Prisma SD-WAN
Configure IPSec and GRE in Prisma SD-WAN
Table of Contents
Expand All
|
Collapse All
Prisma SD-WAN Docs
-
-
- Prisma SD-WAN Key Elements
- Prisma SD-WAN Releases and Upgrades
- Use Copilot in Prisma SD-WAN
- Prisma SD-WAN Summary
- Prisma SD-WAN Application Insights
- Device Activity Charts
- Site Summary Dashboard
- Prisma SD-WAN Predictive Analytics Dashboard
- Prisma SD-WAN Link Quality Dashboard
- Prisma SD-WAN Subscription Usage
-
-
- Add a Branch
- Add a Data Center
- Add a Branch Gateway
- Secure Group Tags (SGT) Propagation
- Configure Circuits
- Configure Internet Circuit Underlay Link Aggregation
- Configure Private WAN Underlay Link Quality Aggregation
- Configure Circuit Categories
- Configure Device Initiated Connections for Circuits
- Add Public IP LAN Address to Enterprise Prefixes
- Manage Data Center Clusters
- Configure Secure SD-WAN Fabric Tunnels between Data Centers
- Configure a Site Prefix
- Configure Ciphers
- Configure a DHCP Server
- Configure NTP for Prisma SD-WAN
- Configure the ION Device at a Branch Site
- Configure the ION Device at a Data Center
- Switch a Site to Control Mode
- Allow IP Addresses in Firewall Configuration
-
- Configure a Controller Port
- Configure Internet Ports
- Configure WAN/LAN Ports
- Configure a Sub-Interface
- Configure a Loopback Interface
- Add and Configure Port Channel Interface
- Configure a PoE Port
- Configure and Monitor LLDP Activity and Status
- Configure a PPPoE Interface
- Configure a Layer 3 LAN Interface
- Configure Application Reachability Probes
- Configure a Secondary IP Address
- Configure a Static ARP
- Configure a DHCP Relay
- Configure IP Directed Broadcast
- VPN Keep-Alives
-
- Configure Prisma SD-WAN IPFIX
- Configure IPFIX Profiles and Templates
- Configure and Attach a Collector Context to a Device Interface in IPFIX
- Configure and Attach a Filter Context to a Device Interface in IPFIX
- Configure Global and Local IPFIX Prefixes
- Flow Information Elements
- Options Information Elements
- Configure the DNS Service on the Prisma SD-WAN Interface
- Configure SNMP
-
-
- Prisma SD-WAN Branch Routing
- Prisma SD-WAN Data Center Routing
-
- Configure an OSPF in Prisma SD-WAN
- Enable BGP for Private WAN and LAN
- Configure BGP Global Parameters
- Global or Local Scope for BGP Peers
- Configure a Route Map
- Configure a Prefix List
- Configure an AS Path List
- Configure an IP Community List
- View Routing Status and Statistics
- Distribution to Fabric
- Host Tracking
-
- Configure Multicast
- Create, Assign, and Configure a WAN Multicast Configuration Profile
- Configure Global Multicast Parameters
- Configure a Multicast Static Rendezvous Point (RP)
- Learn Rendezvous Points (RPs) Dynamically
- View LAN Statistics for Multicast
- View WAN Statistics for Multicast
- View IGMP Membership
- View the Multicast Route Table
- View Multicast Flow Statistics
- View Routing Statistics
-
- Prisma SD-WAN Branch HA Key Concepts
-
- Configure Branch HA with Gen-1 Platforms (2000, 3000, 7000, and 9000)
- Configure Branch HA with Gen-2 Platforms (3200, 5200, and 9200)
- Configure Branch HA with Gen-2 Embedded Switch Platforms (1200-S or 3200-L2)
- Configure Branch HA for Devices with Software Cellular Bypass (1200-S-C-5G)
- Configure Branch HA for Platforms without Bypass Pairs
- Configure Branch HA in a Hybrid Topology with Gen-1 (3000) and Gen-2 (3200) Platforms
- Configure HA Groups
- Add ION Devices to HA Groups
- Edit HA Groups and Group Membership
- Prisma SD-WAN Clarity Reports
-
-
CloudBlade Integrations
- CloudBlade Integrations
- CloudBlades Integration with Prisma Access
-
- Plan the Zscaler CloudBlade Deployment
- Acquire the Zscaler Information
- Create Security Zone and Security Policy for GRE Tunnels Creation
