Summary
In this chapter, we learned about Prisma Access and how to configure Panorama to control how all the remote networks and users interact, as well as which security policies are applied. With this knowledge, you can determine if and when Prisma Access can provide added value to you or your customers and how to quickly set up all its components.
In the next chapter, we will review the best practices surrounding hardening the management interface and how to leverage dynamic user groups.