Onboard a Remote Network
Table of Contents
Expand All | Collapse All
Prisma Access Docs
- Prisma Access China
- 4.0 & Later
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
- 5.0 Preferred and Innovation
- 4.2 Preferred
- 4.1 Preferred
- 4.0 Preferred
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
Onboard a Remote Network
This section describes the prerequisites for configuring remote networks, as well as how to configure and validate remote network operations.
Where Can I Use This?
What Do I Need?
Once you have planned for your remote network, you can begin the configuration process. This includes onboarding the remote network, connecting the remote network site to Prisma Access, and enabling routing and QoS for the remote network. For each remote network that you want to secure using Prisma Access for networks, you push the required policy configuration to Prisma Access and onboard each remote network so that you can start sending traffic from the remote site through the IPSec tunnel to Prisma Access. Use one of the following procedures to onboard your remote networks depending on your bandwidth allocation type:
Learn how to onboard a remote network.
To onboard a remote network site to Prisma Access, specify the location and define the amount of bandwidth to allocate to the connection.
Here’s how to add a new remote network site to Prisma Access. You’ll start by specifying the location and defining the amount of bandwidth to allocate to the connection.
- Launch Prisma Access Cloud Management.
- Make sure that you have allocated bandwidth to the location where you’ll deploy the remote network. See Planning Checklist for Remote Networks.
- Go to.ManageService SetupRemote NetworksAdd Remote NetworksIf you're usingStrata Cloud Manager, go to.WorkflowsPrisma Access SetupRemote NetworksAdd Remote Networks
- Give the remote network a descriptiveSite Name.
- Select theRegionin which the site is located, and the closest Prisma AccessLocation.
- (Only if you’re planning to use BGP for dynamic routing) EnableECMP Load Balancingso that the remote network site can use up to four IPSec tunnels.BGP is required for ECMP load balancing; QoS and static routes are not supported.When you enable ECMP, Remote Network traffic is load balanced over the tunnels you configure.
- ConfigureAdvanced Settings.
- (Optional) UseStatic Entriesto resolve FQDNs to specific IP addresses.This functionality can be useful if you have guest internet services at your organization and you want your guests to safely use search engines, preventing them from searching for potentially inappropriate or offensive material that could be against company policy. To do so, enter a uniqueNamefor the static entry rule, anFQDN, and the IPAddresswhere the FQDN request should be directed.
- If you want Prisma Access to proxy DNS requests, configure values forUDP Queries Retries(theInterval (Sec)to retry the query in seconds and the number of retryAttemptsto perform.
- Connect a Remote Network Site to Prisma Access, where you’ll create an IPSec VPN tunnel to connect the remote network site to Prisma Access.
- Configure static routing.
- For static routes to route traffic to and from your HQ or data center,Addthe IP subnets or IP addresses that you want to secure at the branch.If you make any changes to the IP subnets on your HQ or data center network, you must manually update the static routes.
- Configure dynamic routing.
- For dynamic routing to advertise HQ or data center subnets,Enable BGP for Dynamic Routing.
- (Optional) Select anMRAI Timervalue.BGP routing offers a timer you can use to tailor BGP routing convergence in your network called theMinimum Route Advertisement Interval (MRAI). MRAI acts to rate-limit updates on a per-destination basis, and the BGP routers wait for at least the configured MRAI time before sending an advertisement for the same prefix. A smaller number gives you faster convergence time but creates more advertisements in your network. A larger number decreases the number of advertisements that can be sent, but can also make routing convergence slower. You decide the number to put in your network for the best balance between faster routing convergence and fewer advertisements.Configure an MRAI range of between 1 and 600 seconds, with a default value of 30 seconds.
