Plan for IP Address Changes for Mobile Users, Remote Networks,
and Service Connections
After you set up your Prisma Access deployment, it is useful to know when IP addresses change so that you can pro-actively plan your infrastructure and add required IP addresses to allow lists accordingly. The IP address changes can be the result of changes you made (for example, adding another mobile users location) or changes that Prisma Access performs automatically (for example, a large number of mobile users accesses a single Prisma Access gateway).
The following sections describe how IP addresses can change:
IP Address Allocation For Mobile Users
After you deploy Prisma Access for users for the first time, Prisma Access adds two sets of
Since the public IP address is the source IP address used by Prisma Access for requests made to an internet-based source, you need to know what the public IP address are and add them to an allow list in your network to provide your users access to resources such as SaaS applications or publicly-accessible partner applications.
The public IP addresses can change, and Prisma Access can put the reserved public IP address sets into active use, if the following events occur:
- A large number of mobile users access a location in the same location.When a scaling event occurs, Prisma Access adds one or more gateways to accommodate the increased number of users, assigns one or more of the reserved public IP addresses to the new gateways and makes them active, and adds a new set of reserved IP addresses to the mobile user locations to replace the ones that were used.
- You add one or more locations to your deployment.When you add more locations, Prisma Access adds another gateway and a new set of active and reserved IP addresses for each new location you add.
- Prisma Access upgrades its infrastructure or dataplane, usually in conjunction with a new software release and an upgrade to the Cloud Services plugin.Prisma Access makes the reserved public IP addresses active, and makes the active public IP addresses reserved.
Because Prisma Access adds more public IP addresses when you add a gateway, and can add more public IP addresses after a scaling event, you should add an IP Change Event Notification URL, or use the API to retrieve mobile user addresses, to be notified of IP address changes in your Prisma Access infrastructure. You can then add any added or changed addresses to an allow list.
Public IP Address Scaling Examples for Mobile Users
The following examples illustrate the mobile user public IP address allocation process that Prisma Access uses during a scaling event or when you add a new location.
In the following example, you specified two locations in the Asia Pacific region for a new mobile user deployment: Sydney and Seoul. Each location has an active and reserved set of public IP addresses. Prisma Access reserves four sets of IP addresses for the gateways: two active and two reserved.
Then a large number of users log in to the Seoul location. To accommodate these extra users, Prisma Access adds a second gateway for the Seoul location and takes the reserved address from the first Seoul gateway (220.127.116.11) and makes this the active IP address for the second Seoul gateway. It then adds two additional IP addresses (18.104.22.168 and 22.214.171.124 in this example) to use as reserved IP addresses for the two Seoul gateways.
Then you add another location, Tokyo, in the Asia Pacific region. Prisma Access creates two new IP addresses for the new gateway (126.96.36.199 and 188.8.131.52).
Each time you add a location or have a scaling event, you should Retrieve Public and Egress IP Addresses for Mobile User Deployments that Prisma Access assigned and add them to an allow list in your network. Prisma Access keeps two sets of IP addresses at all times for all active gateways in each location.
Mobile User Public IP Address Reassignment Example After
an Infrastructure or Dataplane Upgrade
When Prisma Access upgrades its infrastructure or dataplane, usually to prepare for a software upgrade for the Cloud Services plugin, it changes the public IP addresses from active to reserved and vice versa. The following example illustrates the process.
The following graphic shows a sample deployment with three Prisma Access portals, three locations (Sydney, Tokyo, and Seoul), and an active and reserved public IP address for each portal and location.
After an infrastructure or dataplane upgrade, Prisma Access reverses the public IP addresses for each portal and location. In this example, the Sydney location’s active public IP address changes from 184.108.40.206 to 220.127.116.11 and its reserved public IP address changes from 18.104.22.168 to 22.214.171.124. Adding both the active and reserved public IP addresses to allow lists ensures that users can still access the Prisma Access portals and gateways after the upgrade.
IP Address Changes For Remote Network Connections That Allocate Bandwidth
IP addresses for remote network connections are unique, not shared, and dedicated to your Prisma Access deployment. These IP addresses do not change after Prisma Access creates them as part of remote network onboarding, and the IP addresses persist after an upgrade. However, take care when increasing the bandwidth of an existing connection, because the IP address of a remote network can change if that increase causes the bandwidth in a location to exceed 500 Mbps.
In addition, egress IP addresses can change if Prisma Access creates a new compute location and you decide to use this new compute location with locations you have already onboarded. See Mobile User, Remote Network, and Service Connection IP Allocation Changes After a Compute Location Change for details.
These bandwidth guidelines apply only when you upgrade an existing connection. A single remote network connection, even a 1000 Mbps (Preview) connection, always receives a single
Service IP Address, regardless of its size.
The 1000 Mbps bandwidth option is in preview mode. The throughput during preview is delivered on a best-effort basis and the actual performance will vary depending upon the traffic mix.
The following example shows three remote network connections in the same location, each with a bandwidth of 150 Mbps. Since the total bandwidth is 500 Mbps, Prisma Access assigns a single IP address for all connections in the location.
