Network Security
Policy Object: Quarantine Device Lists (PAN-OS & Panorama)
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Policy Object: Quarantine Device Lists (PAN-OS & Panorama)
Configure the quarantine list feature for Panorama Managed Prisma Access mobile user
(GlobalProtect) deployments.
To redistribute quarantine information to and from service connections, the Panorama
that manages Prisma Access, and next-generation firewalls, complete the following
steps.
- Make sure that the Panorama management IP address is able to communicate with the User-ID agent address for all service connections to which you want to redistribute quarantine list information.Communication between the User-ID Agent address of the service connection and the management IP address of Panorama is required for Prisma Access to send and receive quarantine list information between Panorama and the service connections.
- To find the User-ID Agent Address, select PanoramaCloud ServicesStatusNetwork DetailsService ConnectionUser-ID Agent Address.
- To find the management IP address of the Panorama that manages Prisma Access, note the IP address that displays in the web browser when you access Panorama.
- Allow Prisma Access to redistribute quarantine list information.
- In Panorama, select PanoramaCloud ServicesConfigurationService Setup.
- Click the gear icon to edit the settings.
- In the Advanced tab, select Enable Quarantine List Redistribution.Enabling quarantine list redistribution allows Prisma Access to redistribute the quarantine list information received from one or more mobile user locations (gateways) to service connections.
- Commit and Push your changes.
- Configure Panorama to receive quarantine list information from Prisma Access by configuring management interface settings.
- In the Panorama that manages Prisma Access, select PanoramaSetupInterfaces.
- Select the Management interface.
- Select User-ID.
- Configure a data redistribution agent that redistributes quarantine list information from the service connections to Panorama.
- From the Panorama that manages Prisma Access, select PanoramaCloud ServicesStatusNetwork DetailsService Connection.
- Make a note of the User-ID Agent Address (PanoramaCloud ServicesStatusNetwork DetailsService ConnectionUser-ID Agent Address) for each service connection.
- Select PanoramaData RedistributionAgents.
- Add a Data Redistribution agent, give it a Name and select Enabled.
- Enter the User-ID Agent Address of the service connection as the Host and 5007 as the Port.Make sure that your network does not block access to this port between Panorama and Prisma Access.
- (Optional) If you have configured this service connection as a Collector (DeviceData RedistributionCollector Settings), enter the Collector Name and Collector Pre-Shared Key
- Select Quarantine List; then, click OK.
- Repeat Step5for all the service connections in your Prisma Access deployment.
- Select CommitCommit to Panorama to save your changes locally on the Panorama that manages Prisma Access.
- Configure a data redistribution agent that redistributes quarantine list information from Panorama to the service connections.
- Find the management IP address of the Panorama that manages Prisma Access.This address displays by in the web browser address bar when you access Panorama.
- Make sure that you are in the Service_Conn_Template template, then select DeviceData RedistributionAgents.
- Add a Data Redistribution agent, give it a Name and select Enabled.
- Enter the management IP address of the Panorama appliance. as the Host and 5007 as the Port.
- Select Quarantine List; then, click OK.
- Configure a data redistribution agent that redistributes quarantine list information from the service connections to mobile user gateways.
- From the Panorama that manages Prisma Access, select PanoramaCloud ServicesStatusNetwork DetailsService Connection.
- Make a note of the User-ID Agent Address of the service connection from which you want to redistribute quarantine list information.Since all service connections have the same redistributed quarantine list information, choose any service connection. You can also configure more than one service connection.
- Make sure that you are in the Mobile_User_Template, then select DeviceData RedistributionAgents.
- Add a Data Redistribution agent, give it a Name, and select Enabled.
- Enter the User-ID Agent Address of the service connection as the Host and 5007 as the Port.Make sure that your network does not block access to this port between Panorama and Prisma Access.
- (Optional) If you have configured this service connection as a Collector (DeviceData RedistributionCollector Settings), enter the Collector Name and Collector Pre-Shared Key.
- Select Quarantine List; then, click OK.
- Commit and Push your changes.
- View your quarantine list information by selecting PanoramaDevice Quarantine.See View Quarantined Device Information in the GlobalProtect Administrator’s Guide for details.