Enabling server-initiated traffic on ZTNA Connector Groups.
Where Can I Use This?
What Do I Need?
Prisma Access (Managed by Strata Cloud Manager)
We require a minimum version of Prisma Access 5.0 to
enable ZTNA Connector support.
Prisma Access license includes 10 connectors, 20,000
FQDNs, and 1024 IP subnets. This functionality is provided
for the purpose of trying out ZTNA Connectors in your
environment.
The Private App add-on license
includes 200 ZTNA Connectors, 20,000 FQDNs, and 1024 IP subnet
functionality.
ZTNA Connector is a critical component of the Zero Trust security offering, providing
secure access to your private applications. To deliver a comprehensive and flexible
security solution, the ZTNA Connector has been enhanced to support server-initiated
traffic flow. Now, applications running in your data center can initiate
connections to clients across the Prisma Access ®
fabric.
When you enable server-initiated traffic on a ZTNA Connector Group, it establishes a
bidirectional communication capability. Your data center servers can now establish
TCP, UDP, and ICMP sessions to the following destinations:
GlobalProtect users connected to a GlobalProtect gateway
Remote network hosts
IP subnet hosts in other ZTNA Connector data centers
This functionality is essential for applications such as remote troubleshooting,
device inventory and patch distribution systems, and Voice Over IP (VoIP) applications.
All server-initiated traffic flows are Source NATed (SNAT) using the ZTNA Connector's
IPSec tunnel IP address (this address is from the /27 prefix that the connector got from
the connector IP blocks), therefore mobile user/remote network destinations don't need
private data center IP prefixes in their routing tables.
The data center router can learn the routes into the Prisma Access
network through the data center connectors in two ways:
Static route configuration— Users manually enters all the destination prefixes with
ZTNA Connector IP addresses as next-hops.
Dynamic BGP routing— ZTNA Connector automatically advertises the destination
prefixes to the data center router though a BGP peering connection.
Server-initiated traffic reduces operational complexity while maintaining network
integrity.
Server-initiated traffic establishes server-to-client flows; for optimal organization and
management. Palo Alto Networks recommends that the client-initiated flows and
server-initiated traffic flows should be configured in separate ZTNA Connector
Groups.
Upon receiving the flow, ZTNA Connector first performs a route check based on the
configured destination prefix security rule (the union of MU Pools, RN Prefixes, and
ZTNA IP Subnet targets). If permitted, the Connector then performs Source NAT
(SNAT), translating the data center server's IP to the ZTNA Connector's IPSec
tunnel interface IP. The SNATed traffic is then routed through the Prisma Access Fabric
towards the destination endpoint. You are responsible for enforcing any necessary
security policy on traffic after it exits Prisma Access. Finally,
the GP User or RN Host receives the connection, with the source appearing as the ZTNA
Connector's IPSec IP, and return traffic naturally follows the reverse path back to the
SNAT address, maintaining path symmetry.
Upgrade the Connector with 6.2.8-ztna-connector-b1 image.
Configure server-initiated traffic using the following steps:
Go to ConfigurationZTNA ConnectorConnector Groups and select the Connector Group.
Select Settings and Enable Server Initiated
Traffic.
Configure the Destinations for server-initiated
traffic:
If you want to enable server-initiated connections to GlobalProtect users, select the
Mobile User Pools checkbox to allow access to
all mobile user pools.
If you want to enable server-initiated connections to hosts on remote
networks, select the Remote Network Pools
checkbox and enter the specific IP subnets within the remote network to
allow access.
If you want to server-initiated connections to destinations in another
ZTNA Connector group's IP subnet targets, select the ZTNA
Connector Data Center checkbox, and then select the IP
subnet(s) to allow access.
Currently, there
is no support for ZTNA Connector FQDN targets.
Go to Routing and select the settings icon. Under
Connectors with Server Initiated Traffic Enabled,
select the Connector for which you want to configure the data center routing.
You can select routing as either
Dynamic or
Static.
Select the Routing Type as
Dynamic or Static:
For Dynamic: add AS
Number, Peer AS,
Peer IP Address, and
Secret, if required.
For Static: configure the mobile users
prefixes, remote network prefixes and ZTNA Connector prefixes at
the data center router where ZTNA connectors and this group
reside.
When using static
routing, you must configure every router involved to forward
traffic through the connectors.
The server-initiated connections make flow logs in the ZTNA Connector and the
destination mobile user, remote network, or the other ZTNA Connector. You can
view the ZTNA Connector logs.