: Configure Prisma SASE 5G
Focus
Focus

Configure Prisma SASE 5G

Table of Contents

Configure Prisma SASE 5G

This section explains hoe to configure Prisma SASE 5G
Where Can I Use This?What Do I Need?
  • Role: Multitenant Superuser or Superuser
Prisma SASE 5G setup involves configuring core components across both the root and child tenants to enable identity-driven policy enforcement for 5G deployments. To configure Prisma SASE 5G, perform the following:
  1. Configure the data plane and control plane on the root tenant, ensuring the foundational SASE infrastructure is in place.
  2. Set up the Cloud Identity Engine for each child tenant to enable centralized identity management.
  3. Add 5G Identities and 5G Identity Groups on all child tenants to support granular policy control and secure traffic processing for 5G users and devices.

Configure the Data and Control Plane

Before you begin configuring Prisma SASE 5G, ensure that
To configure Prisma SASE 5G, perform the following on the root tenant:
  1. Access the Strata Multitenant Cloud Manager and select Configuration Configuration CenterSetup 5G SASE or Configuration5G SASE
  2. Configure the control plane.
  3. Choose the integration type:
    1. API: For API based integration, there is no configuration required. APIs will automatically integrate into the authentication system to process the UE registration data.
    2. RADIUS: For RADIUS-based integration, proceed with the next step.
      Prisma SASE 5G relies on specific RADIUS attributes to uniquely identify user equipment and enforce security policies. Ensure that the required attributes are correctly configured in the RADIUS messages to enable proper health monitoring and policy enforcement.
    You cannot modify the integration type once it is configured.
  4. Add Shared Secret. Shared Secret can be added only once and cannot be changed after it is added.
  5. Configure Radius Proxy Authentication Certificate:
    1. Download Certificate and save it locally.
      This certificate is a mutual TLS (mTLS) certificate, used when both the RADIUS server and Prisma Access require a certificate for authentication.
      Prisma SASE 5G integrates with the 5G authentication system using RADIUS. For secure communications, Prisma SASE 5G uses a Mutual TLS authentication. For successful authentication, you download the root certificate of the Prisma SASE RADIUS server.
    2. On each of your RADIUS proxies, install this root certificate in your certificate authority store.
    3. To upload the certificate from the RADIUS server, download the RADIUS server's certificate, and then select it.
      Import the root certificate with the public key that signs the RADIUS proxy client certificate, and Upload Certificate to the Strata Multitenant Cloud Manager.
      You use this certificate to authenticate the RADIUS proxy server's identity. After you upload it and you enable the connection, you can't change it.
  6. Add a proxy server connection.
    1. Select Radius ProxyAdd Proxy
    2. Enter a unique Proxy Name for the RADIUS proxyand the IP address used for the proxy and Save your changes when complete.
  7. From the Shared Interconnects, Enable the shared interconnect you created.

Setup Cloud Identity Engine for Child Tenants

You set up the Cloud Identity Engine before you add identities and identity groups. Configuring the Cloud Identity Engine allows Prisma SASE 5G to populate the 5G identities you configure throughout Strata Cloud Manager.
  1. From the child tenant of the root-level tenant, go to Cloud Identity Engine.
  2. Add New Directory.
  3. Create a new SCIM directory by selecting Cloud DirectorySCIM.
  4. Choose a SCIM Client and enter a unique Directory ID and Directory Name.
  5. Make a note of the Directory Name and the BASE URL.
    You use this URL to configure the Cloud Management Engine in Strata Multitenant Cloud Manager.
  6. Generate Token.
  7. Copy the token by clicking the copy icon on the right.
  8. Return to the Strata Multitenant Cloud Manager select Manage5G Integrated SASEService ProviderTenantNameCIE Management.
  9. Enter the CIE Directory Name, using the same name you configured in the Cloud Identity Engine, and paste in the CIE Token you copied during Cloud Identity Engine setup.
  10. Continue with Add 5G Identities.

Add 5G Identities

You can either upload identities one at a time in the web interface, or in bulk using a .csv file.
If you use a .csv file:
  1. A maximum of 500 records is supported for each .csv file.
  2. You can upload multiple .csv files; however, upload the .csv files one at a time and wait until you get a message that the records have been successfully added before uploading the next file.
  3. Make sure that the records are in this order:
    1. IMEI
    2. IMSI
    3. APN
    All three fields are required. The following is a sample .csv file.
To add your mobile user identities, switch to the child tenant and perform the following:
  1. Go to Configuration 5G SASE5G Identities.
  2. Specify the Enterprise Domain, which is the CIE directory.
  3. You can either upload identities one at a time in the web interface, or in bulk using a .csv file.
    • To add identities from a .csv file:
      1. Upload the .csv file that has the 5G identities.
      2. Drag and drop the file, or Browse File, and upload the file.
        If the upload fails, a message displays that indicates the line that failed.
    • To add identities one at a time from the UI:
      1. Add New identities.
      2. Specify the IMSI, IMEI, and APN numbers.
      3. Save your changes.
  4. Proceed with Add 5G Identity Groups.

Add 5G Identity Groups

Use these groups in Security policy rules to allow or block the access of public and private apps.
To add 5G identity groups, switch to the child tenant and perform the following:
  1. Go to Configuration5G SASE5G Identities.
  2. Specify a unique Name for the group.
  3. Select the 5G identities to add to the group and Save your changes.