile User is Auto or Manually Quarantined at the On-Premises Gateway—In this example,
there is a next-generation firewall that has been configured as an external gateway at
the headquarters or data center location. The administrator has manually quarantined a
mobile user at the external gateway. The external gateway redistributes the quarantine list
information from the external gateway to Panorama.
After Panorama has received the updated quarantine list information from the external
gateway, it redistributes that information to Service Connections 1 and 2, which then
redistributes it to Mobile User Locations 1 and 2. If a mobile user attempts to connect to either
Prisma Access Administrator’s Guide (Panorama Managed) 544 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Mobile User Location 1 or 2, Prisma Access blocks the connection and the user receives a a
quarantine notification.
Prisma Access Administrator’s Guide (Panorama Managed) 545 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 1 | Make sure that the Panorama management IP address is able to communicate with the User-
ID agent address for all service connections to which you want to redistribute quarantine list
information.
Communication between the User-ID Agent address of the service connection and the
management IP address of Panorama is required for Prisma Access to send and receive
quarantine list information between Panorama and the service connections.
• To find the User-ID Agent Address, select Panorama > Cloud Services > Status > Network
Details > Service Connection > User-ID Agent Address.
• To find the management IP address of the Panorama that manages Prisma Access, note the
IP address that displays in the web browser when you access Panorama.
Prisma Access Administrator’s Guide (Panorama Managed) 546 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 4 | Configure Panorama to receive quarantine list information from Prisma Access by
configuring management interface settings.
1. In the Panorama that manages Prisma Access, select Panorama > Setup > Interfaces.
2. Select the Management interface.
3. Select User-ID.
Prisma Access Administrator’s Guide (Panorama Managed) 547 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 5 | Configure a data redistribution agent that redistributes quarantine list information from the
service connections to Panorama.
1. From the Panorama that manages Prisma Access, select Panorama > Cloud Services >
Status > Network Details > Service Connection.
2. Make a note of the User-ID Agent Address (Panorama > Cloud Services > Status >
Network Details > Service Connection > User-ID Agent Address) for each service
connection.
3. Select Panorama > Data Redistribution > Agents.
4. Add a Data Redistribution agent, give it a Name and select Enabled.
5. Enter the User-ID Agent Address of the service connection as the Host and 5007 as the
Port.
Make sure that your network does not block access to this port between
Panorama and Prisma Access.
6. (Optional) If you have configured this service connection as a Collector (Device > Data
Redistribution > Collector Settings), enter the Collector Name and Collector Pre-Shared
Key
7. Select Quarantine List; then, click OK.
8. Repeat Step 5 for all the service connections in your Prisma Access deployment.
STEP 6 | Select Commit > Commit to Panorama to save your changes locally on the Panorama that
manages Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 548 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 7 | Configure a data redistribution agent that redistributes quarantine list information from
Panorama to the service connections.
1. Find the management IP address of the Panorama that manages Prisma Access.
This address displays by in the web browser address bar when you access Panorama.
2. Make sure that you are in the Service_Conn_Template template, then select Device >
Data Redistribution > Agents.
Prisma Access Administrator’s Guide (Panorama Managed) 549 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 550 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 8 | Configure a data redistribution agent that redistributes quarantine list information from the
service connections to mobile user gateways.
1. From the Panorama that manages Prisma Access, select Panorama > Cloud Services >
Status > Network Details > Service Connection.
2. Make a note of the User-ID Agent Address of the service connection from which you
want to redistribute quarantine list information.
Since all service connections have the same redistributed quarantine list information,
choose any service connection. You can also configure more than one service
connection.
3. Make sure that you are in the Mobile_User_Template, then select Device > Data
Redistribution > Agents.
4. Add a Data Redistribution agent, give it a Name, and select Enabled.
5. Enter the User-ID Agent Address of the service connection as the Host and 5007 as the
Port.
Make sure that your network does not block access to this port between
Panorama and Prisma Access.
6. (Optional) If you have configured this service connection as a Collector (Device > Data
Redistribution > Collector Settings), enter the Collector Name and Collector Pre-Shared
Key.
7. Select Quarantine List; then, click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 551 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 9 | View your quarantine list information by selecting Panorama > Device Quarantine.
See View Quarantined Device Information in the GlobalProtect Administrator’s Guide for
details.
Prisma Access Administrator’s Guide (Panorama Managed) 552 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
to an IPv4 address; then, it routes the IPv6 traffic to Prisma Access and discards it using a built-in
security policy, as shown in the following figure.
To configure Prisma Access so that it sinkholes all mobile user IPv6 traffic, complete the following
steps.
STEP 1 | Open a secure CLI session with admin-level privileges, using the same IP address that you
use to log in to the Panorama that manages Prisma Access.
STEP 3 | Enter the set plugins cloud_services mobile-users ipv6 yes command.
If you need to disable this command in the future, enter set plugins cloud_services
mobile-users ipv6 no.
Enable the No direct access to local network setting to reduce risks in untrusted networks
such as rogue Wi-Fi access points.
Prisma Access Administrator’s Guide (Panorama Managed) 553 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 5 | Select Split Tunnel; then, select No direct access to local network.
Disabling local network access causes all traffic, including IPv4 and IPv6 traffic, from
being sent to the local adapter. In addition, you won't be able to access resources
on your local subnet, such as printers. Split tunnel traffic based on access route,
destination domain, and application still works as expected.
STEP 6 | (Panorama and Prisma Access deployments only) Commit your changes locally to make them
active in Panorama.
1. Select Commit > Commit to Panorama.
2. Make sure that your change is part of the Commit Scope.
3. Click OK to save your changes to the push scope.
4. Commit your changes.
STEP 7 | Commit and Push your changes to make them active in Prisma Access.
Prisma Access Administrator’s Guide (Panorama Managed) 554 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 555 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 3 | Add a security policy to set a TCP reset action that will terminate sessions with IPv6 source
traffic that matches the IP pools you configured in Step 1.
1. Select Policies > Security and Add a new security policy.
2. Set the Source Address in the rule to match the IP pools you configured in Step 1.
3. Select Actions; then, select an Action Setting of Reset Client and click OK.
STEP 5 | (Optional) Perform this task on all the gateway firewalls in your deployment.