- To reduce the number of mobile user IP subnet advertisements over BGP to your customer premises equipment (CPE), specify Prisma Access to summarize the subnets before it advertises them by selectingSummarize Mobile User Routes before advertising.By default, Prisma Access advertises the mobile users IP address pools in blocks of /24 subnets; if you summarize them, Prisma Access advertises the pool based on the subnet you specified. For example, Prisma Access advertises a public user mobile IP pool of 10.8.0.0/20 using the /20 subnet, rather than dividing the pool into subnets of 10.8.1.0/24, 10.8.2.0/24, 10.8.3.0/24, and so on, before advertising them. Summarizing these advertisements can reduce the number of routes stored in CPE routing tables. For example, you can use IP pool summarization with cloud VPN gateways (Virtual Private Gateways (VGWs) or Transit Gateways (TGWs)) that can accept a limited number of routes.
- (Optional) to have Prisma Access originate a default route advertisement for the remote network using eBGP, selectAdvertise Default Route. Be sure that your network does not have another default route being advertised by BGP, or you could introduce routing issues in your network.
- (Optional) If you configured a secondary WAN and you need to change the peer address for the secondary (backup) BGP peer, selectUse different BGP Peer for Secondary Tunneland enter a unique Peer and, optionally, Local IP address for the secondary WAN.
- (Optional) SelectDo Not Export Routesto prevent Prisma Access from forwarding routes into the HQ or data center.By default, Prisma Access advertises all BGP routing information, including local routes and all prefixes it receives from other service connections, remote networks, and mobile user subnets. Select this check box to prevent Prisma Access from sending any BGP advertisements, but still use the BGP information it receives to learn routes from other BGP neighbors.Because Prisma Access does not send BGP advertisements, if you select this option you must configure static routes on your on-premises equipment to establish routes back to Prisma Access.
- Enter thePeer IP Addressassigned as the Router ID of the eBGP router on the HQ or data center network.
- Enter thePeer AS, the autonomous system (AS) for your network.Use and RFC 6996-compliant BGP Private AS number.
- Enter theLocal IP Addressthat Prisma Access uses as its Local IP address for BGP.A local address is only required if your HQ or data center device requires it for BGP peering to be successful. Make sure the address you specify does not conflict or overlap with IP addresses in the infrastructure subnet or subnets in the remote network.
- Enter aSecretpassword to authenticate BGP peer communications.
- SelectConfirm Secret.
Configure a Prisma Access remote network deployment that allocates bandwidth by compute location.
To configure a Prisma Access remote network deployment that allocates bandwidth by compute location, complete the following steps.
If you need to onboard many remote networks (up to 1,000), you can onboard a remote network using the following procedure, then export the remote network configuration to a CSV file, add the other remote networks you want to onboard to the CSV file, then import the CSV file to save the configuration into Prisma Access.
- Selectand edit the settings by clicking the gear icon in thePanoramaCloud ServicesConfigurationRemote NetworksSettingsarea.
- In the Templates section,Addany templates that contain configuration you want to push to Prisma Access for networks. For example, if you have existing templates that contain your zone configurations, or IPSec tunnel, IKE Gateway, or crypto profile settings, you can add them to the predefined Remote_Network_Template_Stack to simplify the onboarding process.You canAddmore than one template to the stack and then order them appropriately usingMove UpandMove Down. This is important because Panorama evaluates in the stack from top to bottom, with settings in templates higher in the stack taking priority over the same settings specified in templates lower in the stack. Note that you cannot move the default template from the top of the stack.
- Select theParent Device Groupfor Prisma Access for remote networks. You can select an existing device group or useShared.You will push all of the configuration—including the security policy, security profiles, and other policy objects (such as application groups and objects, and address groups), HIP objects and profiles and authentication policy—that Prisma Access for networks needs to enforce consistent policy to your remote network users using the device group hierarchy you specify here.You don’t need to define all of the policy that you will push to the remote network yet. Instead, configure the settings to onboard the remote site. You can then go back and add the templates and device groups with the complete configurations to push consistent policy out to your remote networks.
