Set Up the Agent Infrastructure for Dynamic Privilege Access
Focus
Focus
Prisma Access

Set Up the Agent Infrastructure for Dynamic Privilege Access

Table of Contents

Set Up the Agent Infrastructure for Dynamic Privilege Access

Learn how to set up the infrastructure for the Prisma Access Agent, including setting up the domain name, DHCP infrastructure, and client DNS.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access 5.1 Innovation
  • Prisma Access license with the Mobile User subscription
  • macOS 12 or later desktop devices or Windows 10 version 2024 or later or Windows 11 desktop devices
  • Role: Superuser
Configure infrastructure settings for Prisma Access Agent so that Prisma Access can provision your mobile user environment. Then, select the Prisma Access locations where your Prisma Access Agent users will connect to.
You can also optionally enable SC-NAT support for Dynamic Privilege Access if you have created service connections to access private apps in their data center or headquarters location, or enable route summarization for Dynamic Privilege Access to reduce the number of routes that are sent to the network.

Configure Infrastructure Settings

To enable Prisma Access for internet access only for users, Prisma Access provides a default IP address pool and a cloud default DNS server. However, if you want your mobile users to access internal resources at your headquarters, data centers, or at remote network sites to which you onboarded to Prisma Access, you must allocate client IP address pools. Prisma Access uses the IP address pools to assign IP addresses to your mobile users and set up the Prisma Access service infrastructure.
Before you configure the infrastructure settings, ensure that you configure at least one project. Otherwise, when you try to commit and push the infrastructure settings, the commit will fail. For more information, refer to Create a Project.
  1. In Strata Cloud Manager, select WorkflowsPrisma Access SetupAccess AgentInfrastructure.
  2. If you are setting up the infrastructure for the first time, click Set Up Infrastructure Settings. Otherwise, edit the Infrastructure Settings.
  3. Add a hostname to the Domain Name for the service that Prisma Access Agents connect to.
    By default, users can access the service using an FQDN based on your hostname and the .epm.gpcloudservice.com domain.
  4. In Client IP Pool Allocation, Prisma Access provides a DHCP server that will manage the assignment of IP addresses to your endpoints for Dynamic Privilege Access.
    The project name and the location group ID from Prisma Access are part of the DHCP request. Each Prisma Access Agent connecting to a specific project is assigned an IP address from that project's IP subnet. When a user changes to a different project, a different IP address is assigned to the Prisma Access Agent from the project's IP subnet.
    You can configure the following options:
    • IP Lease Duration—Specify the amount of time (in seconds) for which the DHCP server allocates a network address to a Prisma Access Agent. The default IP address lease duration is 86,400 seconds.
    • Lease Grace Duration—Specify the amount of time that the Prisma Access Agent can continue to use its IP address lease after the lease expires. The default lease grace duration is 14,400 seconds.
    • Global DHCP Pool Summary—Select the IP pool on which you want to enable SC-NAT or configure and select the global summary IP pools for route summarization.
  5. Save the infrastructure settings.

Select Prisma Access Locations

Select the Prisma Access locations where you want to support Prisma Access Agent users. The location groups are used for Dynamic Privilege Access.
  1. In Strata Cloud Manager, select WorkflowsPrisma Access SetupAccess AgentInfrastructure.
  2. If you are setting up the infrastructure for the first time, Add Locations. Otherwise, edit the Prisma Access Locations.
  3. Select the Prisma Access locations where your mobile users will connect to.
    Depending on your license agreement, you can select either Local or Worldwide locations. The map shows the regions where you can deploy Prisma Access for Users. In addition, Prisma Access provides multiple locations within each region to ensure that your users can connect to a location that provides a user experience tailored to the users’ locale. For the best performance, Select All. Alternatively, select specific locations within each selected region where your users will need access. By limiting your deployment to a single region, you can have more granular control over your deployed regions and exclude regions required by your policy or industry regulations.
    For Prisma Access Agents, you can deploy Prisma Access to the following Strata Logging Service regions:
    • US
    • Germany
    • India
    This list will be updated as more regions become available.
    For the best user experience if you are limiting the number of locations, choose locations that are closest to your users or in the same country as your users. If a location isn’t available in the country where your mobile users reside, choose a location that is closest to your users for the best performance.
    The images in this section are provided for illustrative purposes only.
    1. Select an available region on the map.
    2. Click the plus sign + on the locations that you want to add.
      You can switch between the Map and List views. You can also Select All locations.
      In the list view, you can select from the list of available locations to deploy Prisma Access. You can select All sites within a region.
    3. Save your Prisma Access location settings.
  4. (Optional) Restrict access to your SaaS applications from unauthorized users.
    You can enable the egress IP allow lists for existing mobile user deployments and during new user onboarding. If you enable egress IP allow lists for existing Prisma Access deployments, Prisma Access migrates all the egress IP addresses already allocated for your locations to the egress IP allow lists. For new Prisma Access deployments, enable the egress IP allow list while onboarding the Prisma Access Agent mobile users. Every time you add a location or have an auto scaling event, you should retrieve the new egress IP addresses that Prisma Access allocates and add them to allow lists in your SaaS applications. You can then push the configuration to your Prisma Access deployment to confirm the egress IP allow lists allocated for your locations.
    1. Enable Egress IP Allowlist to display the IP addresses for onboarded Prisma Access locations.
    2. Copy and add the allocated addresses to the allow lists of your SaaS applications.
    3. Migrate to confirm the IP addresses allocated for the onboarded locations in Prisma Access.
    4. Retrieve the IP addresses for new onboarded locations or during an auto scaling event.
      1. Select the Location name to find the new egress IP addresses allocated to the location.
      2. Add these IP addresses to the allow lists for your SaaS applications before you confirm them in Prisma Access.
      3. Save the allocated egress IP addresses.

