Configure SASE Connectivity
Focus
Focus

Configure SASE Connectivity

Table of Contents

Configure SASE Connectivity

Learn how to configure SASE connectivity for connecting Prisma SD-WAN sites with Prisma Access.
Where Can I Use This?What Do I Need?
  • Strata Cloud Manager
  • Prisma SD-WAN
    • Prisma SD-WAN license
    • Prisma SD-WAN AppFabric deployed at one or more locations.
    • Physical and/or virtual ION devices running software versions 5.6.X or higher.
  • Prisma Access Cloud Managed/Panorama Managed
    • Prisma Access with Aggregate Bandwidth; the bandwidth licensing mode must be enabled per compute location on the Prisma Access Cloud Managed portal.
    • Identification of the IPSec Termination Nodes within Prisma Access for connectivity.
  • Ensure that you have Prisma Access (Cloud Managed/Panorama Managed) and Prisma SD-WAN in the same TSG.
Configure SASE connectivity to set parameters for connecting Prisma SD-WAN sites to Prisma Access.
This is a one-time activity.
  1. Select ManageResourcesSASE Connectivity.
  2. Enter an ION Peering Default Local AS Number.
    The BGP Local AS number is defined to quickly on-board ECMP sites. This can be a 16-bit AS number, but private BGP AS number(s) are recommended.
  3. Select a Deployment Mode.
    The deployment mode supports the auto-configuration of BGP route-map settings for the following cases:
    • Private-App-Access is the default setting which supports both Private App access and Internet.
    • Internet-Only provides Internet only access by limiting route propagation inside Prisma Access with BGP no-advertise.
    • Internet-Only-With-Mobile-User-Access provides Internet and Mobile User access by limiting route propagation out of Prisma Access with BGP no-export.
    Changes to the Deployment Mode affect only new tunnels or tunnels that have been modified.
  4. Specify a Tunnel Inner IP Pool using IP/Mask notation.
    This IP Pool should be unused or unique across the entire network and should not be used by the Palo Alto Service Infrastructure Subnet.
    The number of tunnels that can be created in the Prisma SD-WAN Fabric to Prisma Access are directly limited by this configuration. Each tunnel will use a /31 subnet from this pool.
  5. (Optional) Select a Security Zone to bind the tunnel(s) created in the onboarding process to the selected zone.
    If you don’t select a Security Zone, the created tunnels will not be bound to a security zone.
  6. (Optional) Select a Panorama tenant from the Panorama sub-tenant name drop-down.
    You will see this field only if you have a Prisma Access Panorama-managed tenant.
  7. Click Save.
  8. (Optional) Update IPSec profiles for the tunnel(s) to Prisma Access.
    This synchronizes the IPSec profile between Prisma SD-WAN and Prisma Access.
  9. (Optional) To view additional information for SASE connectivity:
    1. Select WorkflowsPrisma SD-WAN SetupBranch Sites and select a site.
    2. View details in the Prisma Access Connectivity section.