Configure the new NGFW as Zero Trust Network Access (ZTNA) Connector to streamline
secure private application access for Prisma® Access
users.
Managing secure access to private applications often requires deploying multiple
dedicated appliances, which increases operational overhead and infrastructure costs.
The NGFW as Zero Trust Network Access (ZTNA) Connector addresses these challenges by
leveraging your existing Palo Alto Networks® Next-Generation Firewalls
(NGFWs) to bridge the gap between users and applications. This capability
streamlines secure private application access for Prisma®
Access users without requiring additional infrastructure.
By transforming your firewall into a ZTNA Connector, you reduce complexity through
the automation of connectivity, NAT configurations, and application onboarding. You
can achieve a unified security posture across your environment and
automate
your private application workflows to optimize resource allocation. This
integrated approach ensures that security policies remain consistent while
significantly reducing the time required to onboard new services across your
distributed network architecture.
Additionally, Server Initiated Traffic for NGFW Connector, managed by Panorama,
extends network connectivity for data center application servers. This feature
allows servers to initiate outbound TCP, UDP, and ICMP sessions to GlobalProtect
users, Remote Network hosts, and ZTNA Connector or NGFW IP subnet targets,
overcoming previous communication limitations. It integrates with existing NGFW
capabilities for routing and security policy enforcement.