Configure the VeloCloud Remote Network
The following section describes the steps
you perform to integrate a VeloCloud SD-WAN with Prisma Access,
including an overview of the VeloCloud-Prisma Access integration.
Secure VeloCloud SD-WAN with Prisma Access Overview
To onboard a VeloCloud SD-WAN with Prisma
Access, you configure a remote network tunnel in Prisma Access.
The VeloCloud SD-WAN device sends traffic through the remote network
to Prisma Access, which allows Prisma Access to protect your internet-directed
traffic, including resources such as SaaS applications or publicly
accessible partner applications.
You can secure VeloCloud
SD-WAN deployments by onboarding the remote network using the VeloCloud Edge device or VeloCloud Gateway.
VeloCloud
edge devices are plug and play devices that you can install in remote
sites. You can connect one or more devices to an aggregation point,
known as an
SD-WAN headend
. Use a VeloCloud gateway as the
SD-WAN headend. In the VeloCloud SD-WAN fabric, you can configure
multiple sites that connect to one gateway, a single site to connect
to one gateway, or multiple sites that connect to multiple gateways,
as shown in the following figure.

You
can connect one or more remote network connections to a cloud headend.
To simplify setup, specify static routing and configure a separate
subnet for each remote network location you onboard.
Size
the bandwidth of the remote network connection based on the traffic
from the branches that are connected to the cloud headend. You can
scale the VeloCloud SD-WAN with Prisma Access in multiple ways;
for example, you can connect multiple gateways to one remote network,
or connect one gateway to multiple remote networks.
Prisma
Access protects your internet-based resources, including SaaS applications
and content. The following figure shows a sample VeloCloud gateway-Prisma
Access deployment.

Configure the Remote Network Connection in Prisma Access
To begin configuration of a VeloCloud-Prisma
Access deployment, use Panorama to create IPSec and IKE parameters
and create the Prisma Access remote network connection.
This
procedure assumes that you have already completed the following
prerequisites:
- You have activated and installed Prisma Access.
- You have logged into Panorama and created an Infrastructure Subnet for Prisma Access, using a subnet that doesn’t overlap with your existing network subnets.
- You have created trusted and untrusted zones and used zone mapping to map those zones for your deployment.
- You have made a note of the subnets you will use for each remote network gateway.
- You have made a note of the IP address for the VeloCloud SD-WAN device. You obtain this information from the VMware SD-WAN Orchestrator.You use the IP address of the gateway address to configure the IKE gateway.
- Create IKE and IPSec crypto profiles and an IKE gateway for the remote network connection you will create.You will use these profiles to provide connectivity between Prisma Access and the VeloCloud SD-WAN device.
- Make sure you have selected theTemplateofRemote_Network_Templatebefore starting this task.
- Give the profile a name and specify IKE settings.Make a note of these settings; you specify the same settings When you configure the setting on the VeloCloud SD-WAN device.
- Specify a name for the profile and specify IPSec crypto parameters.Make a note of these settings; you specify the same settings When you configure the setting on the VeloCloud SD-WAN device.
- Specify aNameVersion.
- Enter aPeer IP Addressthat matches the VeloCloud SD-WAN device’s IP address.You obtain this address from the VMware SD-WAN Orchestrator
- Enter aPre-shared keyfor symmetric authentication across the tunnel.
- Choose aLocal IdentificationofNoneand aPeer IdentificationofFQDN (hostname); then, enter an FQDN.Make a note of the of thePre-Shared keyandFQDNthat you use for thePeer Identification; you match these settings when you configure the VeloCloud cloud gateway.
- ConfigureAdvanced Options:
- Enable NAT Traversal.
- Set theExchange ModetoAutoso the gateway can accept bothmainmode andaggressivemode requests, or let the gateway initiate negotiation and allow exchanges inmainmode.
- Select theIKE Crypto Profileyou created in Step 1.a.
- Select theIKE GatewayandIPSec Crypto Profileyou created earlier in this task.
- SelectandPanoramaCloud ServicesConfigurationRemote NetworksAdda new remote network connection, specifying the following values:
- Give the remote network connection a uniqueName.
- Specify aLocationthat is close to the VeloCloud SD-WAN device.
- Specify theIPSec Tunnelyou created in Step 1.k.