- (Optional) If you have configured a next-generation firewall as a master device or added a Cloud Identity Engine profile to make user and group information selectable in security policies, selectUser-ID Master DeviceorCloud Identity Engine; then, select either the Master Device or the Cloud Identity Engine profile that you created.
- If you will be configuring remote networks that have overlapping subnets, select theOverlapped Subnetscheck box to enable outbound internet access for those locations.While configuring Remote Network Locations with Overlapping Subnets introduces some limitations, it is acceptable in some cases (for example, if you want to add a guest network at a retail store location).
- (Optional) ConfigureDNS Proxysettings for your remote network.Prisma Access allows you to specify DNS servers to resolve both domains that are internal to your organization and external domains. If you do not specify any settings, Prisma Access does not proxy DNS requests for remote networks.
- In theRemote_Network_Device_Groupdevice group, selectandPoliciesSecurityAdda security policy rule with anApplicationofDNSand anActionofAllowto allow DNS traffic.Without a security policy rule to allow DNS traffic, DNS resolution does not occur.
- If you configure Prisma Access to proxy the DNS requests from your remote networks, update the DNS settings on all the endpoints in that network to use the Prisma AccessRemote Network DNS Proxy IP Addressas the primary DNS server and use your DNS server as secondary DNS server. You can get this DNS proxy IP from.PanoramaCloud ServicesStatusNetwork DetailsService Infrastructure
- Addone or moreDNS Proxysettings, entering the following values:
- Select aRegionfrom the drop-down at the top of the window.SelectWorldwideto apply the DNS settings globally, select a specific theater, or select settings per location group (a group of locations that is smaller than the theater). If you add multiple settings, the location group settings are used first, then the theater settings, then the worldwide settings. Prisma Access evaluates the rules from top to bottom in the list.
- Addone or more rules to configure the DNS settings forInternal Domains.
- Enter a uniqueRule Namefor the rule.
- you want your internal DNS server to only resolve the domains you specify, enter the domains to resolve in theDomain List. Specify an asterisk in front of the domain; for example, *.acme.com. You can specify a maximum of 1,024 domain entries.
- If you have aCustom DNS serverthat can access your internal domains, specify thePrimary DNSandSecondary DNSserver IP addresses, or selectUse Cloud Defaultto use the default Prisma Access DNS server.
- Specify the DNS settings forPublic Domains.
(Optional) You canAddaDNS Suffixto specify the suffix that the client should use locally when an unqualified hostname is entered that it cannot resolve, for example, acme.local. Do not enter a wildcard (*) character in front of the domain suffix (for example, acme.com). You can add multiple suffixes.
- Use Cloud Default—Use the default Prisma Access DNS server.
- Same as Internal Domains—Use the same server that you use to resolve internal domains. When you select this option, the DNS Server used to resolve public domains is same as the server configured for the first rule in theInternal Domainssection.
- Custom DNS server—If you have a DNS server that can access your public (external) domains, enter the Primary DNS server address in that field.
- If you want Prisma Access to proxy DNS requests, configure Configure values for the use for UDP queries (theIntervalto retry the query in seconds and the number of retryAttemptsto perform).If you want Prisma Access to proxy DNS requests for your GlobalProtect users, you must update your endpoints to use theRemote Network DNS Proxy IP Addressas the primary DNS server ().PanoramaCloud ServicesStatusNetwork DetailsService Infrastructure
- (Optional) Select Advanced RCODE Support to allow the primary DNS server to fail over to the secondary DNS server if an RCODE 2 (SERVFAIL) and RCODE 5 (REFUSED) DNS return code is received.A DNS response code of SERVFAIL refers to a communication error with the primary DNS server, and a DNS response code of REFUSED means that the primary DNS server refused to provide the requested information. In both cases, the service fails over to the secondary DNS server.
- (Optional) UseStatic IP Entriesto resolve FQDNs to specific IP addresses.Namefor the static entry rule, anFQDN, and the IPAddresswhere the FQDN request should be directed.
