Prisma Access Agent
Verify the Bypass Rule Configuration
Table of Contents
Verify the Bypass Rule Configuration
Verify bypass rules are working using the Prisma Access Agent command line interface
(PACli).
| Where Can I Use This? | What Do I Need? |
|---|---|
|
|
After deploying the configuration, verify that bypass rules are working correctly on
an endpoint that has the bypass rule configuration.
- Use PACli commands on an endpoint to monitor traffic processing and confirm that bypassed traffic shows the Bypass connectivity in traffic logs.For example, you set up a forwarding rule to bypass the *.cnn.com destination and you want to verify the traffic from *.cnn.com is bypassed.
- On an endpoint, access cnn.com in a browser.In a command prompt or terminal on the endpoint, issue the following command to show the forwarding rules in a forwarding profile:
pacli traffic show
The following image is an example of a forwarding profile on Windows. Note the forwarding rule named cnn bypass rule.
To show the details of the cnn bypass rule forwarding rule (rule 1 in the forwarding profile table), issue the following command:pacli traffic show 1
The following is an example of the bypass forwarding rule:
To check the traffic log for the DNS packets of *.cnn.com that got bypassed, run the following command:pacli traffic log | grep cnn.com
The following is an example of the DNS packets of cnn.com that got filtered on Windows:
To show the data connection for cnn.com that got bypassed:- Run the curl command to transfer data
from cnn.com. For
example:
curl cnn.com
- Grep the traffic log for the curl
command:
pacli traffic log | grep curl
In the command output, make sure the data connection is Bypass. For example:
Verify that non-bypassed traffic continues to route through Prisma Access according to your other forwarding rules.Suppose that the traffic from the booking.com website is supposed to go through the tunnel according to your forwarding profiles configuration.- Access the booking.com website on an endpoint.Issue the following command:
pacli traffic log | grep booking.com
In the command output, ensure that traffic from booking.com goes through the Tunnel. For example: