Set Up the Infrastructure for Prisma Access Agents (NGFW Deployment)
Focus
Focus
Prisma Access Agent

Set Up the Infrastructure for Prisma Access Agents (NGFW Deployment)

Table of Contents


Onboard your users in NGFW deployments by configuring the infrastructure and selecting Prisma Access locations in Panorama.
For Panorama managed NGFW deployments, set up the infrastructure settings that are specific to the Prisma Access Agent to provision your mobile user environment.
You will configure the infrastructure settings using a configuration app accessible through Strata Cloud Manager.
Before you begin, ensure that you have the following information:
  • Certificates that are generated and managed on the gateway on Panorama.
    Because using authentication override cookie certificate is the only method for gateway authentication, you need to use the same authentication override cookie certificate on the gateway, portal, and Prisma Access Agent management plane (EPM). Only when all the certificates match can the gateway authenticate the user using the existing cookie that the portal generated. In addition, certificates are needed for HIP checks.
  • The FQDN or IP address for internal or external gateways managed on Panorama that you want your users to access.
  1. Log in to Strata Cloud Manager as the administrator.
  2. To configure the infrastructure settings in the configuration app in Strata Cloud Manager, select WorkflowsPrisma Access AgentSetup.
  3. Select Infrastructure.
  4. Configure the Prisma Access Agent domain FQDN. This is similar to the GlobalProtect™ portal FQDN.
    1. Edit the Domain Name and IPv6 Settings settings.
    2. Add a hostname to the Domain Name for the service that the Prisma Access Agent connects to (EPM).
      By default, users can access the service using an FQDN based on your hostname and the .epm.gpcloudservice.com domain. This FQDN will be published to the public domain name servers.
    3. Save your domain name setting.
  5. Import the authentication override cookie certificates that are used for gateway authentication.
    1. Click Add Certificate.
    2. Enter the Certificate Name.
    3. Choose File to select and upload the certificate file. This certificate file was generated and managed by the gateway.
    4. Select the Format for the certificate and choose the file for the Private key.
    5. (Optional) Enter and confirm a Passphrase.
    6. Save the certificate settings.
  6. Create certificate profiles based on the certificates that you imported in the previous step. These certificate profiles will be used for the authentication override cookie settings and for HIP matches.
    1. Click Add Certificate Profile.
    2. Enter a Name for the certificate profile.
    3. Click the + sign and open the drop-down to show the list of certificates that you imported in the previous step.
    4. Select a certificate from the list. You can add one or more certificates to the profile.
    5. Create the certificate profile.
  7. Add the internal and external gateways that you want your users to access. The gateways are configured on the NGFW firewall but you need to add the same details (gateway FQDN or IP address) here.
    1. Add a gateway.
      • For internal gateways, select Add GatewayInternal Gateway.
      • For external gateways, select Add GatewayExternal Gateway.
    2. Enter the Name for the gateway.
    3. Enter the IP address or FQDN for the gateway.
      1. For IP address, select IP and enter the IPv4 or IPv6 address for the gateway.
      2. For FQDN, select FQDN and enter the FQDN for the gateway.
    4. Save your gateway settings.