- (Optional) EnableQoSfor your remote network deployment and specify aQoS Profile,Guaranteed Bandwidth Ratio, the amount ofReserved for Guaranteed Bandwidth (Mbps)bandwidth and, optionally, customize site options per location (Customize Per Site).You enable QoS at a compute location level; however, you can specify to enable or disable QoS on a per-site basis, and specify a QoS profile on a per-site basis, when you add your remote network in a later step. Before you configure QoS, you should understand how QoS works for remote networks that allocate bandwidth by compute location, including specifying the guaranteed bandwidth and customizing bandwidth per site.
- (Optional) ConfigureGroup Mapping Settingsto have Prisma Access use the Directory Sync component of the Cloud Identity Engine to retrieve user and group information.
- Create new zones in the one of the templates in the stack (Network > Zones> Add) or map the zones referenced in existing templates you added to the stack as trusted or untrusted. On Panorama, policy rules are defined in device groups, and zones are defined in templates. Therefore, you need to make sure that you add the templates that reference the zones included in your policy rules to the template stack.On a Palo Alto Networks® next-generation firewall, security policy is enforced between zones, which map to physical or virtual interfaces on the firewall. But as Prisma Access for networks has only two zones, trust and untrust, you need to map any zone with traffic bound to the Internet (including your sanctioned SaaS applications) as untrust and all internal zones as trust.
- (Optional) Edit the zone mapping settings.By default, all of the zones in Prisma Access for networks template stack a are classified as Untrusted Zones. If you have not yet defined zones or if the templates in the Remote_Network_Template_Stack do not have zone configurations, you can come back and add them when you push policy to Prisma Access for networks.
- For each zone you want to designate as trusted, select it and clickAddto move it to the list ofTrusted Zones.
- ClickOKto save the mappings.
- Allocate bandwidth for the locations that you want to onboard by clicking the gear icon in theBandwidth Allocationarea.You allocate bandwidth at an aggregate level per compute location. See Prisma Access Remote Networks for details.If you have removed Autonomous DEM as an add-on license, or if you remove Autonomous DEM for remote networks from your license, selectDisable Autonomous DEM. If you remove Autonomous DEM for remote networks and do not disable Autonomous DEM, you will receive an error upon commit.If you have an existing remote networks deployment that currently onboards remote networks by location, a pop-up window displays, asking if you want to migrate to the aggregate bandwidth model. ClickMigrateto continue, orCancelto cancel the migration.TheService IP Address(the public IP addresses used on the Prisma Access side of the IPSec tunnel for the remote network connection) do not change when you migrate your deployment to the aggregate bandwidth model, and no reconfiguration of your IPSec tunnel is required.
- Enter theBandwidth Allocationyou want for eachCompute Locationthat is associated with thePrisma Access Locationsyou want to onboard.To verify the bandwidth amount you entered, select the check mark next to the bandwidth amount; to cancel the amount, selectx.Specify a minimum bandwidth of 50 Mbps and a maximum bandwidth of the maximum remaining licensed bandwidth.
- (Optional, Deployments with Autonomous DEM for Remote Networks Licenses Only)EnableAutonomous DEM Allocationfor the compute location for which you allocated bandwidth.If you enable Autonomous DEM for the compute location, the amount of bandwidth used by the Autonomous DEM license is the same as the bandwidth you specify for the compute location. TheAutonomous DEM Allocated Totalshows you how much bandwidth is used by Autonomous DEM and how much is remaining. See the Autonomous DEM guide for more information.
- Wait for the bandwidth to be reflected in theAllocated Totalfield at the top of the page; then, clickOK.
- (Optional)If you want to configure your remote network to provide secure inbound access to remote network locations, click theInbound Access Remote Networkstab and follow the workflow to configure secure inbound access for a remote network.
- Adda remote network and specify aName.You cannot change the name of the remote network location after you enter it. Make sure you know your naming scheme for your remote networks before you begin onboarding.