Enable SC-NAT Support for Dynamic Privilege Access

Use SC-NAT support for Dynamic Privilege Access (DPA) if you use DPA and have created service connections to access private apps in your data center or headquarters location. Multiple projects in your DPA environment can experience IP address exhaustion if the IP addresses of the infrastructure subnet overlap. To fix this issue, Prisma Access can implement source NAT (SNAT) for IP addresses, which:
  • Lets Prisma Access map a single IP address for a mobile user accessing private apps using a service connection
  • Provides you with SNAT for easy routing
  • Eliminates IP Pool overlap
  • Eliminates IP Pool IPv4 exhaustion between Prisma Access and your data center or headquarters location
DPA customers can onboard client locations to Prisma Access using service connections. However, multiple projects may have large IP pools on multiple data centers, leading to potential exhaustion of private IP pools. To solve this issue, Dynamic Privilege Access in Prisma Access offers support for SC-NAT with defined pools. Customers have the option to use SC-NAT instead of the infrastructure subnet in order to divide up the IP pools. If you enable SC-NAT for a service connection corporate access node (SC-CAN), SC-NAT will always be supported for that service connection.
With DPA enabled, you can turn SC-NAT on (to use SC-NAT) or off (to use the Infrastructure Subnet) per project.
  1. In Strata Cloud Manager, select WorkflowsPrisma Access SetupService Connections.
  2. Select a service connection from the Service Connections table.
  3. Click the check box for Data Traffic Source NAT.
  4. After you click the Data Traffic Source NAT check box, you see the mandatory IP Pool field. Enter the subnets for which you want to enable SC-NAT.
  5. Save your changes.

Enable Route Summarization for Dynamic Privilege Access

Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access 5.2 Innovation
  • Minimum Prisma Access dataplane version: 11.2.3
  • Prisma Access license with the Mobile User subscription
  • Role: Superuser
For enterprises that have on-premises hardware with limited capacity, such as simple cloud routers that can accommodate only a few hundred routes, Prisma Access can summarize Mobile User (MU) routes when advertising the routes to the on-premises network. Route summarization minimizes the requirements on these devices by staying within the route capacity on the data center.
To enable route summarization, you can configure global summary pools, which are lists of large IP pools that can be used across multiple projects. When a user connects to a project using the Prisma Access Agent and the agent is assigned an IP address within the range of a global summary pool, the Prisma Access service connection advertises the global summary pool instead of the smaller aggregate route.
To help illustrate route summarization for projects, consider the following scenario:
  • You configure a global summary pool of 10.10.0.0/16 and enable the route summarization option on service connection SC-A.
  • User-A connects to Project-A, which is assigned the IP project pool of 10.10.10.0/24. Upon connection, the Prisma Access Agent acquires the 10.10.10.10/32 IP address.
  • User-B connects to Project-B, which is assigned the IP project pool of 10.10.11.0/24. Upon connection, the Prisma Access Agent acquires the 10.10.11.10/32 IP address.
  • In this case, the service connection advertises only one subnet (the global summary pool of 10.10.0.0/16) instead of the /24 aggregate routes to the on-premises network through eBGP.
    • Prisma Access won't summarize IP pools that are not part of a project.
    • Project IP pools within a project can overlap, and global summary IP pools can overlap as well.
    • The global summary pools should be large IP pools that contain the project IP Pools that are associated with multiple projects.
To enable route summarization for projects in Strata Cloud Manager:
  1. Configure the project IP pools in the project settings in ManageNGFW and Prisma Access <Snippet> ObjectsDynamic Privilege AccessProjects.
  2. Configure the global summary IP pools in WorkflowsPrisma Access SetupAccess AgentInfrastructure Settings.
  3. Enable route summarization in the service connection.
    1. Go to WorkflowsPrisma Access SetupService Connections.
    2. Select a service connection from the Service Connections table.
    3. Edit the Routing settings.
    4. Select Summarize Mobile User Routes before advertising.
  4. Save the routing settings.
  5. Save the service connection settings.