To use HIP redistribution, users must have the GlobalProtect app installed on their
endpoint. While Prisma Access supports Clientless VPN, you cannot redistribute HIP
information for Clientless VPN users.
Prisma Access Administrator’s Guide (Panorama Managed) 556 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
HIP redistribution is applicable to both mobile users and users at remote networks. However, for
users at remote networks, an on-premises gateway must detect that the user is internal to the
organization’s network using internal host detection before the on-premises gateway can send
HIP information to Prisma Access.
In Prisma Access, you configure internal host detection when you configure your mobile
user deployment.
To assure consistent policy enforcement, you can use HIP redistribution to allow Prisma Access
to distribute users’ HIP information to other Panorama appliances, gateways, firewalls, and virtual
systems in your deployment, as well as distribute HIP information from those devices to Prisma
Access in some cases. This ability allows you to consistently apply HIP-based policy enforcement
for users’ traffic, including policies for internet-bound traffic or for traffic that is accessing an
internal application or resource in your organization’s headquarters or data center. Redistributing
HIP information to the Panorama appliance also lets you view detailed HIP information for Prisma
Access users from that appliance.
Prisma Access Administrator’s Guide (Panorama Managed) 557 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Since the firewall does not have the user’s HIP information, it blocks the user’s access to the
app.
HIP redistribution allows you to distribute the mobile users’ HIP information to the on-
premises firewall. The firewall can then check the user’s HIP information against its configured
security policies and grant the user access to the app.
Prisma Access Administrator’s Guide (Panorama Managed) 558 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
To redistribute HIP information from Prisma Access to the firewall, you you allow Prisma
Access to redistribute HIP information, then Add a User-ID Agent (Panorama > User
Identification > User-ID Agents for 9.1.x Panorama appliances or Panorama > Data
Redistribution for Panorama 10.x appliances) on the firewall, and specify the Prisma Access
User-ID Agent Address (Panorama > Cloud Services > Status > Network Details > Service
Prisma Access Administrator’s Guide (Panorama Managed) 559 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Connection > User-ID Agent Address) as the Host (10.1.1.1 in the following example) and
5007 as the Port.
• HIP redistribution from Prisma Access to Panorama—If you have multiple firewalls or
gateways in your organization with HIP-based security policies, you can redistribute the HIP
information from Prisma Access to the Panorama that manages Prisma Access by creating a
User-ID agent in Panorama and specifying the Prisma Access User-ID Agent Address as the
User-ID Host. You can then redisribute HIP reports from that Panorama appliance to the other
managed Panorama appliances, gateways, firewalls, and virtual systems in your enterprise,
Prisma Access Administrator’s Guide (Panorama Managed) 560 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
using the same workflow that you use to redistribute User-ID information to managed firewalls
and enforce consistent policy for internal apps and resources, as shown in the following figure.
Alternatively, you can configure each internal firewall or gateway in your enterprise to directly
collect HIP information from Prisma Access, without using Panorama as a central location,
by creating a User-ID Agent in each device. Note, however, that Prisma Access uses service
connections to send HIP information, and service connection bandwidth consumption might
increase if Prisma Access sends a large number of HIP reports.
• HIP redistribution from a user at a remote network to Prisma Access—The previous use cases
showed Prisma Access collecting HIP information from mobile users. If you want to apply HIP-
based policies in Prisma Access for a user at a remote network location, you need a way to
distribute the HIP information from the remote network user’s GlobalProtect app to Prisma
Access.
The following example shows a user at a remote network location whose internet access
is located on the remote network connection. In Prisma Access, you control the user’s
Prisma Access Administrator’s Guide (Panorama Managed) 561 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
internet access at the remote network location with security policies created in the
Remote_Network_Device_Group or in a shared device group. To properly enforce the policies
at the remote network location for the user, you need to configure Prisma Access to retrieve
the user’s HIP information from the internal gateway.
In this example, the GlobalProtect gateway at the HQ/data center that is configured as an
internal gateway using internal host detection checks the user’s HIP information from the
Prisma Access Administrator’s Guide (Panorama Managed) 562 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
user’s GlobalProtect app. The internal gateway detects that the user is inside the remote
network location and collects both User-ID and HIP information from the user.
To distribute this HIP information from the internal gateway to Prisma Access, create a User-ID
agent in Panorama and specify the IP address of the internal gateway as the host.
• View detailed HIP logs from Panorama—When mobile users log in using the GlobalProtect
app, the app sends the HIP information to Prisma Access. Panorama retrieves the log results
from Cortex Data Lake to view the results of the HIP Match logs (Monitor > Logs > HIP
Prisma Access Administrator’s Guide (Panorama Managed) 563 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Match); however, you cannot view detailed HIP reports until you configure Panorama to
redistribute HIP report details from Prisma Access to Panorama.
To redistribute detailed HIP information from mobile users to Panorama, create a User-ID
agent in Panorama and specify the User-ID Agent Address (Panorama > Cloud Services >
Status > Network Details > Service Connection > User-ID Agent Address) as the User-ID host.
See Configure HIP Redistribution in Prisma Access for details.
If you have configured an on-premises gateway as an internal gateway at a remote user
location, you can also send the HIP information for users at remote networks to Panorama
by creating a User-ID agent in Panorama and specifying the remote network EBGP Router
Prisma Access Administrator’s Guide (Panorama Managed) 564 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
address (Panorama > Cloud Services > Status > Network Details > Remote Networks > EBGP
Router) as the User-ID host. See Configure HIP Redistribution in Prisma Access for details.
Prisma Access Administrator’s Guide (Panorama Managed) 565 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 566 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 3 | Configure Panorama to collect the User-ID mapping from Prisma Access.
1. From the Panorama that manages Prisma Access, select Panorama > Data Redistribution
> Agents (for Panorama 10.x appliances) or Panorama > User Identification > User-ID
Agents (for 9.1.x Panorama appliances).
2. Add a User-ID Agent and give it a Name.
3. Enter one of the following values in the Host field, depending on the types of HIP
information you want to collect.