- (Optional, BGP deployments only) Create a configuration so that your remote network connection can use up to four IPSec tunnels for its traffic (ECMP Load Balancing).
- Select one of the choices to enable or disable ECMP load balancing.
- None—Do not use ECMP load balancing (use a single remote network tunnel for this remote network connection). This is the only choice you can make for static routes; BGP is required for ECMP load balancing.
- Enabled with Symmetric Return—Specify up to four IPSec tunnels for this remote network connection and force Prisma Access to use the same link for the return traffic as it used to send the traffic.Select this option if you use one or more tunnels as a backup tunnel to be used only if one of the primary tunnels go down. If a link fails, Prisma Access uses one of the other tunnels to send and receive traffic symmetrically.
- Addan IPSec tunnel for the remote network connection and specify the following values:
- Enable—Enables BGP for the IPSec tunnel.This selection is not configurable; you must enable BGP to configure ECMP.
- Summarize Mobile User Routes before advertising—Reduces the number of mobile user IP subnet advertisements over BGP to your customer premises equipment (CPE) by summarizing them.By default, Prisma Access advertises the mobile users IP address pools in blocks of /24 subnets; if you summarize them, Prisma Access advertises the pool based on the subnet you specified. For example, Prisma Access advertises a public user mobile IP pool of 10.8.0.0/20 using the /20 subnet, rather than dividing the pool into subnets of 10.8.1.0/24, 10.8.2.0/24, 10.8.3.0/24, and so on before advertising them. Summarizing these advertisements can reduce the number of routes stored in CPE routing tables. For example, you can use IP pool summarization with cloud VPN gateways (Virtual Private Gateways (VGWs) or Transit Gateways (TGWs)) that can accept a limited number of routes.If you enable route summarization for a location that uses ECMP, you must enable route summarization on all links to that location, or you will receive an error during commit.Prisma Access sets the community string for aggregated mobile user routes to0xFFFE:0xFFF0.
- Advertise Default Route—Prisma Access originates a default route advertisement for the remote network using eBGP.Be sure that your network does not have another default route being advertised by BGP, or you could introduce routing issues in your network.
- Don’t Advertise Prisma Access Routes—Prevents the Prisma Access BGP peer from forwarding routes into your organization’s network.By default, Prisma Access advertises all BGP routing information, including local routes and all prefixes it receives from other service connections, remote networks, and mobile user subnets. Select this check box to prevent Prisma Access from sending any BGP advertisements, but still use the BGP information it receives to learn routes from other BGP neighbors.Since Prisma Access does not send BGP advertisements if you select this option, you must configure static routes on the on-premises equipment to establish routes back to Prisma Access.
- (Optional) Select anMRAItimer value.BGP routing offers a timer you can use to tailor BGP routing convergence in your network called theMinimum Route Advertisement Interval (MRAI). MRAI acts to rate-limit updates on a per-destination basis, and the BGP routers wait for at least the configured MRAI time before sending an advertisement for the same prefix. A smaller number gives you faster convergence time but creates more advertisements in your network. A larger number decreases the number of advertisements that can be sent, but can also make routing convergence slower. You decide the number to put in your network for the best balance between faster routing convergence and fewer advertisements.Configure an MRAI range of between 1 and 600 seconds, with a default value of 30 seconds.
- Peer AS—Specify the autonomous system (AS) to which the firewall, virtual router, or BGP router at your remote network belongs.
- Peer IP Address—Enter the IP address assigned as the Router ID of the eBGP router on the remote network for which you are configuring this connection.
- Local IP Address(Optional)—Enter an address that Prisma Access uses as its Local IP address for BGP. Specify the IP address to use on the Prisma Access side of the tunnel.Specifying aLocal Addressis useful where the device on the other side of the connection (such as an Amazon Web Service (AWS) Virtual Private Gateway) requires a specific local IP address for BGP peering to be successful. Make sure that the address you specify does not conflict or overlap with IP addresses in the Infrastructure Subnet or subnets in the remote network.
