New Features in Prisma Access 5.2
Focus
Focus
Prisma Access

New Features in Prisma Access 5.2

Table of Contents

New Features in
Prisma Access
5.2

Where Can I Use This?
What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • Minimum Required Prisma Access Version
    5.2 Preferred or Innovation
This section provides you with a list of new features in
Prisma Access
5.2 Preferred and Innovation, along with the recommended and required software versions you need to use.
This document contains roadmap information and is being shared for INFORMATIONAL AND PLANNING PURPOSES ONLY. It is not a binding commitment and is subject to change.

Recommended Software Versions for
Prisma Access
5.2 and Innovation

There are two
Prisma Access
5.2 versions:
  • 5.2 Preferred runs a PAN-OS 10.2.10 dataplane. If your deployment is running a lower dataplane version, a dataplane upgrade to PAN-OS 10.2.10 might be required to implement 5.2 Preferred features. If you're an existing customer, see Infrastructure, Plugin, and Dataplane Dependencies for Prisma Access 5.2 Preferred and Innovation Features to see if a dataplane upgrade is required for a
    Prisma Access
    5.2 feature.
  • 5.2 Innovation runs on the PAN-OS dataplane of 11.2.3 dataplane. An upgrade to PAN-OS 11.2.3 is required to implement 5.2 Innovation features.
For new
Prisma Access
5.2 Innovation features,
Prisma Access
recommends that you upgrade your
Prisma Access
to the following versions
before installing the plugin.
Prisma Access
Version
Cloud Services Plugin Version
Required Dataplane Version for 5.2
Recommended GlobalProtect Version
Recommended Panorama Version
5.2
5.2
PAN-OS 10.2.10 (required for 5.2 Preferred)
PAN-OS 11.2.3 (required for 5.2 Innovation)
6.0.7+
6.1.3+
6.2.1+
10.2.10+
11.0.1+
11.1.0
11.2.3

Infrastructure, Plugin, and Dataplane Dependencies for
Prisma Access
5.2 Preferred and Innovation Features

Prisma Access
5.2 features require one of more of the following components to function:
  • Infrastructure Upgrade
    —The infrastructure includes the underlying service backend, orchestration, and monitoring infrastructure.
    Prisma Access
    upgrades the infrastructure before the general availability (GA) date of a
    Prisma Access
    release.
    Features that require only an infrastructure upgrade to be unlocked take effect for all
    Prisma Access
    deployments, regardless of version, at the time of the infrastructure upgrade.
  • Plugin Upgrade (
    Prisma Access
    Panorama Managed Deployments Only
    )
    —Installing the plugin activates the features that are available with that release. You download and install the plugin on the Panorama that manages
    Prisma Access
    .
  • Dataplane Upgrade
    —The dataplane enables traffic inspection and security policy enforcement on your network and user traffic.
    • For
      Prisma Access (Managed by Strata Cloud Manager)
      , go to
      Manage
      Configuration
      NGFW and Prisma Access
      Overview
      .'
    • For
      Prisma Access (Managed by Panorama)
      deployments, you can view your dataplane version by going to
      Panorama
      Cloud Services
      Configuration
      Service Setup
      and viewing the
      Prisma Access
      Version
      .
      Prisma Access
      5.2 Preferred runs PAN-OS 10.2.10 and
      Prisma Access
      Innovation runs PAN-OS 11.2.3.
A dataplane upgrade to 5.2 Innovation is optional, and is only required if you want to take advantage of the features that require a dataplane upgrade.
These features are activated with the
infrastructure upgrade
for
Prisma Access
:
  • Simplify Prisma Access SaaS Connectivity with IP Optimization for Mobile Users and Explicit Proxy Deployments
  • TLS 1.3 and PubSub Support for Traffic Replication
  • View and Monitor Colo-Connect
These features require an
infrastructure and plugin upgrade
but don't require a dataplane upgrade:
  • 25,000 Remote Network and 50,000 IKE Gateway Support
  • Agent Proxy: Private IP from Branches
  • Simplified Prisma Access Private App Connectivity
  • View Prisma Access, Dataplane, and Application and Threats Content Versions in Strata Cloud Manager
The following 5.2 features require an
infrastructure and plugin
upgrade and require a minimum dataplane version of PAN-OS 10.2.10, making them Prisma Access 5.2 Preferred features:
  • Remote Networks—High Performance
The following 5.2 features require an
infrastructure, plugin, and dataplane
upgrade to Prisma Access 11.2.3, making them Prisma Access 5.2 Innovation features:
  • Dynamic Privilege Access Support for ZTNA Connector
  • SC-NAT Support for Dynamic Privilege Access with CIAM
  • ZTNA Connector Support for Commitless App Onboarding