• To collect HIP information for mobile users, enter the User-ID Agent Address
(Panorama > Cloud Services > Status > Network Details > Service Connection >
User-ID Agent Address).
• To collect HIP information from users at a remote network locations with an internal
gateway, enter the IP address of the internal gateway.
• To collect HIP information from users are a remote network connection, enter the
EBGP Router address (Panorama > Cloud Services > Status > Network Details >
Remote Networks > EBGP Router as the User-ID host.
4. Enter 5007 in the port field.
By default, the User-ID agent uses port 5007 to listen for HIP information requests.
Make sure that your network does not block access to this port between Prisma
Access and the Active Directory server or User-ID Agent.
5. Select Enabled to enable Panorama to communicate with the User-ID agent.
6. Select IP User Mappings and HIP to enable Panorama to receive IP address-to-username
mappings and GlobalProtect HIP data from all mobile user locations.
7. Click OK.
STEP 4 | Repeat Step 3 for each service connection to which you want to configure HIP report
collection.
Prisma Access Administrator’s Guide (Panorama Managed) 567 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 568 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 1 | Select Monitor > Logs > HIP Match to view HIP information.
Prisma Access Administrator’s Guide (Panorama Managed) 569 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 2 | Click the icon to the left of a record to view detailed HIP information.
Prisma Access Administrator’s Guide (Panorama Managed) 570 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The following diagram illustrates the extended support to allow users to access internal and SaaS
applications through Clientless VPN in Prisma Access.
The Clientless VPN can determine whether to use Gzip encoding based on the HTTP request from
the client and the corresponding response from the app. The gzip value must be included as one
of the Accept-Encoding header values so that it is accepted by the Clientless VPN.
For example, consider the following scenarios when the Clientless VPN uses Gzip encoding:
1. The browser sends an HTTP request to the website with the Accept-Encoding header values
set to gzip, deflate, and br, as shown in the following example.
Prisma Access Administrator’s Guide (Panorama Managed) 571 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
2. The Clientless VPN portal in Prisma Access parses the incoming HTTP request from the
browser and sets the Accept-Encoding header value to gzip that indicates support for Gzip
encoding, as shown in the following example.
3. If the website supports Gzip encoding in the HTTP response, the website sends the Content-
Encoding header as gzip that indicates the content is in Gzip format, as shown in the following
example.
4. The Clientless VPN forwards the response received from the website to the web browser in
the same format, as shown in the following example.
If the HTTP request received by the Clientless VPN does not include gzip as one of the
encoding methods, the Clientless VPN does not accept Gzip encoding either.
Prisma Access Administrator’s Guide (Panorama Managed) 572 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 573 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• You have onboarded Remote Networks and Explicit Proxy locations and have retrieved the
anycast and unicast IP addresses that Prisma Access takes from its infrastructure subnet.
You can also create a hostname for Explicit Proxy-directed traffic and add the Explicit
Proxy unicast and anycast IP addresses to that hostname.
• You have configured the CPE to forward Explicit Proxy traffic to these anycast and unicast
addresses.
Use the anycast IP addresses in the PAC file to have Prisma Access select from any onboarded
Remote Network tunnel to forward traffic to Explicit Proxy. Use the unicast address to have
Prisma Access forward traffic through a specific Remote Network tunnel. In this example, you
can use either anycast or unicast addresses, since the traffic is going only through one Remote
Network IPSec tunnel.
• You have specified these IP addresses in the PAC files of the users’ endpoints and in the
system proxy settings of the headless devices.
After configuration is complete, Prisma Access forwards the traffic from the Remote Network
tunnel to Explicit Proxy.
If you want to use a high-bandwidth connection with Explicit Proxy, create a high-bandwidth
remote network connection using multiple Remote Networks; then, add the anycast and,
optionally, unicast IP addresses to the PAC file on the remote users’ endpoints or headless
devices. The following diagram shows the traffic flow using anycast addresses; Prisma Access
chooses the Remote Networks based on the configuration on your CPE.
Prisma Access Administrator’s Guide (Panorama Managed) 574 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The use of anycast addresses lets you use a consistent PAC file across a deployment that has a
wide geographic distribution, and lets you use ECMP on the CPE for high-bandwidth use cases. If
you want to target a specific Remote Network, use unicast addresses.
The following example shows two sites, one in Canada and one in the United States, connected
with a WAN link. The administrator wants to keep the Explicit Proxy traffic flow within each
country. To do so, the administrator uses the unicast addresses that are specific to the Remote
Network tunnel for the Canada East and the US Northeast locations. The use of Unicast IPs
ensures that users are always sent to the preferred regional Remote Network tunnel and Explicit
Proxy location.
Prisma Access uses the Remote Network EBGP Router address (Panorama > Cloud Services
> Status > Network Details > Remote Networks) as the unicast address. If you have changed
the EBGP router address in your Prisma Access configuration, you can retrieve the loopback IP
address using the Prisma Access API.
You can also use anycast addresses to provide regional isolation. For example, you could
specify anycast addresses only in Canada to deploy the Explicit Proxy solution only in
Canada.
Prisma Access Administrator’s Guide (Panorama Managed) 575 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
4. Select Panorama > Cloud Services > Configuration > Remote Networks.
5. Onboard your Remote Network locations if you have not done so already.
6. Click Commit > Commit and Push.
7. Edit Selections and, in the Prisma Access tab, make sure Prisma Access for networks is
selected in the Push Scope, then click OK.
8. Commit and Push your changes.
You must perform a commit and push for your Remote Networks for Prisma Access to
retrieve the IP addresses used in an Explicit Proxy/Remote Network deployment.
9. Return to the Explicit Proxy Settings (Panorama > Cloud Services > Configuration
> Mobile Users—Explicit Proxy > Settings > Advanced) and make a note of the
ALLOCATED ADDRESSES that display in under Remote Networks Configuration.
Prisma Access Administrator’s Guide (Panorama Managed) 576 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 2 | (Optional) Find the unicast address you use for your Explicit Proxy/Remote Network
deployment.
Use the unicast IP address in the PAC file only if you want to target a specific Remote Network
to forward traffic to Explicit Proxy. If you want to use all deployed Remote Networks to
forward traffic to Explicit Proxy, use the anycast addresses.
