Docker Container Traffic Support for Linux
Understand how Prisma Access Agent routes Docker container traffic through the Prisma
Access Agent tunnel on Linux endpoints and the considerations that apply.
| Where Can I Use This? | What Do I Need? |
- Prisma Access (Managed by Strata Cloud Manager)
- Prisma Access (Managed by Panorama)
- NGFW (Managed by Panorama)
|
- Check the prerequisites for the deployment you're using
- Linux desktop devices
- Contact your Palo Alto Networks account representative to
activate the Prisma Access Agent feature
|
Prisma® Access Agent for Linux provides support for Docker container traffic, so
developers and DevOps engineers can maintain containerized workflows without losing
tunnel connectivity. When the agent is connected, it automatically detects Docker bridge
network subnets and routes all outbound container traffic through the tunnel, where
Prisma Access security policy controls access.
How It Works
Prisma Access Agent supports Docker traffic in the following ways:
Dynamic Subnet Detection
The agent automatically identifies the subnets associated with Docker bridge
networks (for example, 172.17.0.0/16) and injects the
appropriate routes when the tunnel is established.
Bridge Network Enumeration
Support extends beyond the default docker0 interface to all
user-defined bridge networks, which are typically prefixed with
br-.
Policy-Driven Routing
All outbound container traffic is intercepted and routed through the Prisma
Access Agent tunnel. The Prisma Access security policy then controls access
using Allow or Block rules.
DNS Integration
Containers use the host's DNS settings, which are managed by the agent's
forwarding profiles, ensuring internal resources are resolvable.
Considerations
Keep the following in mind when using Docker container traffic support on Linux
endpoints:
Custom Docker Networks Must Exist Before Connecting to the Tunnel
The agent injects routes at tunnel startup based on the bridge networks that
exist at that time. Networks created after the tunnel is established will not
have their routes injected automatically.
Docker Traffic Is Restricted to the Tunnel
Routing Docker container traffic through physical interfaces is not supported.
Configure a forwarding rule with a Block connectivity
option if you need to prevent Docker traffic from reaching the tunnel.
Block Rules for the Default Bridge Network Apply Only When the Tunnel Is
Active
If the tunnel is not connected, Block rules for the default Docker bridge network
(docker0) are not enforced.
Use tcpdump for Network Diagnostics
For troubleshooting Docker container network traffic, use
tcpdump for packet analysis rather than
pacli commands.