- SecretandConfirm Secret(Optional)—Enter and confirm a passphrase to authenticate BGP peer communications.
- Repeat the previous step to add up to four tunnels to use with the remote network connection.
- Select theLocationin which Prisma Access will deploy the infrastructure required to secure your remote network location. This region should be geographically located close to your remote network location.If you have not yet allocated bandwidth for the compute location to which the location maps, Prisma Access prompts you to enter bandwidth for that compute location.Locations denoted with two asterisks areLocal Zones. These locations place compute, storage, database, and infrastructure services close to large population and industry centers. When you use these zones, keep in mind the following guidelines:
- 1 Gbps remote network throughput is not supported (these locations support a maximum of 500 Gpbs).
- Remote network and service connection node redundancy across availability zones is not available if you deploy them in the same local zone, as both nodes are provisioned in a single zone.
- Select theIPSec Termination Nodethat you want to use for this remote network.Prisma Access uses this node to associate remote network locations with compute locations.
- (Static routing or single-tunnel deployments only) Select or add a newIPSec Tunnelconfiguration to access the firewall, router, or SD-WAN device at the corporate location:
- Select one of the predefined IPSec templates in the Remote_Network_Template, or, if you have added a template to the Remote_Network_Template_Stack (or modified the predefined Remote_Network_Template) that includes an IPSec Tunnel configuration, select thatIPSec Tunnelfrom the drop-down. Note that the tunnel you are creating for each remote network connection connects Prisma Access to the IPSec-capable device at each branch location.Use the following guidelines when configuring an IPSec tunnel:
- The peer addresses in the IKE Gateway configuration must be unique for each tunnel. You can, however, re-use some of the other common configuration elements, such as crypto profiles.
- The IPSec Tunnel you select from a template must use Auto Key exchange and IPv4 only.
- The IPSec tunnel, IKE gateway, and crypto profile names cannot be longer than 31 characters.
- If you onboard multiple remote networks to the same location with dynamic IKE peers, you must use the same IKE crypto profile for all remote network configurations.
- To create a new IPSec Tunnel configuration, clickNew IPSec Tunnel, give it aNameand configure the IKE Gateway, IPSec Crypto Profile, and Tunnel Monitoring settings.
- If the IPSec-capable device at your branch location uses policy-based VPN, on theProxy IDstab,Adda proxy ID that matches the settings configured on your local IPSec device to ensure that Prisma Access can successfully establish an IPSec tunnel with your local device.
- LeaveEnable Replay Protectionselected to detect and neutralize against replay attacks.
- SelectCopy TOS Headerto copy the Type of Service (TOS) header from the inner IP header to the outer IP header of the encapsulated packets in order to preserve the original TOS information.
- To enable tunnel monitoring for the service connection, selectTunnel Monitor.
You must configure a static route on your CPE to the Tunnel Monitor IP Address for tunnel monitoring to function. To find the destination IP address to use for tunnel monitoring from your branch location to Prisma Access, select, click thePanoramaCloud ServicesStatusNetwork DetailsService Infrastructureradio button, and find theTunnel Monitor IP Address.
- Enter aDestination IPaddress.Specify an IP address at your branch location to which Prisma Access can send ICMP ping requests for IPSec tunnel monitoring. Make sure that this address is reachable by ICMP from the entire Prisma Access infrastructure subnet.
- If you use tunnel monitoring with a peer device that uses multiple proxy IDs, specify aProxy IDor add aNew Proxy IDthat allows access from the infrastructure subnet to your branch location.The following figure shows a proxy ID with the service infrastructure subnet (172.16.55.0/24 in this example) as theLocalIP subnet and the branch location’s subnet (10.1.1.0/24 in this example) as theRemotesubnet.The following figure shows the Proxy ID you created being applied to the tunnel monitor configuration by specifying it in theProxy IDfield.