- In theStatic Routestab,AddtheBranch IP Subnetsyou have reserved for this remote network connection.
- Commit the configuration changes to Panorama and push the configuration out to Prisma Access for remote networks.
- Click.CommitCommit and Push
- Click, and select both Prisma Access for remote networks and Prisma Access for service setup to push the configuration out to the service.Edit SelectionsPrisma AccessPushing theGlobalProtect cloud service for service setupis only required if you made changes to the service setup (for example, you added the Infrastructure Subnet).
- ClickOK, thenCommit and Push.Prisma Access displays a success page after the commit succeeds.
- Make a note of theService IP addressof the Prisma Access side of the tunnel. To find this address in Panorama, select, selectPanoramaCloud ServicesStatusNetwork DetailsRemote Networks, and find theService IP Address.You use theService IP Addressas the Peer IP address when you configure the IPSec tunnel in the VeloCloud SD-WAN device.
Configure the Remote Network Connection for VeloCloud Edge Devices
Use the following procedure to configure the
IPSec tunnel on the VeloCloud edge device to complete the remote
network connection.
- Log in to the Enterprise customer account on the VeloCloud Orchestrator (VCO).
- Select.ConfigureNetwork Services
- In theCloud Security Servicesarea, clickNewto create a new service.
- Enter the following values in the New Cloud Security Provider window that displays:
- Enter aService Nameto identify this configuration.
- Select aService TypeofGeneric Cloud Security Service.
- For thePrimary Point-of-Presence, enter theService IP Addressyou retrieved from Prisma Access.
- ClickAddto save and add the configuration.
- Selectand setConfigureProfileCloud Security ServicetoOn; then, select theHash,Encryption, andKey Exchange Protocolto the settings you configured for the remote network tunnel in Prisma Access.
- Selectand complete the following steps:ConfigureEdge
- SetCloud Security ServicetoOn.
- Select the radio button toRedirect all internet bound traffic to Cloud Security Service.
- Select theHash,Encryption, andKey Exchange Protocolto match the settings you configured for the remote network tunnel in Prisma Access.
- Enter theFQDNand pre-shared key (PSK) to match the FQDN and PSK you entered in Prisma Access.
- Verify the status of the remote network tunnel.
- To view tunnel status in the VMware SD-WAN Orchestrator, selectin the VMware SD-WAN Orchestrator and viewing the information in the fields that display.MonitorEdge
- To view traffic and application statistics, select theTransport and Applicationstab, then select.MonitorEdge
Configure the Remote Network Connection for VeloCloud Gateways
Use the following procedure to configure the
IPSec tunnel on the VeloCloud edge gateway to enable the remote
network connection.
- Establish connectivity from the VeloCloud gateway to Prisma Access.
- Log in to the Enterprise customer account on the VeloCloud Orchestrator (VCO).
- Select.ConfigureNetwork Services
- SelectNewin theNon-VeloCloud Sitesto create a new site.
- Enter aNamefor the site and select aTypeofPalo Alto.
- For thePrimary VPN Gateway, enter theService IP Addressyou retrieved from Prisma Access.
- ClickNext.VeloCloud creates the site and generates the IKE and IPSec configuration (including pre-shared key) for the site.
- ClickAdvancedand update the IKE and IPSec parameters and add theSite Subnetsthat you will protect with Prisma Access.
- Make sure that you have selectedEnable Tunnel(s); then,Save Changes.To view the detailed IKE and IPSec parameters and the public IP address used by the VeloCloud gateway, clickView IKE IPSec Template. The public IP address displays in theLocal Identification : IP address :area.
- Verify the status of the remote network connection between the VeloCloud gateway and Prisma Access by selecting. AMonitorNetwork ServicesStatusin green indicates that the connection has been successfully established.
- Configure the customer profile to service-chain the Non-VeloCloud site to the customer’s SD-WAN.
- SelectConfigureProfilesProfile-Name, whereProfile-Nameis the customer’s profile, then click theDevicetab.
- Enable theCloud VPNfeature to turn on VPN connectivity from the Branch and Data Center sites.
- In theBranch to Non-VeloCloud Sitesection, selectEnable; then, select the Prisma Access site you created in Step 1.
- Save your changes.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.