In this section, you will configure Prisma AIRS AI Runtime:
Network intercept in Strata Cloud Manager, download the corresponding Terraform
template, and deploy it in your cloud environment. This setup will integrate the AI
network intercept in your cloud network architecture, enabling comprehensive
monitoring and protection of your assets.
After onboarding the cloud account, the Strata Cloud Manager command
center dashboard will show asset discovery with no firewall protection deployed.
Unprotected traffic paths to and from apps, models, and the internet are marked in
red until you add firewall protection. For more details, see Discover Your Cloud Resources.
Navigate to Insights Prisma AIRS Prisma AIRS AI Runtime: Network intercept.
Select Add Protections ("+" icon).
Select Cloud Service Provider as Azure and select
Next.
In Firewall Placement, select one or more traffic flows to
inspect.
The following table shows the network traffic type that the Prisma AIRS AI Runtime: Network intercept or the
VM-Series firewall can support:
Traffic Type
Prisma AIRS AI Runtime: Network
intercept
VM-Series
AI Traffic - Traffic between your applications
and AI Models
✅
Non-AI Traffic and namespaces (example,
kube-system)
✅
Cluster Traffic
✅
Non-AI and non-cluster traffic
✅
✅
When you select any namespace, the VM-Series
firewall option becomes unavailable because only Prisma AIRS AI Runtime: Network intercept can secure
these namespaces.
Select Next.
In Region & application(s):
Select your cloud account to secure from the onboarded cloud
accounts list.
Select a region in which you want to protect the
applications.
In Selected applications, select the applications to secure from
the available list.
This list includes application workloads such as namespaces or vNets. If you
select the kube-system namespace, the VM-Series firewall option will be grayed
out, as only Prisma AIRS AI Runtime: Network intercept
can protect these namespaces.
The available applications are determined by the
application definition criteria you configured during cloud account onboarding in the
“Application Definition” step.
Configure Traffic Inspection (to protect your clusters at
namespace-level only):
Traffic steering inspection is available only when you select namespaces from
the applications list. Select the namespace and configure how to handle
traffic from specific network segments (Limit to 10 CIDRs per cluster that
can be inspected or bypassed at any time):
Inspect certain CIDRs: Only inspect traffic from specified
subnet ranges.
Bypass certain CIDRs: Exclude traffic from specified subnet
ranges from inspection.
For
container applications, all traffic to and from the applications
is protected by default. Use traffic inspection options only
when you need granular control over which network segments are
inspected or bypassed.
When protecting traffic from
namespaces using traffic inspection, select only the
namespace and not its parent VPC to avoid deployment
failures. The same GWLB endpoint cannot be used for both
VPC and namespace-level protection in the same
zone.
Select the Added vNet tab if you want to secure a vNet. Enter the
following values:
Enter the vNet Name. Get the vNet name from Azure portal → Virtual
Networks page.
Enter the vNet CIDR. To view the vNet CIDR, go to the Azure portal → Virtual
networks and Select your virtual network. Under
Settings, click on the Address space to view the
CIDR block.
CIDR ranges to be inspected in the Inspect certain CIDRs
field.
CIDR ranges to be bypassed in the Bypass certain CIDRs
field.
Select Submit.
In Protection Settings:
In the Deployment parameters, select AI Runtime Security
or VM-Series firewall type based on the type of traffic you
decided to protect in the Firewall Placement step.
Enter the number of firewalls to deploy.
Select zones to deploy firewalls from the available zones.
PAN OS version for your image from the
available list.
Flex authentication code (Copy AUTH CODE
for the deployment
profile you created for Prisma AIRS AI Runtime: Network
intercept in Customer Support Portal).
Enter a unique Terraform template name. (Use only lowercase
letters, numbers, and hyphens. (Don't use a hyphen at the beginning or
end, and limit the name to under 19 characters).
Review the topology for your AI network architecture.
Click Create terraform template.
Click Download terraform template.
Close the deployment workflow to exit.
Run the following commands in the Azure CLI to accept the Prisma AIRS AI Runtime: Network intercept
subscription:
az vm image accept-terms --urn publisher:offer:sku:version
az vm image accept-terms --urn paloaltonetworks:airs-flex:airs-byol:version
Get
the version from the `vmseries_version` value in the Terraform file:
`<azure-deployment-terraform-path>/architecture/security_project/terraform.tfvars`
Unzip the downloaded file. Navigate to <unzipped-folder>
with 2 directories: `architecture` and `modules`. Deploy the Terraform templates
in your cloud environment following the `README.md` file in the `architecture`
folder.
Initialize and apply the Terraform for the security_project.
The security_project contains the Terraform plan to deploy the Prisma AIRS AI Runtime: Network intercept in your
architecture.
cd architecture
cd security_project
terraform init
terraform plan
terraform apply
Note: After applying the Terraform, note the IP
addresses from lbs_external_ips and lbs_internal_ips outputs.
You will need these later while configuring Strata Cloud Manager.
Run the application Terraform to peer the application VNets with the security
VNet.
cd ../application_project
terraform init
terraform plan
terraform apply
The security_project Terraform templates create the resources in the gray
box.
The application_project Terraform templates create the peering
connections.
The Azure deployment Terraform creates a route table.
Use it to direct your outbound traffic to the firewall.
Associate the route table created by the deployment Terraform with the subnet
of your application to protect your resources and direct outbound traffic
through the firewall.
In the Azure portal, search for and select
Virtual networks.
Select the virtual network that contains your application subnet.
In the virtual network menu bar, choose Subnets.
On the Subnets page, select the subnet where your application resources
are deployed.
In the Route table, choose the route table created by the
deployment Terraform. This route table is typically named with a prefix
related to your Prisma AIRS AI Runtime: Network
intercept deployment.
Save.
By associating this specific route table, you ensure
that all outbound traffic from your application subnet is directed through
the Prisma AIRS AI Runtime: Network intercept.
Configure Strata Cloud Manager or Panorama to secure VM workloads and
Kubernetes clusters and deploy pods. Configure interfaces, zones, NAT policy,
routers, and security policy rules.
Navigate to Workflows→ NGFW Setup → Device Management. The Prisma AIRS AI Runtime: Network intercept appears under
Cloud Managed Devices.
Switch to the Cloud Managed Devices tab to view and
manage the connected state, the configuration sync state, and the deployed Prisma AIRS AI Runtime: Network intercept licenses.
It takes a while before the Device Status shows as
connected.