Prisma Access
5.2 Features

The following table describes the new features that will be generally available with
Prisma Access
5.2.

25,000 Remote Network and 50,000 IKE Gateway Support

Supported in:
Prisma Access
5.2 Preferred and Innovation
To implement this feature, reach out to your Palo Alto Networks account team, who will open an SRE case to accommodate the request.
You can onboard a maximum of 25,000 remote networks and 50,000 IKE gateways per tenant in a Prisma Access deployment. To accommodate this enhancement, the following changes have been made to the Strata Cloud Manager web interface starting with Prisma Access 5.1:
  • Introducing pagination so that you can choose how many rows to display in a given page.
  • Filtering is enabled for remote networks.
    After you apply filtering, you can sort the resulting output by name.
  • A new
    Group By
    field is added. If you select a group by
    Compute Location
    , all groups display but are collapsed, and the page size you selected applies to the groups. If you select a compute location to expand it, the rows display based on the page size you selected.
  • When remote networks are displayed in a drop-down, the web interface displays the first 500 items. You can find the desired Remote Network in the list by typing in the text box.
    In addition, the total number of remote networks displays.
  • The following additional pages have pagination applied:
    • IPSec Tunnels:
    • QoS:
    • QoS Statistics:
    • Troubleshooting—Remote Networks
      under
      External Dynamic Lists
      :

Agent Proxy: Private IP from Branches

Supported in:
Prisma Access
5.2 Preferred and Innovation
When utilizing GlobalProtect in Proxy Mode on desktops and systems in the branches, you have the capability to view the source IP address of the device in the branch instead of the public egress IP address of the branch. This capability allows you to view the device's source IP address in the logs, and you can also use this address to enforce policy.

Dynamic Privilege Access Support for ZTNA Connector

Supported in:
Prisma Access
5.2 Innovation
ITES companies and distributed IT service providers face the challenge of providing granular project-based access control for their end users, who are mapped to multiple customer projects or profiles. Dynamic Privilege Access provides a seamless, secure, and compartmentalized way for your users to access only those projects that they are assigned to. Employees are typically assigned to several customer projects and are provided with siloed access to these projects so that an authorized user can access only one customer project at a time. Also, a tenant can have multiple projects. A user working on one project will have access to resources for that project only.
This feature addresses the challenge of providing access to overlapping IP networks for multiple customers, even in the presence of potential IP address overlaps in their private data centers. By creating separate groups for each customer and allowing overlapping addresses within each group, the solution ensures efficient network management. Anycast addresses are assigned to the groups and effectively advertised to the ZTTs, facilitating seamless routing. Static routes are established on the connectors to enable smooth connectivity to the respective networks. With the implementation of a PBF rule template, DHCP addresses are accurately routed to the appropriate groups, ensuring that users can effortlessly access specific customer networks based on their selected project. This solution optimizes the ZTNA infrastructure, providing a positive user experience and efficient traffic routing.

Explicit Proxy China Support

Supported in:
Prisma Access
5.2 Preferred and Innovation
Prisma Access
supports Explicit Proxy deployments in China.

