Configure the new NGFW as Zero Trust Network Access (ZTNA) Connector to streamline
secure private application access for Prisma® Access
users.
Managing secure access to private applications often requires deploying multiple
dedicated appliances, which increases operational overhead and infrastructure costs.
The NGFW as Zero Trust Network Access (ZTNA) Connector addresses these challenges by
leveraging your existing Palo Alto Networks® Next-Generation Firewalls
(NGFWs) to bridge the gap between users and applications. This capability
streamlines secure private application access for Prisma®
Access users without requiring additional infrastructure.
By transforming your
firewall into a ZTNA Connector, you reduce
complexity through the automation of connectivity, NAT configurations, and
application onboarding. You can achieve a unified security posture across your
environment and automate your private application workflows to optimize resource
allocation. This integrated approach ensures that security policies remain
consistent while significantly reducing the time required to onboard new services
across your distributed network architecture.
Additionally, Server Initiated Traffic for NGFW Connector, managed by Panorama,
extends network connectivity for data center application servers. This feature
allows servers to initiate outbound TCP, UDP, and ICMP sessions to GlobalProtect
users, Remote Network hosts, and ZTNA Connector or NGFW IP subnet targets,
overcoming previous communication limitations. It integrates with existing NGFW
capabilities for routing and security policy enforcement.