Configure the Aryaka Remote Network
Use the following tasks to create and configure
a remote network tunnel between the Aryaka SmartConnect and Prisma Access. See SD-WAN Deployment Architectures Supported by Aryaka for a description
of Aryaka’s SD-WAN deployment.
Before
you start, make sure that you have the following prerequisite items:
- An Aryaka SmartConnect subscription.
- A licensed and installed version of Prisma Access.
To monitor and troubleshoot the
remote network connection, see Monitor and Troubleshoot the Aryaka Remote Network.
Create and Configure the IPSec Tunnel in Prisma Access
To begin integrating the Aryaka SD-WAN with
Prisma Access, you first configure the service infrastructure in
Prisma Access, then configure and create an IPSec tunnel with Internet
Key Exchange (IKE) and IPSec settings.
To set up Prisma Access
for use with an Aryaka SD-WAN, complete the following task.
- In Panorama, configure the service infrastructure (and create anPanoramaCloud ServicesConfigurationInfrastructure Subnet.
- When a newIPSec Tunnelduring the onboarding procedure, make a note of theIPSec Tunnelname and theIKE GatewayandIPSec Crypto profilethat you use (or use theDefaultIPSec crypto profile) for the tunnels you create.If you configure a Pre-shared Key (PSK) for theIKE Gateway, make a note of it; you enter this PSK when you Configure the IPSec Tunnel in Aryaka SmartConnect.The following example configures a remote network with aBandwidthof25 Mbps,aRegionofUS West (N. California), and aSecondary WANconfigured for this location.
- Enable zone mapping.
- Commit the configuration changes to Panorama and push the configuration out to Prisma Access for remote networks.
- Click.CommitCommit to Panorama
- Click. ClickCommitCommit and Push, and select both Prisma Access for remote networks and Prisma Access for service setup to push the configuration out to the service.Edit SelectionsPrisma Access
- ClickOKandPush.
- Make a note of theService IP addressof the Prisma Access side of the tunnel. To find this address in Panorama, select, click thePanoramaCloud ServicesStatusNetwork DetailsRemote Networksradio button, and find the address in theService IP Addressfield.
Configure the IPSec Tunnel in Aryaka SmartConnect
You configure Aryaka SmartConnect in the Cloud
Security Connector section of the MyAryaka portal at https://my.aryaka.com/. Alternatively,
you can contact the Aryaka support team to assist with the configuration.
Your
MyAryaka account must have write permission access to configure
the Cloud Security Service. To verify that you have this access,
log in to MyAryaka and select .
Config
User Management
Users
To
complete the tunnel configuration for Aryaka SmartConnect, complete
the following task.
- Log in to MyAryaka and navigate to the SmartConnect site for which you want to deploy Prisma Access.
- ClickEdit Site, then selectCloud Securityfrom the list ofAdvanced Settings.
- Enter information for the remote network tunnel.Enter the following settings:
- SelectPalo Altoin theCloud Connector Vendorfield.
- Enter theService IP Addressfor the remote network tunnel from Prisma Access in thefield.Primary TunnelTunnel Destination
- Enter the PSK value from the Prisma Access IKE gateway in thefield.Tunnel SettingsShared Key
- Enter a fully-qualified domain name (FQDN) for the Aryaka Network Access Point (ANAP), if the IP address of the M1/M2 interface is dynamic.
- SelectAll Internet Trafficin theTraffic Forwardingfield.
After you choose to forward all internet traffic to Prisma Access, a default rule namedDEFAULT INTERNETis inserted in the Route Controller, in theDefault Routessection. The following screenshot shows the traffic forwarding settings. - (Optional) If you choose to forward only specific internet traffic to Prisma Access, program appropriate routes in the Router Controller section.Aryaka recommends that you edit Default Routes and not override routes to control forwarding. Overriden routes take precedence over any Aryaka-destined traffic and may accidentally cause site-to-site traffic to be routed to Prisma Access.The following figures provide screenshots of the Route Controller feature.
- Check the status of the tunnels.
- To check the status from the Aryaka Cloud Security Connector, click theStatustab. Aryaka uses Dead Peer Detection (DPD) to determine the availability of the tunnel.
- To check the status from Panorama, selectto verify that the remote network has been successfully deployed.PanoramaCloud ServicesStatusStatus
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.