If you are manually adding IP addresses of your Prisma Access infrastructure to an allow
list in your network, or if you are using an automation script to enforce IP-based
restrictions to limit inbound access to enterprise applications, you should understand what
these addresses do and why you need to allow them, as well as the tasks you perform to
retrieve them.
Prisma Access does not provision these IP addresses until after you complete your
Prisma Access configuration. After your deployment is complete, you retrieve
these IP addresses using an API script. The API script uses an API key that you obtain from
the Prisma Access UI and a .txt file you create which specifies the addresses you
want to retrieve.
If you have a Mobile Users—GlobalProtect deployment, you can use the Prisma Access UI
instead of this API to manage public IP address allocation and confirm that the IP
addresses have been added to your allow lists before Prisma Access releases the IP
addresses. In this way, Prisma Access only provisions the IP addresses that you have allow
listed.
The following table provides you with a list of the IP address that Prisma Access uses for
each deployment type, along with the keyword you use when you run the API script to retrieve
the IP addresses, and describes whether or not you should add them to your organization’s
allow lists.
| Deployment Type | IP Address Type | Description |
| Mobile Users—GlobalProtect | Prisma Access gateway (gp_gateway) |
Gateway IP addresses. You must add both gateway and portal IP addresses to allow
lists for your mobile user deployments.
Mobile users connect to a Prisma Access gateway to access internal or internet
resources, such as SaaS or public applications, for which you have provided
access.
For mobile users, during initial deployment, Prisma Access assigns two IP
addresses for each location you deploy.
|
|
Prisma Access portal (gp_portal)
|
Portal IP addresses. You must add both gateway and portal IP addresses to allow
lists for your mobile user deployments.
Mobile users log in to the Prisma Access portal to receive their initial
configuration and gateway location.
|
|
Network Load Balancer (network_load_balancer)
|
|
|
Loopback IP addresses
|
The source IP address used by Prisma Access for requests made to an internal
source, and is assigned from the Configure the Prisma Access Service Infrastructure (Panorama). Add the loopback IP address to an
allow list in your network to give Prisma Access to internal resources such
as RADIUS or Active Directory authentication servers.
Palo Alto Networks recommends that you allow all the IP addresses of the entire
infrastructure subnet in your network, because loopback IP addresses can change.
To find the infrastructure subnet, select . The subnet displays in the Infrastructure
Subnet area.
|
| Mobile Users—Explicit Proxy |
Authentication Cache Service (ACS)
|
The address for the Prisma Access service that stores the authentication state of
the explicit proxy users.
|
|
Network Load Balancer
|
The address that Prisma Access uses for the network load balancer.
|
| Remote Network | Remote Network IP addresses
(remote_network) |
The Service IP Addresses that Prisma Access assigns for
the Prisma Access remote network connection, and Remote Networks: Service Endpoint Address and Egress IP Address Allocation that Prisma Access uses to make
sure that remote network users get the correct default language for their region.
Add these addresses to allow lists in your network to give Prisma Access to
internet resources.
|
| Clean Pipe |
Clean Pipe IP Addresses (clean_pipe)
| Add these IP addresses to an allow list to give the Clean Pipe
service access to internet resources. |