Deploy Prisma AIRS AI Runtime: Network Intercept in AWS
Focus
Focus
Prisma AIRS

Deploy Prisma AIRS AI Runtime: Network Intercept in AWS

Table of Contents

Deploy Prisma AIRS AI Runtime: Network Intercept in AWS

Complete the deployment workflow in Strata Cloud Manager to generate the Prisma AIRS AI Runtime: Network intercept Terraform template.
Where Can I Use This?What Do I Need?
Prisma AIRS AI Runtime: Network intercept deployment in AWS
Learn how to deploy the Terraform template to enable Prisma AIRS: Network intercept protection on AWS cloud resources.
In this page, you will configure Prisma AIRS AI Runtime: Network intercept in Strata Cloud Manager, download the corresponding Terraform template, and deploy it in your cloud environment. This setup will integrate the network intercept in your cloud network architecture, enabling comprehensive monitoring and protection of your assets.
After onboarding the cloud account, the Strata Cloud Manager command center dashboard will show asset discovery with no firewall protection deployed. Unprotected traffic paths to and from apps, models, and the internet are marked in red until you add firewall protection. For more details, see Discover Your Cloud Resources.
  1. Navigate to Insights Prisma AIRS Prisma AIRS AI Runtime: Network intercept.
  2. Select Add Protections ("+" icon).
  3. Select Cloud Service Provider as AWS and choose Next.
  4. In Firewall Placement, select:
    • All traffic to protect AI and non-AI applications. This traffic can only be insptected by Prisma AIRS AI Runtime: Network intercept.
    • Non AI traffic only to protect all traffic except the traffic between your applications and the AI models. This traffic can be inspected by both Prisma AIRS AI Runtime: Network intercept and VM-Series firewall.
    • Select Next.
  5. In Regions & Application(s):
    • Select your cloud account to secure.
    • Select a region in which you want to protect the applications.
    • In Selected applications, select the applications to secure from the available list.
      The available applications are determined by the application definition criteria you configured during cloud account onboarding in the “Application Definition” step.
    • In GWLB Endpoint CIDR & Zone Pair, enter the zone and CIDR IP range.
    • Select all applicable zones from the available list to secure traffic for each application. (This should be the zone in which you want to create the GWLB endpoint).
    • For each cluster, enter the CIDR IP address of the available (unused) subnet within your application VPC.
      The GWLB endpoints will be created in this CIDR IP address. (Go to AWS management console, select your application VPC name, and record the IPV4 CIDR address range. Ensure to include the CIDR for the GWLB endpoint to be created only within this IPV4 CIDR range within your subnet
  6. Configure Traffic Inspection (to protect your clusters at namespace-level only):
    Traffic steering inspection is available only when you select namespaces from the applications list. Select the namespace and configure how to handle traffic from specific network segments (Limit to 10 CIDRs per cluster that can be inspected or bypassed at any time):
    • Inspect certain CIDRs: Only inspect traffic from specified subnet ranges.
    • Bypass certain CIDRs: Exclude traffic from specified subnet ranges from inspection.
      For container applications, all traffic to and from the applications is protected by default. Use traffic inspection options only when you need granular control over which network segments are inspected or bypassed.
      When protecting traffic from namespaces using traffic inspection, select only the namespace and not its parent VPC to avoid deployment failures. The same GWLB endpoint cannot be used for both VPC and namespace-level protection in the same zone.
  7. Select the Undiscovered VPC(s) tab and click Add VPC.
    Enter the following configurations:
    • VPC ID.
    • Cluster ID.
    • CIDR ranges to be inspected in the Inspect certain CIDRs field.
    • CIDR ranges to be bypassed in the Bypass certain CIDRs field.
    • In Zone and other info:
      • Select a zone from the available list.
      • GWLB endpoint CIDR. (In the AWS console, go to VPC > Endpoints. Select your GWLB endpoint > Details tab > Subnet field and copy the CIDR).
      • VPC VM subnet IDs. (Navigate to VPC > Subnets in the AWS console. Select your subnet and copy the subnet ID from the details panel).
      • Click Setup for a new zone to configure these values for another zone.
    • Select Submit.
  8. Select Next.
  9. In Protection Settings:
    The minimum vCPUs required is 4.
    1. In the Deployment parameters, select AI Runtime Security or VM-Series firewall type based on the type of traffic you decided to protect in the Firewall Placement step.
    2. Enter the number of firewalls to deploy.
    3. Select zones to deploy firewalls from the available zones.
      Ensure the firewall zones cover all selected application zones you selected for each application under Selected applications. For example, in the AWS region us-west-1, if App1 uses ZoneA and ZoneE, and App2 uses ZoneB and ZoneD, the firewall must include ZoneA, ZoneB, ZoneD, and ZoneE. This ensures that when Terraform creates the GWLB service, all corresponding zones are covered.
    4. Choose the instance type for the security VM (See Amazon EC2 instance types for the supported instance types).
  10. Configure the following:
    IP addressing schemeLicensingManagement parameters
