Prisma Access
Panorama
Table of Contents
Expand All
|
Collapse All
Prisma Access Docs
-
- Prisma Access China
- 4.0 & Later
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
-
-
-
- 5.0 Preferred and Innovation
- 4.2 Preferred
- 4.1 Preferred
- 4.0 Preferred
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
Panorama
Panorama
Describes the procedure you use to configure secure inbound
access for a
Prisma Access
remote network connection.If you have a
Prisma Access
deployment that allocates
remote network bandwidth by compute location, configure inbound
access by completing the following steps.- Select, and selectPanoramaCloud ServicesConfigurationRemote NetworksInbound Access Remote Networks.
- Adda remote network to for inbound access.
- Specify settings for the inbound access remote network connection.
- Enter aNamefor the inbound access connection.
- Enter aLocation.Inbound access supports a subset of locations.
- Specify aBandwidthto use for the inbound access connection.You allocate bandwidth for inbound access connections on a per-location basis.
- Specify theNumber of Public IPsto use for the inbound access connection.Specify either 5 or 10 public IP addresses. Each public IP allocation takes bandwidth (units) from your Remote Networks license, in addition to the bandwidth that you have allocated for the compute location associated to the remote network.
- Select the IPSec tunnel to use with the inbound access connection.
- Select whether or not you want toAllow inbound flows to other Remote Networks over the.Prisma AccessBackboneIf you have a resource that is in a remote network site that has inbound access enabled and you want users at non-inbound access sites to have access to that resource, you canAllow Inbound Flows To Other Remote Networks over thewhen you configure the non-inbound access remote network. If you allow inbound flows from other remote networks, you must enable source NAT.Prisma AccessBackbone
- (Optional) If you have a secondary WAN link at this location, selectEnable Secondary WANand provide anIPSec Tunnelthat is different than the primary IPSec tunnel.
- ConfigureStatic Routes,BGP, andQoSfor your deployment.This configuration is the same as a non-inbound access remote network connection.
- Click theInbound Accesstab to configure inbound access options.
- (Optional) To disable source NAT, deselectEnable Source NAT.By default, source NAT is enabled. If the IPSec-capable device at your remote network site is capable of performing symmetric return (such as a Palo Alto Networks next-generation firewall), or if you have not selectedAllow inbound flows to other Remote Networks over the, deselectPrisma AccessbackboneEnable source NAT.You mustEnable source NATin theInbound Accesstab if you select this check box. Source NAT is a requirement to allow inbound flows to other remote networks.
- Addthe applications to provide secure inbound access.You can configure up to 100 inbound applications for each group of provisioned public IP addresses (either 5 or 10). Enter a uniquePrivate IPaddress,Protocol, andPortcombination for each application. It is acceptable to use duplicate private IP addresses and ports for two applications, as long as you selectTCPfor one application andUDPfor another application.Provide the following values:
- Specify the name of theApplication.
- Specify thePrivate IPaddress to use with this application.
- Specify theProtocolto use with the application (TCPorUDP).
- Specify thePortto use with the application.
- Choose whether you want to dedicate a single public IP address to a single application; to do so, selectDedicated IP.
- ClickOKto save your changes.
- SaveandCommityour changes.
- Wait approximately 30 minutes forPrisma Accessto generate the public IP addresses; then selectand make a note of thePanoramaCloud ServicesStatusNetwork DetailsRemote NetworksPublic Addressthat is associated with theApp Namefor application you created.If you selectedDedicated IP, find the single application that is associated with thePublic Address.
- Create security policies to allow traffic from the inbound internet users.BecausePrisma Access’ default security policy only allows untrust-to-untrust traffic, you need to configure security polices to allow untrust-to-trust traffic for your inbound access applications. Palo Alto Networks recommends that you limit the type of access you permit to inbound applications. The following examples provide access to SSH servers, web portals, and RDP servers.
- SelectandPoliciesSecurityAdda policy.Be sure to create this policy under theRemote_Network_Device_Groupdevice group.
- Select theSourcetraffic asUntrust.
- Create a policy to allow SSH server traffic by selecting theDestination Zonefor destination traffic asTrustand specifying aDestination AddressofSSH-server-public. This is an Address or Address Group object you created that has a list of all the public IP addresses that are used for SSH login.
- Select anApplicationofssh.
- Select aService/URL Categoryofapplication-defaultto allow or deny applications based only their default ports as defined by Palo Alto Networks.
- InActions, selectAllow.
- ClickOKto save the policy.
- Create a policy to allow web portal access by creating a policy in the previous steps but substituting the following settings in theDestinationandApplicationtabs:
- Select aDestination Addressof an Address or Address Group ofWeb-Portal-Public, which contains all the public IP addresses of the web portal.
- Select anApplicationofweb-browsing.
- Create a security policy for RDP server access, using the same settings as you did for the other policies but creating an Address or Address Group object calledRDP-Server-Public, which contains the public IP addresses for the RDP server, as theDestination Addressandwebrdpas theApplication.When complete, you have three different policies to allow SSH server access, web portal access, and RDP server access.
- SaveandCommityour changes.
- Check that the remote network connection is operational and correctly processing inbound traffic.
- Selectand hover over thePanoramaCloud ServicesStatusStatusRemote NetworksStatusandConfig Statusareas to see the tunnel’s status.
- If you find issues, select, select the location of the remote network tunnel in the map, and hover over thePanoramaCloud ServicesStatusMonitorRemote NetworksTunnel Statusarea to determine the cause of the error.