The following example shows the bandwidth of remote network connection A being increased from 150 Mbps to 300 Mbps. Since the total bandwidth of all connections is now more than 500 Mbps, Prisma Access assigns a new service IP address for the connection with the additional bandwidth. The other service IP addresses remain unchanged.
Conversely, given four remote networks with a bandwidth of 100 Mbps, if you increase the bandwidth of one of the remote networks to 100 Mbps, the Service IP address of that remote network does not change because the total bandwidth is now 500 Mbps.
If you reduce the bandwidth of a remote network connection, the Service IP address does not change.
To find the service IP addresses in Panorama, select
tab and click the
Remote Networksradio button to display the
Service IP Addressfor the remote networks, or use the API script.
IPSec Termination Nodes and Service IP Addresses
All new deployments starting with Prisma Access 1.8 allocate remote network bandwidth by compute location instead of by Prisma Access location. You can also upgrade your current deployment to allocate bandwidth by compute location.
When you onboard a remote network, you associate it with an
IPSec Termination Node, and each IPSec termination node has a
Service IP Addressassociated with it. You use the
Service IP Addressas the peer IP address when you set up the IPSec tunnel for the remote network connection. Each termination node can provide you up to 500 Mbps of bandwidth. Associating more than 500 Mbps of bandwidth to a compute location provides you with more than one
Service IP Address.
When you onboard a remote network in an Ireland compute location, you are given a choice of two IPSec termination nodes, because the total bandwidth is more than 500 Mbps.
Each IPSec termination node has its own Service IP address, as can be seen in
Mobile User, Remote Network, and Service Connection IP Allocation Changes
After a Compute Location Change
To optimize performance and improve latency, Prisma Access can introduce new compute locations for existing remote network locations as part of a plugin upgrade. When you upgrade the plugin, you can choose to take advantage of the new compute location. If you change the compute region, Prisma Access changes the gateway and portal IP addresses (for mobile users) and Service IP addresses (for remote networks) for the location or locations to which the new compute location is associated. If you use allow lists in your network to provide users access to internet resources such as SaaS applications or publicly accessible partner applications, you need to add these new IP addresses to your allow lists.
To upgrade to a new compute location after it becomes available, complete the following task.
Since you need to allow time to delete and add the existing location and change your allow lists (for mobile users) or peer IPSec tunnel IP address (for remote network deployments), Palo Alto Networks recommends that you schedule a compute location change during a maintenance window or during off-peak hours.
- Add bandwidth for the new remote network compute locations.
- ((Remote Network deployments that allocate remote network bandwidth by compute locations only) Select.PanoramaCloud ServicesConfigurationRemote Networks
- Click the gear icon in theBandwidth Allocationarea and addBandwidth Allocation (Mbps)for the new compute location.
- Wait for the bandwidth to be reflected in the Allocated Total field at the top of the page; then, clickOK.
- Delete the Service Connection, Remote Network connection, or Mobile User location associated with the new compute location.
- Commit and push your changes.
- Re-add the locations you just deleted.
- Commit and push your changes.
- (Mobile User deployments only) Retrieve the new gateway and portal IP addresses using the API script and add them to your allow lists.
- (Remote Network and Service Connection deployments only) Change your CPE to point to the new IP addresses for the IPSec tunnel for the remote network connection or service connection.For remote network connections, select, make a note of thePanoramaCloud ServicesStatusNetwork DetailsRemote NetworksService IP Address, and configure the new Service IP Address as the peer address for the remote network IPSec tunnel on your CPE.For service connections, select, make a note of thePanoramaCloud ServicesStatusNetwork DetailsService ConnectionService IP Address, and configure the new Service IP Address as the peer address for the service connection IPSec tunnel on your CPE.
- Select, make a note of thePanoramaCloud ServicesStatusNetwork DetailsRemote NetworksService IP Address, and configure the newService IP Addressas the peer address for the remote network IPSec tunnel on your CPE.When you delete and re-add a remote network connection, the IP address of the IPSec tunnel on the Prisma Access side changes.
Loopback IP Address Allocation for Mobile Users
Loopback IP addresses can change during for mobile users during an infrastructure or dataplane upgrade.
Loopback IP addresses do not change for service connections or remote network connections during an infrastructure or dataplane upgrade; only mobile user loopback IP addresses can change.
Prisma Access allocates the loopback IP addresses from the infrastructure subnet that you specify when you enable the Prisma Access infrastructure. You can add the entire infrastructure subnet to an allow list and avoid planning for mobile user loopback IP changes during an infrastructure or dataplane upgrade. To find the infrastructure subnet, select
and view the
Retrieve these addresses using the Retrieve Public, Loopback, and Egress IP Addresses used to retrieve public IP and loopback IP addresses.
The following example shows a Prisma Access deployment that has an infrastructure subnet of 172.16.0.0/16. Prisma Access has assigned loopback IP addresses 172.16.0.1 and 172.16.0.3 for mobile users from the infrastructure subnet.
After in infrastructure or dataplane upgrade (for example, to prepare for a new release of the Cloud Services plugin), Prisma Access assigns two different IP addresses for mobile users from the infrastructure subnet (172.16.0.1 is changed to 172.16.0.2 and 172.16.0.3 is changed to 172.16.0.4).
Recommended For You
Recommended videos not found.