Create a Service Connection to Allow Access to Your Corporate Resources
To create a service connection to allow access to your corporate resources, complete the following steps.
If you are creating a service connection to allow communication between mobile users and remote networks, instead of enabling access to your corporate resources, follow the instructions in Create a Service Connection to Enable Access between Mobile Users and Remote Networks.
- Select.PanoramaCloud ServicesConfigurationService Connection
- Adda new service connection to one of your corporate network sites.
- Specify aNamefor the corporate site.
- Select theLocationclosest to where the site is located.See this section for a list of Prisma Access locations.
- Select or add a newIPSec Tunnelconfiguration to access the firewall, router, or SD-WAN device at the corporate location:
- If you have added a template to the Service_Conn_Template_Stack (or modified the predefined Service_Conn_Template) that includes an IPSec Tunnel configuration, select thatIPSec Tunnelfrom the drop-down. Note that the tunnel you are creating for each service connection connects Prisma Access to the IPSec-capable device at each corporate location. The peer addresses in the IKE Gateway configuration must be unique for each tunnel. You can, however, re-use some of the other common configuration elements, such as Crypto profiles.The IPSec Tunnel you select from a template must use Auto Key exchange and IPv4 only.
- To create a new IPSec Tunnel configuration, clickNew IPSec Tunnel, give it aNameand configure the IKE Gateway, IPSec Crypto Profile, and Tunnel Monitoring settings.
- If the IPSec-capable device at your HQ or data center location uses policy-based VPN, on theProxy IDstab,Adda proxy ID that matches the settings configured on your local IPSec device to ensure that Prisma Access can successfully establish an IPSec tunnel with your local device.
- LeaveEnable Replay Protectionselected to detect and neutralize against replay attacks.
- SelectCopy TOS Headerto copy the Type of Service (TOS) header from the inner IP header to the outer IP header of the encapsulated packets in order to preserve the original TOS information.
- To enable tunnel monitoring for the service connection, selectTunnel Monitor.
To find the destination IP address to use for tunnel monitoring from your data center or HQ network to Prisma Access, select, click thePanoramaCloud ServicesStatusNetwork DetailsService Infrastructureradio button, and find theTunnel Monitor IP Address.
- Enter aDestination IPaddress.Specify an IP address at your HQ or data center site to which Prisma Access can send ICMP ping requests for IPSec tunnel monitoring. Make sure that this address is reachable by ICMP from the entire Prisma Access infrastructure subnet.
- If you use tunnel monitoring with a peer device that uses multiple proxy IDs, specify aProxy IDor add aNew Proxy IDthat allows access from the infrastructure subnet to your HQ or data center site.The following figure shows a proxy ID with the service infrastructure subnet (172.16.55.0/24 in this example) as theLocalIP subnet and the HQ or data center’s subnet (10.1.1.0/24 in this example) as theRemotesubnet.The following figure shows the Proxy ID you created being applied to the tunnel monitor configuration by specifying it in theProxy IDfield.
- BGP and hot potato routing deployments only—Select a service connection to use as the preferred backup (Backup SC).You can select any service connection that you have already added. Prisma Access uses theBackup SCyou select as the preferred service connection in the event of a link failure. Selecting a backup service connection can prevent asymmetric routing issues if you have onboarded more than two service connections. This choice is available in Hot potato routing mode only.
- If you have a secondary WAN link at this location, selectEnable Secondary WANand then select or configure anIPSec Tunnelthe same way you did to set up the primary IPSec tunnel.If the primary WAN link goes down, Prisma Access detects the outage and establishes a tunnel to the headquarters or data center location over the secondary WAN link. If the primary WAN link becomes active, the link switches back to the primary link.If you use static routes, tunnel failover time is less than 15 seconds from the time of detection, depending on your WAN provider.If you configure BGP routing and have enabled tunnel monitoring, the shortest default hold time to determine that a security parameter index (SPI) is failing is the tunnel monitor, which removes all routes to a peer when it detects a tunnel failure for 15 consecutive seconds. In this way, the tunnel monitor determines the behavior of the BGP routes. If you do not configure tunnel monitoring, the hold timer determines the amount of time that the tunnel is down before removing the route. Prisma Access uses the default BGP HoldTime value of 90 seconds as defined by RFC 4271, which is the maximum wait time before Prisma Access removes a route for an inactive SPI. If the peer BGP device has a shorter configured hold time, the BGP hold timer uses the lower value.When the secondary tunnel is successfully installed, the secondary route takes precedence until the primary tunnel comes back up. If the primary and secondary are both up, the primary route takes priority.