- If you have a secondary WAN link at this location, selectEnable Secondary WAN.Be sure to create a unique IPSec tunnel for each remote network’s secondary WAN; Prisma Access does not support reusing the same IPSec tunnel for secondary WANs in multiple remote networks.Configuring a Secondary WAN is not supported in the following deployments:
If you use static routes, tunnel failover time is less than 15 seconds from the time of detection, depending on your WAN provider.If you configure BGP routing and have enabled tunnel monitoring, the shortest default hold time to determine that a security parameter index (SPI) is failing is the tunnel monitor, which removes all routes to a peer when it detects a tunnel failure for 15 consecutive seconds. In this way, the tunnel monitor determines the behavior of the BGP routes. If you do not configure tunnel monitoring, the hold timer determines the amount of time that the tunnel is down before removing the route. Prisma Access uses the default BGP HoldTime value of 90 seconds as defined by RFC 4271, which is the maximum wait time before Prisma Access removes a route for an inactive SPI. If the peer BGP device has a shorter configured hold time, the BGP hold timer uses the lower value.When the secondary tunnel is successfully installed, the secondary route takes precedence until the primary tunnel comes back up. If the primary and secondary are both up, the primary route takes priority.If you use a different BGP peer for the secondary (backup) connection, Prisma Access does not honor the Multi-Exit Discriminator (MED) attributes advertised by the CPE. This caveat applies if you use multiple BGP peers on either remote network connections or service connections.
- If your secondary WAN is set up in active-active mode with the Primary IPSec tunnel.
- If your customer premises equipment (CPE) is set up in an Equal Cost Multipath (ECMP) configuration with the Primary and Secondary IPSec tunnel.
- Enable routing to the subnetworks or individual IP addresses at the remote network site that your users will need access to.Prisma Access uses this information to route requests to the appropriate site. The networks at each site cannot overlap with each other or with IP address pools that you designated for the service infrastructure or for the Prisma Access for users IP pools. You can configureStatic Routes,BGP, or a combination of both.
- To configureStatic Routes:
- On theStatic Routestab, clickAddand enter the subnetwork address (for example, 22.214.171.124/24) or individual IP address of a resource, such as a DNS server (for example, 10.32.5.1/32) that your remote users will need access to.
- Repeat for all subnets or IP addresses that Prisma Access will need access to at this location.
- To configureBGP:
- Select theBGPtab.
- If you selectNoneforECMP Load Balancing, enter the BGP choices.
- To enable BGP for the remote network connection, selectEnable.When you enable BGP, Prisma Access sets the time to live (TTL) value for external BGP (eBGP) to 8 to accommodate any extra hops that might occur between the Prisma Access infrastructure and your customer premises equipment (CPE) that terminates the eBGP connection.
- To reduce the number of mobile user IP subnet advertisements over BGP to your customer premises equipment (CPE) by summarizing them, selectSummarize Mobile User Routes before advertising.Prisma Access sets the community string for aggregated mobile user routes to0xFFFE:0xFFF0.
- To allow Prisma Access to advertise a default route for the remote network using eBGP, selectAdvertise Default Route.If you selectAdvertise Default Route, be sure that your network does not have another default route being advertised by BGP, or you could introduce routing issues in your network.You must publish your default routes before you make this selection to advertise them. In addition, be sure that your network does not have another default route being advertised by BGP, or you could introduce routing issues in your network.
- To prevent the BGP peer on the Prisma Access firewall from forwarding routes into your organization’s network, selectDon’t Advertise Prisma Access Routes.
- Enter thePeer AS, which is the autonomous system (AS) to which the firewall, virtual router, or BGP router at your remote network belongs.
- Enter the IP address assigned as the Router ID of the eBGP router on the remote network for which you are configuring this connection as thePeer Address.