    Configure the following fields:
    • CIDR for security VPC: Enter the CIDR IP address of an unused VPC. (Go to AWS Management Console > VPC, select your VPC, and get the CIDR for your VPC).
    • In Create transit gateway, select:
      • No: If you choose No, then in the Select transit gateway field, select the existing TGW ID from the available list. (Go to AWS Management Console > VPC dashboard > Transit Gateways to get the TGW ID).
      • Yes: If you choose Yes, you can optionally enter the Autonomous system number (ASN) for the new Transit Gateway. (Refer to create a transit gateway for more information).
    • Enable Cross-Zone load balancing to distribute incoming traffic evenly across targets in multiple availability zones.
    Enter the following values:
    • PAN OS version for your image from the available list.
    • Flex authentication code (Copy AUTH CODE for the deployment profile you created for AI Runtime Security: Network intercept in Customer Support Portal).
    • Device Certificate PIN ID.
    • Device Certificate PIN value.
    In Management parameters, enter the following:
    • Enable Deploy NAT Gateway to configure egress traffic to exit from the security VPC through security VPC IGW through a NAT gateway (Enable this option to create a NAT gateway).
    • Enable Overlay Routing: Overlay routing, when integrated with your Prisma AIRS AI Runtime: Network intercept and the AWS Gateway Load Balancer (GWLB), lets you use a two-zone policy to inspect egress traffic from your AWS environment. This allows packets to leave the Prisma AIRS firewall through a different interface than the one they entered through.
      For a summary of different configurations for handling egress traffic, refer to the Egress Traffic Handling Scenarios on AWS table.
      This feature is only supported on PAN-OS version 11.2.8 or later.
    • List CIDR ranges to be allowed access to the management interface.
    • The SSH key to be used for login (see how to Create SSH keys).
    • Manage by SCM and then select the SCM folder to group the Prisma AIRS AI Runtime: Network intercept.
    • Manage by Panorama: For firewall management through Panorama, refer to the section on configuring your firewall to be managed by Panorama.
    Table: Egress Traffic Handling Scenarios on AWS
    This table summarizes the different configurations for handling egress traffic with Prisma AIRS on AWS, comparing the use of overlay routing and NAT gateway.
    Overlay Routing EnabledOverlay Routing Disabled
    Deploy NAT Gateway Disabled
    • Dual-arm architecture (eth1/1 & eth1/2).
    • eth1/2 has a public IP.
    • Direct egress through eth1/2 to the Internal Gateway (IGW).
    • Eliminates NAT gateway costs.
    • Single-arm architecture (only eth1/1).
    Deploy NAT Gateway Enabled
    • Dual-arm architecture (eth1/1 & eth1/2).
    • eth1/2 is private (no public IP).
    • Egress through eth1/2 to the NAT Gateway deployed in the security VPC.
    • Avoids public IP costs.
    • Single-arm architecture (only eth1/1).
    • All traffic goes through the NAT gateway in the security VPC.
  11. Select Next.
  12. In Review architecture:
      • Enter a unique Terraform template name. (Use only lowercase letters, numbers, and hyphens. (Don't use a hyphen at the beginning or end, and limit the name to under 19 characters).
      • Review the topology for your AI network architecture.
      • Click Create terraform template.
      • Click Download terraform template.
      • Close the deployment workflow to exit.
    Before you deploy the Terraform template, authenticate with the AWS Console. Go to the AWS Marketplace and subscribe. Subscribe to the same image you will use for the AI network intercept and the tag collector.
  13. Unzip the downloaded file. Navigate to <unzipped-folder> with 2 directories: `architecture` and `modules`. Deploy the Terraform templates in your cloud environment following the `README.md` file in the `architecture` folder.
  14. Initialize and apply the Terraform for the security_project.
    The security_project contains the Terraform plan to create the AI Runtime Security: Network intercept architecture.
    cd architecture cd security_project terraform init terraform plan terraform apply
    The `security_project` Terraform also creates an IP-tag collector service, enabling you to retrieve IP-tag information from clusters. These tags populate dynamic address groups (DAGs) for automated security enforcement. Refer to the section on Harvest IP-Tags from Public and Hybrid Kubernetes Clusters to Enforce Security Policy Rules for details.
  15. Run the application Terraform to peer the application VPCs.
    cd ../application_project terraform init terraform plan terraform apply
    Applying the Terraform for the application_project creates the GWLB endpoints in your AWS account.
  16. Configure Strata Cloud Manager or Panorama to secure VM workloads and Kubernetes clusters and deploy pods. Configure interfaces, zones, NAT policy, routers, and security policy rules.
  17. Navigate to Workflows→ NGFW Setup → Device Management. The Prisma AIRS: Network intercept appears under Cloud Managed Devices.
  18. Switch to the Cloud Managed Devices tab to view and manage the connected state, the configuration sync state, and the deployed Prisma AIRS AI Runtime: Network intercept licenses.
    It takes a while before the Device Status shows as connected.
    Next, view the threat logs and AI security logs for traffic inspection details.