- Enable routing to the subnetworks or individual IP addresses at the corporate site that your users will need access to.Prisma Access uses this information to route requests to the appropriate site. The networks at each site cannot overlap with each other or with IP address pools that you designated for the service infrastructure or for the Prisma Access for users IP pools. You can configureStatic Routes,BGP, or a combination of both.To configureStatic Routes:
- On theStatic Routestab, clickAddand enter the subnetwork address (for example, 184.108.40.206/24) or individual IP address of a resource, such as a DNS server (for example, 10.32.5.1/32) that your remote users will need access to.
- Repeat for all subnets or IP addresses that Prisma Access will need access to at this location.
- On theBGPtab, selectEnable.When you enable BGP, Prisma Access sets the time to life (TTL) value for external BGP (eBGP) to 8 to accommodate any extra hops that might occur between the Prisma Access infrastructure and your customer premises equipment (CPE) that terminates the eBGP connection.Prisma Access does not accept BGP default route advertisements for either service connections or remote network connections.
- (Optional) Select from the following choices:
- To prevent the Prisma Access BGP peer from forwarding routes into your organization’s network.Don’t Advertise Prisma Access Routes.By default, Prisma Access advertises all BGP routing information, including local routes and all prefixes it receives from other service connections, remote networks, and mobile user subnets. Select this check box to prevent Prisma Access from sending any BGP advertisements, but still use the BGP information it receives to learn routes from other BGP neighbors.Since Prisma Access does not send BGP advertisements if you select this option, you must configure static routes on the on-premise equipment to establish routes back to Prisma Access.
- To reduce the number of mobile user IP subnet advertisements over BGP to your customer premises equipment (CPE), specify Prisma Access to summarize the subnets before it advertises them by selectingSummarize Mobile User Routes before advertising.By default, Prisma Access advertises the mobile users IP address pools in blocks of /24 subnets; if you summarize them, Prisma Access advertises the pool based on the subnet you specified. For example, Prisma Access advertises a public user mobile IP pool of 10.8.0.0/20 using the /20 subnet, rather than dividing the pool into subnets of 10.8.1.0/24, 10.8.2.0/24, 10.8.3.0/24, and so on before advertising them. Summarizing these advertisements can reduce the number of routes stored in CPE routing tables. For example, you can use IP pool summarization with cloud VPN gateways (Virtual Private Gateways (VGWs) or Transit Gateways (TGWs)) that can accept a limited number of routes.If you have hot potato routing enabled and you enable route summarization, Prisma Access no longer prepends AS-PATHs, which might cause asymmetric routing. Be sure that your return traffic from the data center or headquarters location has guaranteed symmetric return before you enable route summarization with hot potato routing.
- Enter the IP address assigned as the Router ID of the eBGP router on the data center/HQ network for which you are configuring this service connection as thePeer Address.
- Enter thePeer AS, which is the autonomous system (AS) to which the firewall virtual router or BGP router at your data center/HQ network belongs.
- (Optional) Enter an address that Prisma Access uses as its Local IP address for BGP.Specifying aLocal Addressis useful where the device on the other side of the connection (such as an Amazon Web Service (AWS) Virtual Private Gateway) requires a specific local IP address for BGP peering to be successful. Make sure that the address you specify does not conflict or overlap with IP addresses in the Infrastructure Subnet or subnets in the service connection.
- (Optional) Enter and confirm aSecretpassphrase to authenticate BGP peer communications.
- (Optional) If you configured aSecondary WANand you need to change thePeer AddressorLocal Addressfor the secondary (backup) BGP peer, deselectSame as Primary WANand enter a unique Peer and, optionally, Local IP address for the secondary WAN.In some deployments (for example, when using BGP to peer with an AWS VPN gateway), the BGP peer for the primary and secondary WAN might be different. In those scenarios, you can choose to set a different BGP peer for the secondary WAN.For BGP deployments with secondary WANs, Prisma Access sets both the primary and secondary tunnels in anUPstate, but follows normal BGP active-backup behavior for network traffic. Prisma Access sets the primary tunnel as active and sends and receives traffic through that tunnel only; if the primary tunnel fails, Prisma Access detects the failure using BGP rules, sets the secondary tunnel as active, and uses only the secondary tunnel to send and receive traffic.
- If required, enableQuality of Servicefor the service connection and specify a QoS profile or add aNew QoS Profile.You can create QoS profiles to shape QoS traffic for remote network and service connections and apply those profiles to traffic that you marked with PAN-OS security policies, traffic that you marked with an on-premise device, or both PAN-OS-marked and on-premise-marked traffic. See Configure Quality of Service in Prisma Access for details.
- Commit all your changes to Panorama and push the configuration changes to Prisma Access.
- Click.CommitCommit to Panorama
- Clickand select Edit Selections. On theCommitPush to DevicesPrisma Accesstab, make sureService setupis selected, then clickOKandPush.Prisma Access should automatically select the components that need to be committed.