1. Select Panorama > Cloud Services > Status > Network Details > Remote Networks.
2. Make a note of the EBGP Router address.
If you have IPv4 and IPv6 addresses, make a note of the IPv4 address.
This address is also known as the loopback address. If you have made
configuration changes that changed the EBGP router address, you can retrieve
the loopback IP address using the Prisma Access legacy API.
STEP 3 | Configure your Explicit Proxy deployment and onboard the Explicit Proxy locations you want
to add.
STEP 4 | Ensure that your Explicit Proxy PAC file does not bypass the anycast and unicast IP
addresses.
If you created a hostname for Explicit Proxy-directed traffic and added the Explicit Proxy
unicast and anycast IP addresses to that hostname, be sure that the PAC file does not bypass
this hostname and that it is sent to Explicit Proxy. Any traffic sent to the anycast and unicast IP
addresses must be sent to Explicit Proxy.
STEP 5 | Ensure that the CPE in your network is set up correctly for endpoints to forward traffic to
Explicit Proxy via the anycast and unicast IP addresses.
Prisma Access Administrator’s Guide (Panorama Managed) 577 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
While this solution can provide access for up to 50,000 concurrent inbound sessions per
remote network, Palo Alto Networks does not recommend using this solution to provide
access to a high-volume application or website.
To make internet-accessible applications available from a remote network site, you first make a
list of the applications to which you want to provide access, and assign a private IP, port number,
and protocol combination for each application. If you use the same IP address for multiple
applications, the port/protocol combination must be unique for each application; if you use the
same port/protocol combination for multiple applications, each IP address must be unique.
Prisma Access Administrator’s Guide (Panorama Managed) 578 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
To begin configuration, you choose how many public IP addresses you want to associate for the
applications. You can specify either 5 or 10 public IP addresses per remote network site. Each
public IP allocation takes bandwidth (units) from your Remote Networks license, in addition to the
bandwidth that you have allocated for the compute location associated to the remote network.
5 IP addresses take 150 Mbps from your remote network license allocation, and 10 IP addresses
take 300 Mbps.
After you choose the number of public IP addresses, you then enter the application, along with
its associated private IP/port number/protocol combination, for which you want secure inbound
access.
You can decide how you want to map your application to the public IP addresses. By default,
Prisma Access assigns the public IP addresses to the applications you specify, and multiple
applications can be assigned to a single IP address. If you need to map a single application to
a single public IP address, you can select Dedicated IP during system configuration. You can
configure up to 100 inbound applications for each group of provisioned public IP addresses (either
5 or 10).
Prisma Access Administrator’s Guide (Panorama Managed) 579 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The following figure shows the return path of traffic with source NAT enabled.
Prisma Access Administrator’s Guide (Panorama Managed) 580 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
If you disable source NAT, Prisma Access still performs destination NAT, but the source IP
address of the request is unchanged.
Prisma Access Administrator’s Guide (Panorama Managed) 581 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
For return traffic, SNAT is disabled, and the destination address for all routing tables is user’s IP
address (34.1.1.1).
Prisma Access Administrator’s Guide (Panorama Managed) 582 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
If you have a resource that is in a remote network site that has inbound access enabled and you
want users at non-inbound access sites to have access to that resource, you can Allow inbound
flows to other Remote Networks over the Prisma Access backbone when you configure the non-
inbound access remote network.
If you allow inbound flows from other remote networks, you must enable source NAT.
Prisma Access Administrator’s Guide (Panorama Managed) 583 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
bandwidth, select Panorama > Cloud Services > Configuration > Remote Networks and
view your licensed Bandwidth Allocation. This area shows the bandwidth you have already
allocated, along with the total licensed bandwidth.
Prisma Access Administrator’s Guide (Panorama Managed) 584 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
ICMP Flood 20 20
• Remote networks that are configured for secure inbound access can only be used for that
purpose. If you require outbound access as well as inbound access for a remote network
site, create two remote network sites in the same location—one for inbound access and one
for outbound access—as shown in the following figure. In this example, User 1 uses Remote
Prisma Access Administrator’s Guide (Panorama Managed) 585 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Network 1 for inbound access to www.example.com, while User 2 uses Remote Network 2 for
outbound internet access from the remote network location.
• If you have a custom Prisma Access deployment where one of the cloud providers is excluded,
inbound access might not be supported; in this case, you cannot choose the location during
remote network onboarding.
• Secure inbound access is not supported with evaluation licenses.
Prisma Access Administrator’s Guide (Panorama Managed) 586 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
• To configure secure inbound access for a remote network deployment that allocates
bandwidth by compute location, complete this workflow.
• To configure secure inbound access for a remote network deployment that allocates
bandwidth by location, complete this workflow.
Configure Secure Inbound Access for Remote Network Sites for Locations that Allocate
Bandwidth by Location
If you have a Prisma Access deployment that allocates remote network bandwidth by location,
configure inbound access by completing the following steps.
STEP 1 | Select Panorama > Cloud Services > Configuration > Remote Networks, Add a connection,
and configure the remote network, including routing and IPSec tunnel options.
See Onboard and Configure Remote Networks for details. Your deployment might onboard
bandwidth by compute location or by location; either method is supported for inbound access.
Make sure that you are selecting one of the supported locations for Inbound Access.
STEP 2 | Click the Inbound Access tab to configure inbound access options.
1. Select Enable to enable inbound access for the remote network.
If you selected a location that is unsupported for inbound access, Prisma Access prompts
you to select a supported one.
2. (Optional) To disable source NAT, deselect Enable Source NAT.
By default, source NAT is enabled. If the IPSec-capable device at your remote network
site is capable of performing symmetric return (such as a Palo Alto Networks next-
generation firewall), or if you have not selected Allow inbound flows to other Remote
Networks over the Prisma Access backbone, deselect Enable source NAT.
You must Enable source NAT in the Inbound Access tab if you select this check
box. Source NAT is a requirement to allow inbound flows to other remote
networks.
