Microperimeter Architecture
Microperimeter architecture provides a L7-aware secure microsegmentation solution
along with deep packet inspection (DPI) and Zero Trust policy enforcement for east-west
traffic.
| Where Can I Use This? | What Do I Need? |
|
|
- Private and public cloud platforms, including ESXi, KVM,
Nutanix, AWS, Azure, and GCP.
|
Microperimeter (PAN Traffic Redirector) provides a L7-aware secure
microsegmentation solution for critical workloads within private and public cloud
environments. Unlike traditional microsegmentation that relies on coarse L3/L4 controls,
the Microperimeter architecture enables deep packet inspection (DPI) and Zero Trust
policy enforcement for east-west traffic.
The Microperimeter solution consists of two primary components that work
together to secure application-layer behavior:
PAN Traffic Redirector package— A pan redirector software
package installed directly on the Linux workload. The package utilizes the
Linux Packet Control subsystem to intercept and redirect L3 traffic without
requiring complex network re-architecture.
Prisma AIRS™ Firewall — The Prisma AIRS firewall serves as the
inspection engine, performing security processing and threat prevention for
all redirected traffic. Use authcodes to enable Prisma AIRS on universal
images.
Traffic Redirection Workflow
The architecture utilizes a hairpin traffic pattern to ensure all packets
undergo inspection before reaching their final destination. The redirection works on
both inbound and outbound directions and follows these steps:
Interception — The agent intercepts inbound and outbound
packets on the designated workload interface.
Encapsulation — The agent encapsulates the packets into
a GENEVE tunnel using UDP port 6081. It adds a specific GENEVE option
(0x20) and a flow direction flag to uniquely identify the traffic.
Inspection — The agent forwards the encapsulated traffic
to the Prisma AIRS™ firewall data interface. The firewall decapsulates
the packet, performs L7 inspection based on security policies, and
re-encapsulates the traffic.
Delivery — The firewall sends the packet back to the original
host. The agent decapsulates the returning packet and forwards it to the
Linux kernel protocol stack for final delivery to the application or
destination