- Configure IPSec and GRE in Prisma SD-WAN
- Validate the Zscaler Configuration
- Troubleshoot Installation Scenarios
- Troubleshoot Standard VPNs
- Enable, Pause, Disable, and Uninstall the CloudBlade
-
-
-
-
- clear app-engine
- clear app-map dynamic
- clear app-probe prefix
- clear connection
- clear device account-login
- clear dhcplease
- clear dhcprelay stat
- clear flow and clear flows
- clear flow-arp
- clear qos-bwc queue-snapshot
- clear routing
- clear routing multicast statistics
- clear routing ospf
- clear routing peer-ip
- clear switch mac-address-entries
- clear user-id agent statistics
-
- arping interface
- curl
- ping
- ping6
- debug bounce interface
- debug bw-test src-interface
- debug cellular stats
- debug controller reachability
- debug flow
- debug ipfix
- debug log agent eal file log
- debug logging facility
- debug logs dump
- debug logs follow
- debug logs tail
- debug performance-policy
- debug poe interface
- debug process
- debug reboot
- debug routing multicast log
- debug routing multicast pimd
- debug servicelink logging
- debug tcpproxy
- debug time sync
- dig dns
- dig6
- file export
- file remove
- file space available
- file tailf log
- file view log
- ssh6 interface
- ssh interface
- tcpdump
- tcpping
- traceroute
- traceroute6
-
- dump appdef config
- dump appdef version
- dump app-engine
- dump app-l4-prefix table
- dump app-probe config
- dump app-probe flow
- dump app-probe prefix
- dump app-probe status
- dump auth config
- dump auth status
- dump banner config
- dump bfd status
- dump bypass-pair config
- dump cellular config
- dump cellular stats
- dump cellular status
- dump cgnxinfra status
- dump cgnxinfra status live
- dump cgnxinfra status store
- dump config network
- dump config security
- dump controller cipher
- dump controller status
- dump device accessconfig
- dump device conntrack count
- dump device date
- dump device info
- dump device status
- dump dhcp-relay config
- dump dhcprelay stat
- dump dhcp-server config
- dump dhcp-server status
- dump dhcpstat
- dump dnsservice config all
- dump dpdk cpu
- dump dpdk interface
- dump dpdk port status
- dump dpdk stats
- dump flow
- dump flow count-summary
- dump interface config
- dump interface status
- dump interface status interface details
- dump interface status interface module
- dump intra cluster tunnel
- dump ipfix config collector-contexts
- dump ipfix config derived-exporters
- dump ipfix config filter-contexts
- dump ipfix config ipfix-overrides
- dump ipfix config prefix-filters
- dump ipfix config profiles
- dump ipfix config templates
- dump lldp
- dump lldp config
- dump lldp info
- dump lldp stats
- dump lldp status
- dump log-agent eal conn
- dump log-agent eal response-time
- dump log-agent eal stats
- dump log-agent config
- dump log-agent iot snmp config
- dump log-agent iot snmp device discovery stats
- dump log-agent ip mac bindings
- dump log-agent neighbor discovery stats
- dump log-agent status
- dump ml7 mctd counters
- dump ml7 mctd session
- dump ml7 mctd version
- dump nat counters
- dump nat6 counters
- dump nat summary
- dump network-policy config policy-rules
- dump network-policy config policy-sets
- dump network-policy config policy-stacks
- dump network-policy config prefix-filters
- dump overview
- dump performance-policy config policy-rules
- dump performance-policy config policy-sets
- dump performance-policy config policy-set-stacks
- dump performance-policy config threshold-profile
- dump poe system config
- dump poe system status
- dump priority-policy config policy-rules
- dump priority-policy config policy-sets
- dump priority-policy config policy-stacks
- dump priority-policy config prefix-filters
- dump probe config
- dump probe profile