Prisma Access Administrator’s Guide (Panorama Managed) 587 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
for each application. It is acceptable to use duplicate private IP addresses and ports for two
applications, as long as you select TCP for one application and UDP for another application.
Provide the following values:
• Specify the name of the Application.
• Specify the Private IP address to use with this application.
• Specify the Protocol to use with the application (TCP or UDP).
• Specify the Port to use with the application.
• Choose whether you want to dedicate a single public IP address to a single application; to
do so, select Dedicated IP.
STEP 6 | Wait approximately 30 minutes for Prisma Access to generate the public IP addresses; then
select Panorama > Cloud Services > Status > Network Details > Remote Networks and
make a note of the Public Address that is associated with the App Name for application you
created.
If you selected Dedicated IP, find the single application that is associated with the Public
Address.
STEP 7 | Create security policies to allow traffic from the inbound internet users.
Because Prisma Access’ default security policy only allows untrust-to-untrust traffic, you
need to configure security polices to allow untrust-to-trust traffic for your inbound access
applications. Palo Alto Networks recommends that you limit the type of access you permit to
Prisma Access Administrator’s Guide (Panorama Managed) 588 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
inbound applications. The following examples provide access to SSH servers, web portals, and
RDP servers.
1. Select Policies > Security and Add a policy.
Be sure to create this policy under the Remote_Network_Device_Group device group.
2. Select the Source traffic as Untrust.
3. Create a policy to allow SSH server traffic by selecting the Destination Zone for
destination traffic as Trust and specifying a Destination Address of SSH-server-public.
Prisma Access Administrator’s Guide (Panorama Managed) 589 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
This is an Address or Address Group object you created that has a list of all the public IP
addresses that are used for SSH login.
Prisma Access Administrator’s Guide (Panorama Managed) 590 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
9. Create a security policy for RDP server access, using the same settings as you did for
the other policies but creating an Address or Address Group object called RDP-Server-
Prisma Access Administrator’s Guide (Panorama Managed) 591 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Public, which contains the public IP addresses for the RDP server, as the Destination
Address and webrdp as the Application.
When complete, you have three different policies to allow SSH server access, web portal
access, and RDP server access.
Prisma Access Administrator’s Guide (Panorama Managed) 592 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 9 | Check that the remote network connection is operational and correctly processing inbound
traffic.
1. Select Panorama > Cloud Services > Status > > Status > Remote Networks and hover
over the Status and Config Status areas to see the tunnel’s status.
2. If you find issues, select Panorama > Cloud Services > Status > > Monitor > Remote
Networks, select the location of the remote network tunnel in the map, and hover over
the Tunnel Status area to determine the cause of the error.
Prisma Access Administrator’s Guide (Panorama Managed) 593 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 1 | Select Panorama > Cloud Services > Configuration > Remote Networks, and select Inbound
Access Remote Networks.
STEP 3 | Specify settings for the inbound access remote network connection.
1. Enter a Name for the inbound access connection.
2. Enter a Location.
Inbound access supports a subset of locations.
3. Specify a Bandwidth to use for the inbound access connection.
You allocate bandwidth for inbound access connections on a per-location basis.
4. Specify the Number of Public IPs to use for the inbound access connection.
Specify either 5 or 10 public IP addresses. Each public IP allocation takes bandwidth
(units) from your Remote Networks license, in addition to the bandwidth that you have
allocated for the compute location associated to the remote network.
5. Select the IPSec tunnel to use with the inbound access connection.
6. Select whether or not you want to Allow inbound flows to other Remote Networks over
the Prisma Access Backbone.
If you have a resource that is in a remote network site that has inbound access enabled
and you want users at non-inbound access sites to have access to that resource, you can
Allow Inbound Flows To Other Remote Networks over the Prisma Access Backbone
when you configure the non-inbound access remote network. If you allow inbound flows
from other remote networks, you must enable source NAT.
7. (Optional) If you have a secondary WAN link at this location, select Enable Secondary
WAN and provide an IPSec Tunnel that is different than the primary IPSec tunnel.
STEP 4 | Configure Static Routes, BGP, and QoS for your deployment.
This configuration is the same as a non-inbound access remote network connection.
STEP 5 | Click the Inbound Access tab to configure inbound access options.
1. (Optional) To disable source NAT, deselect Enable Source NAT.
By default, source NAT is enabled. If the IPSec-capable device at your remote network
site is capable of performing symmetric return (such as a Palo Alto Networks next-
Prisma Access Administrator’s Guide (Panorama Managed) 594 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
generation firewall), or if you have not selected Allow inbound flows to other Remote
Networks over the Prisma Access backbone, deselect Enable source NAT.
You must Enable source NAT in the Inbound Access tab if you select this check
box. Source NAT is a requirement to allow inbound flows to other remote
networks.
STEP 8 | Wait approximately 30 minutes for Prisma Access to generate the public IP addresses; then
select Panorama > Cloud Services > Status > Network Details > Remote Networks and
Prisma Access Administrator’s Guide (Panorama Managed) 595 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
make a note of the Public Address that is associated with the App Name for application you
created.
If you selected Dedicated IP, find the single application that is associated with the Public
Address.
STEP 9 | Create security policies to allow traffic from the inbound internet users.
Because Prisma Access’ default security policy only allows untrust-to-untrust traffic, you
need to configure security polices to allow untrust-to-trust traffic for your inbound access
applications. Palo Alto Networks recommends that you limit the type of access you permit to
Prisma Access Administrator’s Guide (Panorama Managed) 596 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
inbound applications. The following examples provide access to SSH servers, web portals, and
RDP servers.
1. Select Policies > Security and Add a policy.
Be sure to create this policy under the Remote_Network_Device_Group device group.
2. Select the Source traffic as Untrust.
3. Create a policy to allow SSH server traffic by selecting the Destination Zone for
destination traffic as Trust and specifying a Destination Address of SSH-server-public.
Prisma Access Administrator’s Guide (Panorama Managed) 597 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
This is an Address or Address Group object you created that has a list of all the public IP
addresses that are used for SSH login.
