Prisma Access Agent
Configure Third-Party Agent Coexistence with Bypass Rules (Strata Cloud Manager)
Table of Contents
Configure Third-Party Agent Coexistence with Bypass Rules (Strata Cloud Manager)
Configure bypass rules in forwarding profiles in Strata Cloud Manager Managed Prisma Access agents to enable
Prisma Access Agent coexistence with third-party remote access agents without routing
conflicts.
To configure bypass rules within Forwarding Profiles in Strata Cloud Manager Managed Prisma Access
deployments:
- Navigate to the forwarding profiles setup page:
- Strata Cloud Manager Managed Prisma Access deployments:
- Select ConfigurationNGFW and Prisma AccessConfiguration ScopeMobile Users Container.
- Edit the settings in the Forwarding Profiles Setup section.
- Panorama Managed
Prisma Access deployments:
- From the Cloud Services plugin in Panorama, select PanoramaCloud ServicesPrisma Access AgentLaunch Prisma Access Agent.
- Select ConfigurationForwarding Profiles
- Panorama Managed
NGFW deployments:
- Log in to Strata Cloud Manager as the administrator.
- Select ConfigurationForwarding Profiles
Set up the Source Applications or Destinations for which you need to bypass traffic.For example, you can specify a Destination for a domain you want to bypass, or specify the IP addresses for the applications you want to bypass. You can also set up specific Source Applications that you want to bypass.Configure a forwarding profile where you want to specify bypass rules.- Select an existing forwarding profile you want to modify or add a forwarding profile.For example:
In the Forwarding Rules section, select an existing forwarding rule or Add a forwarding rule for the source application or destination you want to bypass.
Specify the properties for the forwarding rule:- Enable the forwarding rule.
- Enter a meaningful Name for the rule.
- Select the Source Application and
Destination that you want to
bypass.For example, you can bypass Any applications in the lab destination.Prisma Access Agent cannot steer UDP traffic based on destination criteria on Windows endpoints. Any rule that uses the Destination object will not apply to UDP traffic on Windows endpoints.
- Select ConnectivityBypass.
- Select the Traffic Type to bypass (DNS, DNS + Network Traffic, or Network Traffic).
- Update the forwarding rule.
Set the rule priority to ensure bypass rules are evaluated in the correct order relative to other forwarding rules. You can select a forwarding rule and move it up or down in the Forwarding Rules table.Select a Traffic Enforcement option if needed.Save your forwarding profile settings.Push the configuration to deploy the bypass rules to your Prisma Access Agent deployment.Verify that bypass rules are working correctly on an endpoint.
- Strata Cloud Manager Managed Prisma Access deployments: