Use Groups in Network Policy Rules
Let us learn more about using groups in Network Policy Rules.
Before you can use a Standard VPN in a policy
rule, you need to have defined service endpoint groups. Each group
can have one or more Prisma SD-WAN data centers or standard service
endpoints. A group will be used in policy rules. The domain defining
the mappings for endpoints to groups must be assigned to a site
for the policy rules using the group to be effective. For more information,
refer to Managing Services and Data Center Groups. There can be
four combinations of Active/Backup groups that can be used in Policies.
You may select just one Prisma SD-WAN group or one non-Prisma SD-WAN
group as an active or backup path in policies. For example:
Active Group | Backup Group | Example |
---|---|---|
Standard | Prisma SD-WAN | Internet-bound SSL traffic from a branch site
will transit through the Cloud Security Service. In the event all standard
VPN paths to any of the endpoints in the Primary Cloud Security
Service group are not available, internet-bound SSL traffic will
transit through one of the Prisma SD-WAN data center endpoints assigned
to that group via the Prisma SD-WAN VPN. |
Prisma SD-WAN | Standard | Internet-bound SSL traffic from a branch site
will transit through one of the Prisma SD-WAN data center endpoints assigned
to that group via the Prisma SD-WAN VPNs. In the event all Prisma
SD-WAN VPNs to all of the Data Center endpoints in that group are
unavailable, internet-bound SSL traffic will transit through the
Cloud Security Service via one of the standard VPN paths to any of
the endpoints in the standard group. |
Standard | Standard | Internet-bound SSL traffic from a branch site
will transit through the primary cloud security service via one
of the standard VPN paths to any of the endpoints in the primary
cloud security service group. In the event all standard VPNs are
down to all endpoints in the primary group, the Internet bound SSL
traffic will transit through the backup cloud security service via
one of the standard VPN paths to the endpoints that are part of
the backup group. |
Prisma SD-WAN | Prisma SD-WAN | Internet-bound SSL traffic from a branch site
will transit through one of the Prisma SD-WAN data center endpoints assigned
to the active group via the Prisma SD-WAN VPNs. In the event all
Prisma SD-WAN VPNs to all of those endpoints are down, internet-bound
SSL traffic will transit through one of the Prisma SD-WAN data center endpoints
assigned to the backup group via the Prisma SD-WAN VPNs. |
- From the Prisma SD-WAN web interface, navigate to.Policies > Stacked Policies
- Select.Path > Path Sets
- Select a Path Policy Set and an appropriate Path Policy rule.On the Paths tab, select Standard VPN as either an Active or Backup path.You can mix Standard VPN with other available paths - private, public, direct or VPNs.
- Click Next to navigate toService & DC Groups. Choose a group from either the Active or Backup drop-down lists.If standard VPN is used in a network policy, then you must have a standard Services and DC Group defined in the policy for the traffic to transit through that group. If not, traffic will be black-holed. If required is selected, traffic will always transit through the Services and DC Group. If not selected, traffic may or may not transit through the Services and DC Group per policy.
- Save & Exitto save the policy rule.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.