Prisma Access Administrator’s Guide (Panorama Managed) 598 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
9. Create a security policy for RDP server access, using the same settings as you did for
the other policies but creating an Address or Address Group object called RDP-Server-
Prisma Access Administrator’s Guide (Panorama Managed) 599 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Public, which contains the public IP addresses for the RDP server, as the Destination
Address and webrdp as the Application.
When complete, you have three different policies to allow SSH server access, web portal
access, and RDP server access.
Prisma Access Administrator’s Guide (Panorama Managed) 600 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 11 | Check that the remote network connection is operational and correctly processing inbound
traffic.
1. Select Panorama > Cloud Services > Status > > Status > Remote Networks and hover
over the Status and Config Status areas to see the tunnel’s status.
2. If you find issues, select Panorama > Cloud Services > Status > > Monitor > Remote
Networks, select the location of the remote network tunnel in the map, and hover over
the Tunnel Status area to determine the cause of the error.
Prisma Access Administrator’s Guide (Panorama Managed) 601 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
The following diagram shows four remote network connections that use the same remote site.
Before onboarding, assign 4 Gbps (4000 Mbps) to the compute location, which is South Korea
in this example and corresponds to the remote site. 4000 Mbps provides four IPSec termination
nodes and each IPSec termination node provides a maximum of 1000 Mbps of bandwidth. Assign
each remote network connection its own IPSec termination node during the onboarding process
to utilize the complete bandwidth.
This example shows four tunnels. The maximum number of tunnels you can use for a
high-bandwidth connection in Prisma Access is based on the maximum number of IPSec
tunnels your customer premises equipment (CPE) support with the load balancing protocol
you use.
Consider the following restrictions and recommendations before you deploy this configuration:
• Use BGP routing for the IPSec tunnels; static routing is not supported.
• Use this configuration for outbound internet access only.
• Do not use tunnel monitoring on either Prisma Access or the CPE. Availability of the IPSec
tunnel is determined by BGP peering between the CPE and Prisma Access’ remote network. If
an IPSec tunnel goes down and BGP connection is interrupted, the routes learned over BGP on
that tunnel are automatically removed from ECMP.
• Because you use BGP to determine when a tunnel goes down, consider the HoldTime value
you have configured on your CPE. The hold timer determines the amount of time that the
tunnel is down before removing the route. Prisma Access uses the default BGP HoldTime value
of 90 seconds as defined by RFC 4271. If you configure a lower hold time for the BGP CPE in
the remote network site, BGP uses the lower hold time value. Palo Alto Networks recommends
a KeepAlive value of 10 seconds and a HoldTime value of 30 seconds for your CPE with this
deployment.
Prisma Access Administrator’s Guide (Panorama Managed) 602 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 603 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
2. Enter the Bandwidth Allocation you want for each Compute Location that is
associated with the Prisma Access Locations you want to onboard.
3. Wait for the bandwidth to be reflected in the Allocated Total field at the top of the
page; then, click OK.
• To onboard the remote network that allocates bandwidth by location, continue to the
next step; you allocate bandwidth during remote network onboarding.
4. Select Panorama > Cloud Services > Configuration > Remote Networks and create four
remote network connections, specifying the following settings:
• Select the same Location for each connection.
• Select the IPSec Termination Node.
Select a separate IPSec termination node for each remote network connection.
The bandwidth you select cannot exceed the total amount of bandwidth you have
licensed. Use this setting to define the amount of the total licensed bandwidth you
want to allocate to this location.
• Enable BGP, Advertise Default Route, and Don’t Advertise Prisma Access Routes.
• Specify the same Peer AS for all remote network connections.
Prisma Access Administrator’s Guide (Panorama Managed) 604 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
This example shows a Peer AS of 2000; in this example, you select a Peer AS of 2000
for all four connections.
• (Optional) if you want to create a backup remote network, create one by selecting
Enable Secondary WAN; then, select the IPSec Tunnel you created for the backup
tunnel.
Configuring a Secondary WAN is not supported in the following deployments:
• If your secondary WAN is set up in active-active mode with the Primary IPSec tunnel.
• If your customer premises equipment (CPE) is set up in an Equal Cost Multipath
(ECMP) configuration with the Primary and Secondary IPSec tunnel.
When complete, you have four 1000 Mbps remote network connections for the same
location.
Since deployments that allocate bandwidth by location have a maximum bandwidth of
500 Mbps, this configuration would provide you with 500 Mbps for each location.
Prisma Access Administrator’s Guide (Panorama Managed) 605 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
If you configured backup tunnels, you also have four secondary tunnels to be used for
failover purposes.
5. Select Panorama > Cloud Services > Status > Network Details > Remote Networks and
make a note of the Service IP Address and EBGP Router addresses.
You use the Service IP Address as the peer IP address when you configure the IPSec
tunnel on the CPE in the remote network site, and you use these addresses and the
EBGP Router addresses when you create static routes on the CPE.
STEP 2 | On the CPE in the remote network site, configure the remote network tunnels.
• The configuration in these steps use Palo Alto Networks next-generation firewalls;
you can use any CPE device that supports IPSec tunnels and ECMP for this
deployment.
• Bandwidth balancing depends on CPE hashing for ECMP. However, Prisma Access
ensures symmetrical return of traffic.
1. Create four active tunnels from the active CPE to each of the four network connections.
For the Peer IP address, enter the Service IP Address of the remote network you
received from Prisma Access in Step 5.
2. (Optional) If you create backup tunnels, create them from the active CPE to each of the
four network connections. For the Peer IP address, enter the Service IP Address of the
remote network you received from Prisma Access in Step 5.
Prisma Access Administrator’s Guide (Panorama Managed) 606 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 4 | On the CPE in the remote network site, create static routes to the Prisma Access Service IP
Address and EBGP Router IP addresses you retrieved in Step 5.
As previously stated, dynamic routing with BGP is required for this configuration. To facilitate
BGP connection between the CPE and Prisma Access’ eBGP router, you need to add a static
route for the eBGP router IP address on the CPE, and the next-hop must be the tunnel
interface on the CPE. You must repeat this step for all other Remote Network eBGP router IP
addresses on remaining tunnels.
The following example shows the route on the active CPE. If you created backup tunnels on a
standby CPE, create the same routing on the standby CPE.