- The first three service connections are included with no license cost; each connection after the third uses 300 Mbps from your licensed remote networks bandwidth pool. After youAddyour fourth and subsequent network connection, Prisma Access displays a page informing you of your remaining licensed remote networks bandwidth. To confirm your addition,Allocate 300 Mbps for an additional service connection; thenAllocatethe bandwidth for the service connection.
- Configure the IPSec tunnel or tunnels from your IPSec-capable device on your corporate network back to Prisma Access.
- To determine the IP address of the tunnel within Prisma Access, select, click thePanoramaCloud ServicesStatusNetwork DetailsService Connectionradio button, and note theService IP Addressfor the site.The Service IP Address is the public-facing address that you will need to connect to when you create the tunnel from your IPSec-capable device back to the service connection.
- On your IPSec-capable device at the corporate location, configure an IPSec tunnel that connects to the Service IP Address within Prisma Access and commit the change on that device so that the tunnel can be established.
Verify Service Connection Status
To verify that the service connection has been successfully set up, select
Panorama > Cloud Services > Status > Statusand check that the Status is
Deployment Statusarea allows you to view the progress of onboarding and deployment jobs before they complete, as well as see more information about the status of completed jobs. See Deployment Progress and Status for details.
If the status is not
OK, hover over the Status icon to view any errors.
To see a graphical representation of the service connection along with status details, select
Service Connectionon the
Select a region to get more detail about that region.
Click the tabs below the map to see additional information about the service connections.
- Location—The location where your service connection is deployed.
- Remote Peer—The corporate location to which this s service infrastructure is setting up an IPSec tunnel.
- Allocated Bandwidth—The number of service connections you have allocated multiplied by 300 Mbps.This number does not reflect the available service connection bandwidth. Prisma Access service connections are not bandwidth capped, but Palo Alto Networks expects that service connections can provide approximately 1Gbps of throughput. The actual throughput is dependent on several factors, including:
- Traffic mix (for example, frame size)
- Latency and packet loss between the service connection and the headquarters location or data center
- Service provider performance limits
- Customer termination device performance limits
- Other customer data center traffic
- ECMP—If you have equal cost multipath (ECMP) configured for this service connection. Since ECMP is not used for service connections, this status isDisabled).
- Config Status—The status of your last configuration push to the service. If the local configuration and the configuration in the cloud match, the Config Status isIn sync. If you have made a change locally, and not yet pushed the configuration to the cloud, this may display the statusOut of sync. Hover over the status indicator for more detailed information. After committing and pushing the configuration to Prisma Access, the Config Status changes toIn sync.
- BGP Status—Displays information about the BGP state between the firewall or router at your corporate/headquarters location and Prisma Access where the service connection is established. Although you might temporarily see the status pass through the various BGP states (Idle,Active,Open send,Open pend,Open confirm, most commonly, the BGP status shows:
This field will also show if the BGP connection is in an error state:
- Connect—The router at your data center/headquarters is trying to establish the BGP peer relationship with Prisma Access.
- Established—The BGP peer relationship has been established.
- Warning—There has not been a BGP status update in more than eight minutes. This may indicate an outage on the firewall.
- Error—The BGP status is unknown.
- Tunnel Status—The operational status of the connection between Prisma Access and your service connection.
- Location—The location where your service connection is deployed.
- Remote Peer—The corporate location to which the service connection is setting up an IPSec tunnel.
- Ingress Bandwidth (Mbps)—The bandwidth from the HQ/data center location to Prisma Access.
- Ingress Peak Bandwidth (Mbps)—The peak load from the HQ/data center location into the cloud service.
- Egress Bandwidth (Mbps)—The bandwidth from Prisma Access into the HQ/data center location.
- Egress Peak Bandwidth (Mbps)—The peak load from Prisma Access into the HQ/data center location.
- QoS—Select this button to display a graphic chart that shows a real-time and historical QoS statistics, including the number of dropped packets per class. This chart displays only for service connections or remote network connections that have QoS enabled.
Verify Service Connection BGP Status
If you configured BGP, you can check its status by selecting
Show BGP Status
The BGP Status dialog displays. This table provides you with the following information:
- Peer—Routing information for the BGP peer, including status, total number of routes, configuration, and runtime statistics and counters. The total number of routes display in thebgpAfiIpv4-unicast Countersarea, in theIncoming TotalandOutgoing Totalfields.
- Local RIB—BGP routes that Prisma Access uses locally. Prisma Access selects this information from the BGP RIB-In table, which stores the information sent by neighboring networking devices, applies local BGP import policies and routing decisions, and stores the Local RIB information in the Routing Information Base (RIB).Note that only the first 256 entries are shown. To view additional entries, enter a subnet or IP address in the Filter field and click Apply Filter to view a subset of the routing entries up to a maximum of 256.
Recommended For You
Recommended videos not found.