- (Optional) Enter an address that Prisma Access uses as its Local IP address for BGP.Local Addressis useful where the device on the other side of the connection (such as an Amazon Web Service (AWS) Virtual Private Gateway) requires a specific local IP address for BGP peering to be successful. Make sure that the address you specify does not conflict or overlap with IP addresses in the Infrastructure Subnet or subnets in the remote network.You must configure a static route on your CPE to the BGPLocal Address.
- (Optional) Enter and confirm a passphrase to authenticate BGP peer communications.
- (Optional) If you configured aSecondary WANand you need to change thePeer AddressorLocal Addressfor the secondary (backup) BGP peer, deselectSame as Primary WANand enter a unique Peer and, optionally, Local IP address for the secondary WAN.In some deployments (for example, when using BGP to peer with an AWS VPN gateway), the BGP peer for the primary and secondary WAN might be different. In those scenarios, you can choose to set a different BGP peer for the secondary WAN.For BGP deployments with secondary WANs, Prisma Access sets both the primary and secondary tunnels in anUPstate, but follows normal BGP active-backup behavior for network traffic. Prisma Access sets the primary tunnel as active and sends and receives traffic through that tunnel only; if the primary tunnel fails, Prisma Access detects the failure using BGP rules, sets the secondary tunnel as active, and uses only the secondary tunnel to send and receive traffic.
- (Optional) EnableQoSfor the location and specify aQoS Profile.
- Commit the configuration changes to Panorama and push the configuration out to Prisma Access for networks.
- Click.CommitCommit to Panorama
- Click. ClickCommitCommit and Push, and select both Prisma Access for networks and Prisma Access for service setup to push the configuration out to the service.Edit SelectionsPrisma Access
- Configure the IPSec-capable device at the remote network location to set up an IPSec connection with Prisma Access for networks.
- Find theService IP Addressfor this remote network connection by selecting, clicking thePanoramaCloud ServicesStatusNetwork DetailsRemote Networksradio button, and viewing theService IP Addressfield. Prisma Access for networks infrastructure has assigned this IP address for the Prisma Access remote network connection, and you must configure this as the peer IP address to set up the IPSec tunnel between the remote network location and Prisma Access for networks.
- Check theLocal IP addressfor the device at the remote network location on thepage. If you are performing NAT at the remote network location, thePanoramaCloud ServicesStatusNetwork DetailsRemote NetworksLocal IP addressdisplays the IP address of the device after NAT.
- To secure traffic at the remote network location you must create security policy rules.
- Select theDevice Groupin which to add policy rules. You can select the Remote_Network_Device_Group or the parent device group that you selected for defining policies to secure the remote network location.
- Create security policy rules. Make sure that you do not define security policy rules to allow traffic from any zone to any zone. In the security policy rules, use the zones that you defined in your template.
- Enable logging to Cortex Data Lake. You must create and attach a log forwarding profile to each policy rule for which you want to forward logs.
- SelectObjects > Log Forwarding.
- Select theDevice Groupin which you added the policy rules, for example, Remote_Network_Device_Group.
- Adda Log Forwarding profile. In the log forwarding profile match list,AddeachLog Typethat you want to forward.
- SelectPanorama/Cortex Data Lakeas the Forward Method to enable Prisma Access to forward the logs to Cortex Data Lake. You will be able to monitor the logs and generate reports from Panorama. Cortex Data Lake provides a seamless integration to store logs without backhauling them to your Panorama at the corporate headquarters, and Panorama can query Cortex Data Lake as needed.The following example enables forwarding of Traffic, Threat Prevention, WildFire Submission, URL Filtering, Data Filtering, and Authentication logs to Cortex Data Lake.
- SelectPolicies > Securityand edit the policy rule. InActions, select the Log Forwarding profile you created.
- Commit all your changes to Panorama and push the configuration changes to Prisma Access.
- Click.CommitCommit and Push
- Edit Selectionsand, in thePrisma Accesstab, make surePrisma Access for networksis selected in thePush Scope, then clickOK.
- Commit and Pushyour changes.
- Check the remote network status.