Internet Access Rule
Focus
Focus
Network Security

Internet Access Rule

Table of Contents

Internet Access Rule

The Internet Access rule revolutionizes Internet Access management. It offers easy integration with the security rulebase, providing granular control over web application access.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • NGFW (Managed by Strata Cloud Manager)
  • AIOps for NGFW license or Prisma Access license
The Internet Access rule replaces the existing Web Access policy rules with improved capabilities.
The Internet access rule is a new policy type within the security rulebase in Strata Cloud Manager that optimizes the management of internet access use cases. You can efficiently manage user access to web applications using the Internet Access rule, including functional controls, data security inspections, and application tenant handling. The integration of Internet Access rule with SaaS Security inline provides native capabilities and eliminates the need to follow the policy recommendation workflow.
Key features of the Internet Access rule include:
  • The policy easily integrates into the security rulebase, coexisting with traditional firewall access policy rules (security policy rules), giving you full control over rule ordering. This structure provides you with flexibility in rule ordering and usage. When creating policy rules, you can select from an extensive, up-to-date list of SaaS applications and URL categories, ensuring comprehensive coverage of your organization's needs.
  • The policy's user and group integration utilizes information from the Cloud Identity Engine, enabling granular access control tailored to your specific requirements. When configuring SaaS applications, you can define precise functional access levels for users, with controls dynamically adapting based on the selected application.
  • The Internet Access rule prioritizes data security and allows you to apply robust inspections to all or specific applications and URLs within a policy. The threat protection settings you define under Security ServicesInternet Security determine the security inspection for these policy rules, ensuring consistent and effective protection.
  • Decryption settings offer further control. The policy decrypts outbound internet-bound traffic by default, but you can fully customize it per scope or for specific URL categories.

Internet Access Rule Migration

Internet Access rule migration transfers your existing web Security policy rules. The system integrates Web Security policy rules and custom Web Access policy rules into the new framework during your tenant upgrades. The system positions folder or scope-level policy rules at the top of security rules within their scopes.
Web Security policy rules from the Prisma Access or Global folder level move directly to the security rulebase of those levels. This migration maintains the policy structure while integrating it into the new internet policy rule framework.

Rule Order for Internet Access Rule and Security Policy Rule

Child folders inherit Internet Access rules and other configuration rules from parent folders. GlobalProtect™, Explicit Proxy, or Remote Networks place Internet Access rules at the top of the rulebase. The system prioritizes security policy rules from parent folders over Internet Access rules in child folders. Default security policy rules remain at the bottom, below Internet Access rules in child folders. This order allows evaluation of custom rules before default rules.