- dump radius config
- dump radius statistics
- dump radius status
- dump reachability-probe config
- dump qos-bwc config
- dump reachability-probe status
- dump routing aspath-list
- dump routing cache
- dump routing communitylist
- dump routing multicast config
- dump routing multicast igmp
- dump routing multicast interface
- dump routing multicast internal vif-entries
- dump routing multicast mroute
- dump routing multicast pim
- dump routing multicast sources
- dump routing multicast statistics
- dump routing multicast status
- dump routing ospf
- dump routing peer advertised routes
- dump routing peer config
- dump routing peer neighbor
- dump routing peer received-routes
- dump routing peer routes
- dump routing peer route-via
- dump routing peer status
- dump routing peer route-json
- dump routing prefixlist
- dump routing prefix-reachability
- dump routing route
- dump routing routemap
- dump routing running-config
- dump routing summary
- dump routing static-route reachability-status
- dump routing static-route config
- dump routing vpn host tracker
- dump security-policy config policy-rules
- dump security-policy config policy-set
- dump security-policy config policy-set-stack
- dump security-policy config prefix-filters
- dump security-policy config zones
- dump sensor type
- dump sensor type summary
- dump serviceendpoints
- dump servicelink summary
- dump servicelink stats
- dump servicelink status
- dump site config
- dump snmpagent config
- dump snmpagent status
- dump software status
- dump spoke-ha config
- dump spoke-ha status
- dump standingalarms
- dump static-arp config
- dump static host config
- dump static routes
- dump support details
- dump-support
- dump switch fdb vlan-id
- dump switch port status
- dump switch vlan-db
- dump syslog config
- dump syslog-rtr stats
- dump syslog status
- dump time config
- dump time log
- dump time status
- dump troubleshoot message
- dump user-id agent config
- dump user-id agent statistics
- dump user-id agent status
- dump user-id agent summary
- dump user-id groupidx
- dump user-id group-mapping
- dump user-id ip-user-mapping
- dump user-id statistics
- dump user-id status
- dump user-id summary
- dump user-id useridx
- dump vlan member
- dump vpn count
- dump vpn ka all
- dump vpn ka summary
- dump vpn ka VpnID
- dump vpn status
- dump vpn summary
- dump vrf
- dump waninterface config
- dump waninterface summary
-
- inspect app-flow-table
- inspect app-l4-prefix lookup
- inspect app-map
- inspect certificate
- inspect certificate device
- inspect cgnxinfra role
- inspect connection
- inspect dhcplease
- inspect dhcp6lease
- inspect dpdk ip-rules
- inspect dpdk vrf
- inspect fib
- inspect fib-leak
- inspect flow-arp
- inspect flow brief
- inspect flow-detail
- inspect flow internal
- inspect interface stats
- inspect ipfix exporter-stats
- inspect ipfix collector-stats
- inspect ipfix app-table
- inspect ipfix wan-path-info
- inspect ipfix interface-info
- inspect ip-rules
- inspect ipv6-rules
- inspect lqm stats
- inspect memory summary
- inspect network-policy conflicts
- inspect network-policy dropped
- inspect network-policy hits policy-rules
- inspect network-policy lookup
- inspect performance-policy fec status
- inspect performance-policy hits analytics
- inspect performance-policy incidents
- inspect performance-policy lookup
- inspect policy-manager status
- inspect policy-mix lookup-flow
- inspect priority-policy conflicts
- inspect priority-policy dropped
- inspect priority-policy hits default-rule-dscp
- inspect priority-policy hits policy-rules
- inspect priority-policy lookup
- inspect performance-policy incidents
- inspect performance-policy lookup
- inspect performance-policy hits analytics
- inspect process status