Remote Networks—High Performance

Supported in:
Prisma Access
5.2 Preferred and Innovation
Prisma Access offers a comprehensive solution for high-bandwidth IPSec termination, supporting large sites, automated load balancing, simplified onboarding, regional redundancy, single egress IP management, and compatibility with various SD-WAN solutions including Prisma SD-WAN. These features collectively enhance the scalability, performance, and reliability of remote site connectivity.
As your business scales and your office locations become geographically distributed, you can quickly onboard a branch site with a high bandwidth using a Prisma Access performant remote network, also known as a
Remote Network—High Performance
. These networks offer the following benefits:
  • Supports up to 3 Gbps aggregate bandwidth per service IP address or service endpoint address, providing you with a reduced number of IP addresses or FQDNs to use for IPSec tunnel termination.
  • Includes regional redundancy to improve availability and fault tolerance.
  • Uses NAT to reduce public egress IP addresses.
  • Simplifies onboarding with in-product recommendations for choosing locations based on geographic availability.
  • Includes support for Link Quality Metrics (LQM), where Prisma SD-WAN determines link quality by actively probing the Secure Fabric VPN paths over public and private transports and the private WAN underlay paths. The probes provide a constant measurement of network performance metrics, such as jitter, latency, and packet loss. These metrics, along with application-specific performance metrics and Layer 1 through Layer 7 reachability, inform traffic forwarding decisions for new and existing application flows.

Route Summarization for Dynamic Privilege Access

Supported in:
Prisma Access (Managed by Strata Cloud Manager)
5.2 Innovation
On Dynamic Privilege Access enabled Prisma Access tenants, you can summarize routes when advertising the Mobile User (MU) routes to your on-premises network. Route summarization is beneficial for enterprises that have on-premises equipment that has limited capacity such as basic cloud routers. By reducing the demand on these devices, route summarization ensures that the devices won't exceed their route capacity when communicating with the data center.
To enable route summarization, configure global summary pools that consist of lists of large IP pools that can be used across multiple projects. Then, enable route summarization in the Prisma Access service connection. When a user uses the Prisma Access Agent to connect to a project that has an IP address within the range of the configured global summary pools, the service connection will advertise the global summary pool instead of the smaller project-level route. This helps reduce the number of routes that are sent to the network.

SC-NAT Support for Dynamic Privilege Access with CIAM

Supported in:
Prisma Access
5.2 Innovation
Use SC-NAT support for Dynamic Privilege Access (DPA) if you use DPA and have created service connections to access private apps in your data center or headquarters location. Multiple projects in your DPA environment can experience IP address exhaustion if the IP addresses of the Infrastructure Subnet overlap. To fix this issue, Prisma Access can implement source NAT (SNAT) for IP addresses, which:
  • Lets Prisma Access map a single IP address for a mobile user accessing private apps using a service connection
  • Provides you with SNAT for easy routing
  • Eliminates IP Pool overlap
  • Eliminates IP Pool IPv4 exhaustion between Prisma Access and your data center or headquarters location

Simplified Prisma Access Private App Connectivity

Supported in:
Prisma Access
5.2 Preferred and Innovation
One way to access a private app is by using a service connection, also known as a
Service Connection-Corporate Access Node
(SC-CAN). It can be difficult to connect to private apps using service connections because:
  • Indeterministic throughput of the private app due to SC-CAN bottlenecks
  • Latency due to incorrect transit hops
  • Operational complexity in deploying SC-CANs
To solve this issue, Prisma Access has enhanced its routing infrastructure routing enhancements that:
  • Eliminates SC-CAN bottlenecks by improving the internal network
  • Orchestrates an anchor SC-CAN when required, preventing incorrect transit hops and inefficient routing
This design offers the following benefits:
  • Routing setup that is easier to deploy
  • Easy day zero setup
  • Deterministic 1 Gbps bandwidth from a given SC-CAN to the data center or headquarters location where the private app is located

