Configure Prisma Access Agent to block non-TCP and non-UDP traffic when connected to
a tunnel, enhancing network security for your enterprise.
| Where Can I Use This? | What Do I Need? |
Traffic enforcement for non-TCP and non-UDP protocols extends Prisma Access Agent capabilities beyond traditional TCP and UDP traffic control to provide
comprehensive IP protocol coverage. This feature addresses security concerns where
protocols like ICMP, GRE, and IPSec might bypass tunnel enforcement and go direct
without any security enforcement, creating potential attack vectors for your
enterprise.
When enabled, Prisma Access Agent can block any non-TCP and non-UDP traffic
that attempts to circumvent the tunnel when a user is connected. This ensures that
none of the non-TCP and non-UDP traffic goes direct.
Administrators configure this capability through forwarding profiles that manage
agent traffic. Once configured, these settings are pushed to the Prisma Access Agent on your endpoints, which then enforces the policies at the
kernel level. This ensures efficient and reliable traffic enforcement without
impacting system performance.
To address the operational needs of IT teams, you can specifically permit ICMP
traffic for troubleshooting purposes while still blocking other non-TCP and non-UDP
traffic. This flexibility provides a balance between stringent security controls and
practical network management requirements.
Using the PACLI command-line interface, you can verify the current enforcement
status, view traffic statistics, and troubleshoot any potential issues with the
traffic enforcement mechanisms. This visibility ensures that security teams can
confirm proper policy implementation and quickly address any concerns that arise in
their environment.
Key Components
Forwarding Profile configuration—You configure traffic enforcement through
forwarding profiles. The primary configuration option Block Non-TCP
and Non-UDP based traffic when connected to tunnel controls the
enforcement behavior for all non-TCP and non-UDP protocols.
ICMP Exception Handling—The Allow ICMP for
troubleshooting option provides selective control over ICMP
traffic while maintaining enforcement for other protocols. This option becomes
available only when you enable the primary blocking feature, enabling you to
preserve network diagnostic capabilities while enforcing security policies.
Kernel-Level Enforcement—The agent implements traffic control at the
kernel level on both Windows and macOS platforms. This low-level implementation
ensures comprehensive protocol coverage and prevents applications from bypassing
enforcement through alternative network paths.
Logging and Monitoring—The agent generates detailed logs for enforcement
actions. You can access verbose logging through PACLI commands to monitor
blocked traffic and troubleshoot enforcement behavior.
Traffic Behavior
The combination of configuration options determines how the agent handles non-TCP
and non-UDP traffic, including ICMP, GRE, IGMP, IPSec, and other Layer 3
protocols, based on your tunnel state and selected settings. The following table
summarizes the traffic behavior based on the configuration settings.
| Block Non-TCP and Non-UDP Based Traffic When Connected to
Tunnel | Allow ICMP for Troubleshooting | Tunnel State | Traffic Behavior |
| Enabled | Disabled | Connected | Block all non-TCP and non-UDP traffic. |
| Enabled | Enabled | Connected | Block all non-TCP and non-UDP traffic except ICMP. Allow ICMP
traffic to pass through for troubleshooting. |
| Disabled
(Default) | Any setting | Connected | Allow all non-TCP and non-UDP traffic. |
| Any setting | Any setting | Disconnected | Allow all non-TCP and non-UDP traffic regardless of
configuration; enforcement is inactive when the tunnel is
disconnected. |
Key Traffic Behavior Notes:
To configure Prisma Access Agent to block non-TCP and non-UDP protocols, complete the
following steps.