Prisma SD-WAN SASE Easy Onboarding
Integrate Prisma SD-WAN with Prisma SASE without using
CloudBlades.
Where Can I Use
This? | What Do I Need? |
|
- Prisma SD-WAN
- Prisma Access Cloud Managed
- Prisma Access with Aggregate Bandwidth; the
bandwidth licensing mode must be enabled per compute
location on the Prisma Access Cloud Managed
portal.
- Identification of the IPSec Termination Nodes within
Prisma Access for connectivity.
- Cloud Service Plugin 5.2.0-h24
- Ensure that you have Prisma Access (Cloud Managed) and
Prisma SD-WAN in the same TSG.
|
Effortlessly integrate Prisma SD-WAN with Prisma Access
through a native onboarding process. Prisma Secure Access Service Edge (SASE) offers the
most comprehensive solution in the industry for secure access at the edge, allowing
organizations to connect and safeguard users, devices, and applications. Prisma SASE is
the perfect fit for remote sites with single or multiple internet links, ensuring
direct, reliable, and secure connections to both public and private applications.
Earlier, you needed the Prisma Access for Networks (Cloud Managed)
CloudBlade to connect Prisma Access to Prisma SD-WAN. With the native
SASE Integration with Prisma SD-WAN feature, you can directly onboard Prisma SD-WAN sites to Prisma Access, bypassing the need of a
CloudBlade.
Prisma SD-WAN supports this integration for both Cloud Managed
and Panorama Managed Prisma Access.
In case you have previously set up a CloudBlade to establish the connection
between Prisma SD-WAN and Prisma Access, you must first deactivate
the CloudBlade and contact Palo Alto Networks Customer Support before using this
workflow.
Prerequisites for Panorama Managed Prisma Access
- Install the Cloud Services plugin (minimum
version 5.2.0-h24).
- Create a service account with a superuser
role for All Apps and Services.
- Run the following command on Panorama (as an administrator) with the service account
that was created above:
request plugins cloud_services prisma-access store-client-details client-id <client-id> client-secret <client-secret> tsg-id <tsg-id>
The above prerequisites apply only to Panorama Managed Prisma Access.
Native SASE integration creates an IPSec tunnel between a Prisma SD-WAN
circuit and Prisma Access. To use this workflow you must first do the following: