Network Connectivity and Protocol Support
Focus
Focus
Prisma Access Agent

Network Connectivity and Protocol Support

Table of Contents
Learn about the connection methods and network protocols that Prisma Access Agent utilizes to establish and maintain secure remote access.
Prisma Access Agent utilizes various connection methods and network protocols to establish and maintain secure remote access for endpoints.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by Panorama)
  • Check the prerequisites for the deployment you're using
  • Contact your Palo Alto Networks account representative to activate the Prisma Access Agent feature

Fallback from IPSec to SSL for Prisma Access Agent

Prisma Access Agent supports fallback from IPSec to SSL, similar to GlobalProtect™. This feature maintains user connectivity when IPSec connections fail. The agent first attempts an IPSec connection. If blocked or unsuccessful, it switches to SSL using TCP port 443. This process is automatic and is transparent to your users, minimizing disruptions to their workflow. Prisma Access Agent logs fallback events so you can monitor fallback occurrences and optimize network settings accordingly. This fallback mechanism improves remote access reliability across various network conditions.

IPv4 Support for Prisma Access Agent

Prisma Access Agent supports IPv4, making it compatible with most network infrastructures. It creates secure connections over IPv4 networks, letting users access company resources remotely. The agent handles IPv4 address assignment, traffic routing, and DNS resolution. You can configure IPv4 settings in the tenant, including IP address pools, split-tunnel options, and DNS servers. This enables the agent to work effectively with existing IPv4 corporate networks and applications, providing consistent access for remote users.