- inspect qos-bwc debug-state
- inspect qos-bwc queue-history
- inspect qos-bwc queue-snapshot
- inspect routing multicast fc site-iface
- inspect routing multicast interface
- inspect routing multicast mroute
- inspect security-policy lookup
- inspect security-policy size
- inspect servicelink conn
- inspect servicelink SA
- inspect switch mac-address-table
- inspect system arp
- inspect system ipv6-neighbor
- inspect system vrf
- inspect vpn status
- inspect vrf
- inspect wanpaths
-
-
5.6
- 5.6
- 6.1
- 6.2
- 6.3
- 6.4
- 6.5
- New Features Guide
- On-Premises Controller
- Prisma SD-WAN CloudBlades
- Prisma Access CloudBlade Cloud Managed
- Prisma Access CloudBlade Panorama Managed
-
- Features Introduced in Prisma SD-WAN ION Release 5.6
- Changes to Default Behavior in Prisma SD-WAN ION Release 5.6
- Upgrade ION 9000 Firmware for Device Version 5.6.x
- CLI Commands in Prisma SD-WAN ION Release 5.6
- Addressed Issues in Prisma SD-WAN ION Release 5.6
- Known Issues in Prisma SD-WAN ION Release 5.6
Configure IPSec and GRE in Prisma SD-WAN
Lets see how to configure IPSec and GRE tunnel configuration in the Prisma SD-WAN web interface.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
This workflow simplifies the integration between Prisma SD-WAN and Zscaler by
automating the creation, management, and maintenance of third-party IPSec VPN
tunnels. By leveraging this one-touch integration, branch sites can seamlessly
connect to Zscaler without manual configuration.
After the CloudBlade is configured, the next task is to configure Prisma SD-WAN
sites, and tag the circuit categories to denote which sites and circuit types are
candidates for auto Standard VPN tunnel and GRE tunnel creation to Zscaler.
- In Strata Cloud Manager, go to MonitorPrisma SD-WANBranch Sites.
- Switch to List View, search for the required branch site, and open the site details page.
- Go to the Configurations tab and click Configure to initiate the Zscaler integration process.The Configure button remains disabled if no circuits are attached or the CloudBlade is not enabled.
- On the Connect to Zscaler screen, select the tunnel type (IPSec or GRE) for configuration.To configure the GRE Tunnel, ensure that a Security Zone is associated with a Security Policy, and the Security Policy is bound to the site. Associating a Security Zone is mandatory for GRE tunnels. Go here to configure GRE endpoints for both primary and secondary tunnels.
- Select the preconfigured Security Zone and specify the Custom Endpoint for both primary and secondary tunnels (version 2.0.0 onwards).When using custom endpoints for GRE tunnels, ensure the IP addresses are listed among the closest data centers and belong to data centers in different locations.
- To configure the IPSec tunnel, set up a custom Standard VPN Endpoint if needed instead of the one managed by CloudBlade.
- Configure the Gateway, Sub-Locations, and Endpoints options.
- To configure the Gateway options at the parent
location level, select the required settings to ensure all traffic from
this location follows the configured options.
- To configure different gateway option settings for different sources of
traffic from this site, define sub-locations by entering the
sub-location name and IP address under the
Sub-Locations tab.You can enter multiple IP addresses for the sub-location. Each sub-location entry can be a single IP address, CIDR, or range.Adding the first sub-location automatically creates a new sub-location called Other. All existing policy rules that reference the parent location will now apply to the other location. You must manually configure rules for traffic from this sub-location.You can enable the following options in Gateways or Sub-Locations to customize configurations.