If you are configuring a Palo Alto Networks next-generation firewall, select Static Routes >
IPv4 to add the static routes.
Prisma Access Administrator’s Guide (Panorama Managed) 607 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 5 | Enable route redistribution on the CPE by selecting Redistribution Profile > IPv4, then Add
an IPv4 route redistribution profile.
STEP 6 | Select BGP > Peer Group, Enable BGP on the virtual router instance, then Add Remote
Network BGP peers.
STEP 7 | Select BGP > Redist Rules, then attach the route redistribution profile you created in Step 5.
STEP 8 | Validate that the CPE is passing traffic on all four of its tunnels.
Prisma Access Administrator’s Guide (Panorama Managed) 608 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
STEP 9 | Check the status of the ECMP-enabled connections from Prisma Access.
• Select Panorama > Cloud Services > Monitor > Remote Networks, select the region where
you deployed the ECMP connections, then select Status.
• In this area, ECMP displays as No. This is expected because you are not
configuring the Prisma Access ECMP load balancing feature.
• ECMP is directional from CPE to Prisma Access and Prisma Access ensures
symmetrical return of the traffic from the CPE.
• Select Statistics to see that traffic is passing through each remote network tunnel.
When you have completed this workflow, you have created a high-bandwidth configuration
for the remote network. Keep in mind that this solution is supported for outbound traffic only.
Prisma Access Administrator’s Guide (Panorama Managed) 609 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Prisma Access Advanced Deployments
Prisma Access Administrator’s Guide (Panorama Managed) 610 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma
Access for Clean Pipe
Use Prisma Access for Clean Pipe to quickly and easily configure multiple instances of clean
outbound internet connections.
• Prisma Access for Clean Pipe Overview
• Configure Prisma Access for Clean Pipe
611
Create and Configure Prisma Access for Clean Pipe
Prisma Access Administrator’s Guide (Panorama Managed) 612 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
The following figure shows a single Clean Pipe in more detail for a tenant who wants a clean
connection to the internet. The Customer Edge (CE) router provides WAN connectivity for the
tenant. The CE router connects to a cloud router, and the cloud router provides connectivity
for the Partner Interconnect. The service provider creates a VLAN attachment for the tenant,
and configures Prisma Access for Clean Pipe in Panorama to provide security for the VLAN
attachment, which protects the tenant’s internet-based traffic.
Prisma Access Administrator’s Guide (Panorama Managed) 613 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
Prisma Access Administrator’s Guide (Panorama Managed) 614 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
• Note that the locations used by Clean Pipe differ from other Prisma Access deployments.
Prisma Access for Clean Pipe supports the following locations:
• asia-east1
• asia-east2
• asia-northeast1
• asia-south1
• asia-southeast1
• australia-southeast1
• europe-north1
• europe-west2
• europe-west3
• europe-west4
• northamerica-northeast1
• southamerica-east1
• us-central1
• us-east1
• us-east4
• us-west1
• us-west2
• Note the following networking restrictions for Clean Pipe:
• QoS for Clean Pipe is supported on ingress (from internet to Clean Pipe direction) only.
• User-ID is not supported.
• Clean Pipe supports session affinity based on source and destination IP addresses and is not
configurable.
• Trust-to-Trust policies are invalid for Clean Pipe, because the traffic is always internet-
bound. Only use Trust-to-Untrust policies.
Prisma Access Administrator’s Guide (Panorama Managed) 615 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
Prisma Access Administrator’s Guide (Panorama Managed) 616 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
Prisma Access Administrator’s Guide (Panorama Managed) 617 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
7. In the Clean Pipe area, enter a Bandwidth (Mbps) for This Tenant.
Enter a minimum of 100 Mbps for each tenant you create.
8. Click OK.
Prisma Access Administrator’s Guide (Panorama Managed) 618 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
STEP 3 | Create zones for the tenant and map those zones for the tenant.
1. Select Network > Zones.
Make sure that selected the Clean Pipe Template for the tenant you created (cp-
tpl-tenant).
2. Create zones for the tenant (for example, Trust and Untrust).
3. Select Panorama > Cloud Services > Configuration and select the Tenant from the drop-
down list.
4. Select the Clean Pipe tab.
5. Click the gear icon next to Zone Mapping to edit the settings.
6. Add and Remove the zones you created to map them to trusted and untrusted zones.
Prisma Access Administrator’s Guide (Panorama Managed) 619 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
allocation, and it must match the bandwidth of the VLAN attachment you create in
the Partner Interconnect.
• Edge Availability Domain—Select the availability domain you want for the clean pipe.
You can choose 1, 2, ANY, or REDUNDANT.
• Specify ANY for a non-redundant Clean Pipe deployment.
Make sure that your cloud provider supports this choice; you must also select
ANY on the cloud provider side of the partner interconnect. If that choice is not
available for your cloud provider, make another choice.
• To specify two VLAN attachments in the same location in an active/backup
configuration in the same location, select REDUNDANT.
Prisma Access creates two pairing keys for a REDUNDANT configuration (one for
each availability zone), and appends the clean pipe name with zone1 for the first
availability zone and zone2 for the second availability zone. For example, if you
Prisma Access Administrator’s Guide (Panorama Managed) 620 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
specify a Name of San Francisco, Prisma Access creates two zones named San
Francisco-zone1 and San Francisco-zone2.
Be sure that you configure the first availability zone (zone1) as the primary
zone on your CPE.
You can also build a pair of clean pipes for a single tenant redundancy in different
locations; to do so, specify 1 for the first clean pipe in one location and 2 for the
second clean pipe in a different location.
• BGP Peer ASN—Enter the BGP Autonomous System Number (ASN).
You can specify either a private or public BGP ASN.
Make a note of this value; you configure it on the customer edge (CE) router when
you complete the Clean Pipe configuration.
• Location—Select the location.
We recommend that you use the same location that you use when you create the
VLAN attachment for the partner interconnect.
• To enable QoS, select QoS, then select the QoS Profile to use with the clean pipe.
Clean Pipe QoS shapes on ingress.
Prisma Access Administrator’s Guide (Panorama Managed) 621 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
STEP 6 | Commit and push your changes to make them active in Prisma Access.
