When the IPsec Tunnels are active from the
site to the Prisma Access Regions, the next step is to modify policies
to send traffic down these tunnels. To begin this process, we must modify
Service and Data center groups and configure these groups in policy.
When
making policy configurations, remember that the ION devices makes
intelligent per-app selections using the network policies to chain
multiple different path options together in Active-Active and Active-Backup
modes.
Example:
- Application A: Take Standard VPN
direct to Prisma Access.
- Application B: Take Standard VPN direct to Prisma Access, Backup
to Direct Internet.
- Application C: Use only Direct Internet.
The Prisma
SD-WAN secure Application Fabric (AppFabric) enables granular controls
for virtually unlimited number of policy permutations down to the
sub-application level. Here are some of the most common examples
of how a traffic policy can be configured per-application:
- Send
all internet-bound traffic from a set of branches to Prisma Access.
(Blanket Suspect list)
- Send all internet traffic direct to the internet except for
certain applications needing additional inspection or security.
(Suspect list - Safelist)
- Send all internet-bound traffic from a set of branches to Prisma
Access except for specific known applications. (Suspect list - Safelist)
In
order to modify application policy, the following steps should be
performed. They are detailed in the following sections: