Orient yourself with Selective steering, health check and microperimeter
telemetry.
Where Can I Use This?
What Do I Need?
Prisma AIRS
Private and public cloud platforms, including ESXi, KVM,
Nutanix, AWS, Azure, and GCP.
Selective steering allows you to create granular exceptions based on 5-tuple
rules– protocol, source IP, source port, destination IP, and destination port. By
setting the action to pass, the agent routes the specified traffic locally
instead of redirecting it to the firewall.
PAN Traffic Redirector allows you to exempt specific traffic from redirection
to the firewall. You use exceptions primarily to maintain management access to your
workload such as SSH connectivity, if the firewall becomes unavailable or to allow
specific trusted traffic to be routed locally.
The panredirect rules lists the panredirect rules
configured
The rules are indexed and follow ascending order.
The rules are indexed and follow ascending order.
Health Check
The health check feature in Microperimeter (PAN Traffic Redirector) allows
you to verify that the agent-based redirection is operational and that the Prisma
AIRS™ firewall is correctly inspecting traffic. You should perform periodic health
checks to ensure your workloads remain protected and to identify potential
connectivity issues between the workload and the firewall.
To confirm that redirection is active and the GENEVE tunnel is
communicating with the firewall, you can run the built-in health check
command:
panredirect health_check
Verify the output displays OK. The command returns an exit code of 0 on
success and 1 on failure.
Configure the firewall to allow the default payload UDP with source IP/PORT
169.254.1.1:45000 and destination IP/PORT 169.254.1.2:45000
Monitor Microperimeter Telemetry
Telemetry provides the visibility needed to manage your secure
microsegmentation environment across data centers and public clouds.The PAN
Traffic Redirector solution includes telemetry capabilities to track agent start,
stop, and redirection.
To track telemetry information, execute the command:
/var/log/nginx less webserver-log microperimeter_tracker.log