1. Select Commit > Commit and Push and Edit Selections in the Push Scope.
2. Select Prisma Access, then select Clean Pipe.
STEP 8 | Click the Network Details tab, click the Clean Pipe radio button, and make a note of the
Pairing Key.
The MSSP CE and Cloud Router IP fields are blank when you start to configure the Clean Pipe.
These fields populate after you create the VLAN Attachment when you complete the Clean
Pipe configuration.
If you specified a REDUNDANT connection, Prisma Access creates two pairing keys, one for
each availability zone, and appends the clean pipe name with zone1 for the first availability
Prisma Access Administrator’s Guide (Panorama Managed) 622 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
zone and zone2 for the second availability zone. The following screenshot shows the
SanFrancisco clean pipe with a redundant configuration; Prisma Access has created two
pairing keys, one for SanFrancisco-zone1 and one for SanFrancisco-zone2.
Be sure that you configure the first availability zone (zone1) as the primary zone on
your CPE.
Make sure that you can access and configure the CE and cloud routers on the Partner
Interconnect (non-Prisma access) side of the Partner Interconnect.
STEP 1 | In the Partner Interconnect side of the configuration, create a VLAN attachment, using the
Pairing Key that you retrieved from Panorama.
For more information about creating VLAN attachments with Partner Interconnects and
configuring customer edge (CE) routers to communicate with cloud routers, refer to the
Google Cloud documentation at https://cloud.google.com/interconnect/docs/
Make sure that the location and bandwidth you select matches the Location you specified
in Panorama. The service provider you use for the Partner Interconnect uses the pairing key,
along with your requested connection location and capacity, to complete the configuration of
your VLAN attachment.
STEP 2 | After the connection comes up, return to Panorama, select Panorama > Cloud Services >
Status > Network Details > Clean Pipe and make a note of the MSSP CE and Cloud Router
IP addresses.
These values populate after you enter the Pairing Key on the other side of the VLAN
attachment.
Prisma Access Administrator’s Guide (Panorama Managed) 623 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
Prisma Access Administrator’s Guide (Panorama Managed) 624 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
2. Select Panorama > Cloud Services > Status > Clean Pipe, and click the Monitor tab to
see a map with the status of the deployed Clean Pipes.
Prisma Access Administrator’s Guide (Panorama Managed) 625 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
Click the tabs below the map to see additional statistics for the Clean Pipes.
Status tab:
• Compute Region—The compute region where your cloud service infrastructure is
deployed for the clean pipe instance.
• Name—The name of the clean pipe instance.
Prisma Access Administrator’s Guide (Panorama Managed) 626 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
• Allocated Bandwidth (Mbps)—The amount of bandwidth you allocated for the clean
pipe instance.
• Config Status—The status of your last configuration push to the service. If you have
made a change locally, and not yet pushed the configuration to the cloud, the status
shows Out of sync. Hover over the status indicator for more detailed information.
After committing and pushing the configuration to Prisma Access, the Config Status
changes to In sync.
• BGP Status—Displays information about the BGP state between the firewall or router
at the clean pipe instance and Prisma Access. Although you might temporarily see the
Prisma Access Administrator’s Guide (Panorama Managed) 627 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
status pass through the various BGP states (idle, active, open send, open pend, open
confirm, most commonly, the BGP status shows:
• Connect—The router at the clean pipe instance is trying to establish the BGP peer
relationship with the cloud firewall.
• Established—The BGP peer relationship has been established.
This field will also show if the BGP connection is in an error state:
• Warning—There has not been a BGP status update in more than eight minutes.
This may indicate an outage on the firewall.
• Error—The BGP status is unknown.
• Status—The operational status of the connection between Prisma Access and the
clean pipe instance.
Statistics tab:
• Region—The region where your cloud service infrastructure is deployed for the clean
pipe instance.
• Name—The name of the clean pipe instance.
• Allocated Bandwidth (Mbps)—The amount of bandwidth you allocated for the remote
network location.
• QoS— Select QoS to display a page that contains graphical QoS statistics.
• Avg Egress Bandwidth 5 Min (Mbps)—The average amount of clean pipe egress
bandwidth averaged over 5 minutes.
• Avg Egress Bandwidth 60 Min (Mbps)—The average amount of clean pipe egress
bandwidth averaged over 60 minutes.
• Avg Ingress Bandwidth 5 Min (Mbps)—The average amount of clean pipe ingress
bandwidth averaged over 5 minutes.
• Avg Ingress Bandwidth 60 Min (Mbps)—The average amount of clean pipe ingress
bandwidth averaged over 60 minutes.
• Egress Peak Bandwidth 1 Hour (Mbps)—The amount of peak egress bandwidth for
the clean pipe instance for the last 1 hour.
• Egress Peak Bandwidth 24 Hour (Mbps)—The amount of peak egress bandwidth for
the clean pipe instance for the last 24 hours.
• Egress Peak Bandwidth 7 Days (Mbps)—The amount of peak egress bandwidth for
the clean pipe instance for the last 7 days.
• Egress Peak Bandwidth 30 Days (Mbps)—The amount of peak egress bandwidth for
the clean pipe instance for the last 30 days.
• Ingress Peak Bandwidth 1 Hour (Mbps)—The amount of peak ingress bandwidth for
the clean pipe instance for the last 1 hour.
• Ingress Peak Bandwidth 24 Hour (Mbps)—The amount of peak ingress bandwidth for
the clean pipe instance for the last 24 hours.
• Ingress Peak Bandwidth 7 Days (Mbps)—The amount of peak ingress bandwidth for
the clean pipe instance for the last 7 days.
Prisma Access Administrator’s Guide (Panorama Managed) 628 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
• Ingress Peak Bandwidth 30 Days (Mbps)—The amount of peak ingress bandwidth for
the clean pipe instance for the last 30 days.
Prisma Access Administrator’s Guide (Panorama Managed) 629 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation
Create and Configure Prisma Access for Clean Pipe
Prisma Access Administrator’s Guide (Panorama Managed) 630 ©2024 Palo Alto Networks, Inc.
Version 3.2 Preferred and Innovation