Prisma® Access mobile users access private apps using a
service connection. If your deployment
uses a Next-Generation Firewall (NGFW) in the data center or headquarters location
where the private apps are located, and if your service connection has source NAT
enabled, the NGFW can't retrieve the User-ID™ and Device-ID mapping. Source NAT on
the service connection prevents the mobile users' User-ID and Device-ID mapping to
be distributed to the NGFW. If the NGFW can't retrieve this mapping, it can't
enforce zone-based security policy rules you have created on it based on User-ID or
Device-ID mapping.
User-ID Across NAT lets your network distribute the User- or Device-ID mapping from
mobile users to the NGFW and then on to the headquarters or data center, thus
allowing the NGFW to enforce security policy rules based on the User-ID mapping it
has learned from the service connection. This configuration ensures a consistent
security posture across your mobile user deployment.