Gateway Option Description Enable XFF from Client Request Use this option if the location employs proxy chaining to forward traffic to the service and you want Zscaler to utilize X-Forwarded-For (XFF) headers inserted by your on-premise proxy. When forwarding traffic to its destination, Zscaler removes the original XFF header and replaces it with the IP address of the client gateway (public IP) to prevent exposure of internal IP addresses. Enforce Firewall Control Activates the firewall at the specified location. Enforce IPS Control Enables user-to-device mapping when an internal IP can be differentiated from a public IP. This ensures user policies apply to cookie-incompatible traffic. Enforce Authentication Requires identification of individual user traffic using the configured authentication mechanism. Enforce Caution Enforces a caution policy action by displaying an end-user notification for unauthenticated traffic. If disabled, the action is treated as Allow. Enforce AUP(Acceptable Use Policy) Displays an Acceptable Use Policy (AUP) for unauthenticated traffic and requires users to accept it. Enforce IP Surrogate Enables user-to-device mapping for enforcing user policies when an internal IP can be distinguished from a public IP. This is essential for cookie-incompatible traffic. Idle Time to Disassociation If IP Surrogate is enabled, specifies the duration after a completed transaction before the service removes the IP-to-user mapping. Enforce Surrogate IP for Known Browsers If enabled, surrogate user identity is used for traffic from known browsers if an IP-user mapping exists. If disabled, traffic from known browsers will always be authenticated using the configured authentication mechanism. Surrogate Identity Refresh Interval Defines how long a surrogate user identity can be used before requiring revalidation via authentication. The refresh interval must be shorter than the DHCP lease time to prevent incorrect user policies from being applied. Custom AUP Frequency Specifies, in days, how often the Acceptable Use Policy is displayed to users. Block Internet Access Disables all internet access, including non-HTTP traffic, until the user accepts the Acceptable Use Policy. By default, any changes to the IPSec and GRE configurations apply automatically to both the gateway and sub-locations. - Specify the Endpoints from the drop-down if you
need to use Custom VPN Endpoints for IPSec
tunnels and GRE tunnels (primary and secondary) instead of those managed
by the CloudBlade. If using a custom endpoint, enter the preconfigured Standard VPN Endpoint name (case-sensitive) to be referenced when the CloudBlade configures the Standard VPN interfaces at this site. If no endpoint is specified, the CloudBlade will default to using the ZScaler Standard VPN endpoint, which includes a list of all ZEN node hostnames.If required, enable Interface level override for further customization.
- To configure the Gateway options at the parent
location level, select the required settings to ensure all traffic from
this location follows the configured options.
- Tag the circuit categories.Once the site is enabled for Zscaler, all Internet Circuits associated with this Branch Site can be used to form IPSec and/or GRE Tunnels. The IPSec and GRE configurations will be associated with the circuit categories to allow automatic tunnel formation.You can validate the tunnel configuration by navigating to the Branch Site and confirming if the tags are configured correctly.
- Select Delete Configuration (if required), and select the tunnel type (IPSec or GRE) to remove the Zscaler configuration from the branch site.
- Select Manage to edit any of the existing IPSec and GRE configurations.
Tag the Circuit Categories
Now that the site has been tagged as enabled for Zscaler, we need to tag the
circuit categories that can be used to establish a Standard VPN or GRE tunnel to
Zscaler.
This capability is useful if you want only specific types of circuits to be
used for Zscaler integration or explicitly exclude certain circuit types.
For example, a customer may not want to use their metered LTE circuit for
Standard VPN establishment.
- In Strata Cloud Manager, go to ManageResourcesCircuit Categories.
- Find the circuit categories that are associated with your sites from which you want the system to automatically build the tunnels. Edit the circuit category, and enter AUTO-zscaler and AUTO-zscaler-GRE (case sensitive) in the Tags field.
- Select Update.Once this configuration is completed, Standard VPN IPsec/GRE tunnels connecting the Prisma SD-WAN ION device and Zscaler will begin the creation or onboarding process in the next integration cycle. It may take several integration cycles for the tunnels to appear and be active on the Prisma SD-WAN portal.