Simplify Prisma Access SaaS Connectivity with IP Optimization for Mobile Users and Explicit Proxy Deployments

Supported in:
Prisma Access
5.2 Preferred and Innovation
Prisma Access expands on the IP Optimization functionality by offering it for Explicit Proxy as well as Mobile Users—GlobalProtect.
For Mobile Users—GlobalProtect deployments, when a large number of users access a GlobalProtect gateway from a location, Prisma Access autoscales the location and adds another GlobalProtect gateway. IP Optimization uses a NAT layer so that the autoscaled gateway uses the same IP address as the previously allocated IP address, thus eliminating the need to add extra IP addresses to your organization's allow lists.
Prisma Access expands the NAT layer to Explicit Proxy Security Processing Nodes (SPNs) as well as Mobile User SPNs, reducing the need to allow list IP addresses for Explicit Proxy deployments. This Explicit Proxy NAT layer is beneficial if you're setting up a Mobile Users and Explicit Proxy deployment in Proxy Mode or Tunnel and Proxy Mode.

TLS 1.3 and PubSub Support for Traffic Replication

Supported in:
Prisma Access
5.2 Preferred and Innovation
If you're a large organization using Traffic Replication, you can have the following challenges in deploying and using it:
  • Tools that consume the packet capture (PCAP) files require frequent queries of the buckets to cope with a large number of PCAP files. The tools might create overhead on the buckets and their use might be limited by the cloud providers.
  • When using the PCAP files for forensic analysis, accessing SSL decrypted traffic provides better efficacy, and a significant amount of the traffic is TLS 1.3 encrypted.
To solve these issues, Prisma Access offers these enhancements that allow third-party tools to be more efficient and easier to scale:
  • Pub/Sub Notifications
    —Prisma Access proactively sends a Pub/Sub notification when a new PCAP file is uploaded to the storage bucket. Using Pub/Sub notifications for new PCAP files eliminates the need to develop tools that notify you when there are new files in the buckets.
  • TLS 1.3 Decryption Support
    —Prisma Access uses TLS 1.3 when decrypting PCAP files, thus providing deeper visibility into the traffic. This support applies to remote network deployments where you have enabled the use of SSL/TLS decryption policy rules on PCAP files.

View and Monitor Colo-Connect

Supported in:
Prisma Access
5.2 Preferred and Innovation
Prisma Access
Colo-Connect builds on the Colo-based performance hub concept, with high-bandwidth private connections along with Layer 2/3 connectivity to Prisma Access from existing performance hubs. Colo-Connect leverages the cloud native GCP interconnect technology to provide high-bandwidth service connections to your private applications. Go to
Monitor
Data Centers
Service Connections
to view and monitor your private connectivity to hybrid cloud and on-premises data centers over cloud interconnects.

View Prisma Access, Dataplane, and Application and Threats Content Versions in Strata Cloud Manager and Panorama

Supported in:
Prisma Access (Managed by Strata Cloud Manager)
5.2 Preferred and Innovation
To allow you to gain more information about your Prisma Access (managed by Strata Cloud Manager) deployments, the Software Information area in the Overview page (
Manage
Configuration
NGFW and Prisma Access
Overview
in Strata Cloud Manager and Prisma Access Version (
Panorama
Cloud Services
Configuration
Service Setup
) in Panorama provide you with the following information:

ZTNA Connector Support for Commitless App Onboarding

Supported in:
Prisma Access
5.2 Innovation
With commitless onboarding enhancement, you have an improved experience when onboarding, modifying, or removing applications. The previous delay of 5-10 minutes is eliminated, resulting in a faster process. Your application onboarding time now takes less than 1 minute, allowing you to quickly and efficiently manage your applications. Additionally, the enhanced scale of the ZTNA Connector caters to the needs of large customers who manage more than 10,000 applications. You have the capability to onboard a larger number of applications, providing you with greater flexibility and efficiency in your operations.

Recommended For You