Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Implementing Palo Alto Networks Prisma® Access
Implementing Palo Alto Networks Prisma® Access

Implementing Palo Alto Networks Prisma® Access: Learn real-world network protection

Arrow left icon
Profile Icon Tom Piens Aka 'Reaper'
Arrow right icon
zł177.99
Full star icon Full star icon Full star icon Full star icon Full star icon 5 (1 Ratings)
eBook May 2024 346 pages 1st Edition
eBook
zł177.99
Paperback
zł221.99
Subscription
Free Trial
Arrow left icon
Profile Icon Tom Piens Aka 'Reaper'
Arrow right icon
zł177.99
Full star icon Full star icon Full star icon Full star icon Full star icon 5 (1 Ratings)
eBook May 2024 346 pages 1st Edition
eBook
zł177.99
Paperback
zł221.99
Subscription
Free Trial
eBook
zł177.99
Paperback
zł221.99
Subscription
Free Trial

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Table of content icon View table of contents Preview book icon Preview Book

Implementing Palo Alto Networks Prisma® Access

Designing and Planning Prisma Access

Prisma Access is Palo Alto Networks’ Secure Access Service Edge (SASE) solution that provides Firewall-as-a-Service (FWaaS) functions to secure internet and network access for branch offices and mobile users leveraging the full functionality of the well-known Next Generation Firewall (NGFW) platform. SASE enables a distributed cloud environment with security processing nodes in different countries and locations so that protection can take place close to the branch office or remote user versus the traditional method of tunneling all traffic back to the main data center or headquarters location. This approach ensures low latency and in-country internet breakout.

In this chapter, you will be introduced to the basic building blocks of Palo Alto Networks’ Prisma Access. We will review which preparations will need to be made and which steps need to be taken before we can deploy a tenant. We are going to learn how each component has similarities...

Technical requirements

To complete this chapter, you should have a working knowledge of Border Gateway Protocol (BGP) and cloud networking.

Routing in Prisma Access

In this section, we’ll learn how the basic building blocks of Prisma Access communicate with one another. This knowledge is critical in the later stages when building, planning, and troubleshooting to understand why certain components act differently from others.

Important concepts

Before we get started, we need to learn about the building blocks. We will dive much deeper into the individual components in the next few chapters, but it is important to gain a good understanding of what each component is for so that you can more easily imagine where each piece fits into the puzzle. We’ll start with a basic outline and gradually build upon what we’ve learned. This is what you need to know so that the following sections make sense.

Cloud infrastructure is the base on which everything is built. It is the embodiment of the tenant that is spun up. Any configuration changes you make here apply to everything; it is the cloud where everything...

Planning the service infrastructure

As we saw earlier, the service infrastructure is what ties everything together. To ensure all the components can communicate with each other, a subnet is needed; this serves as the backbone of everything. IP addresses will be needed to set up internal VPN tunnels and BGP peers.

Since this subnet serves as your backbone network in the cloud, and the cloud is connected to your data centers, a range needs to be selected that does not overlap with any of the production networks. In most cases, an x.x.x.x/23 subnet should suffice to provide enough IP addresses to support the entire infrastructure. However, if the deployment calls for several thousands of remote users in several different locations globally or a large number of remote networks in many different countries, a larger subnet may be required.

Planning remote networks

As we touched on earlier, remote networks are deployed based on the bandwidth assigned to a specific compute location. Once bandwidth is assigned, one or more RN-SPN nodes are provisioned for a compute location, and remote networks can be connected to them. The first task when planning the Prisma Access deployment is to estimate how many remote offices there will be and what the bandwidth requirements will look like. Once you know how many sites and how much peak throughput is estimated to be required, you can calculate the amount of bandwidth you will need to purchase.

Consider how much bandwidth will be needed; for anything between 50 Mbps and 1,000 Mbps, a single RN-SPN node is spun up in a compute location, but going over 1,000 Mbps will cause a second node to be spun up and the assigned bandwidth to be divided between the two.

At this time, assigning 1,050 Mbps to a compute location would cause two nodes to be spun up; one node will be capable of...

Planning mobile user locations

At the time of writing, there are 116 locations available worldwide to select when deploying mobile user security processing nodes. These locations are spread across multiple major regions: the Americas, Europe, the Middle East, and Asia Pacific. There are also some smaller compute regions, such as the Netherlands, Canada, Ireland, and Hong Kong.

When planning out which countries need to be onboarded, you need to consider that each location that is onboarded will require at least one /24 subnet to serve as an IP pool for the mobile users in that country. For larger countries, multiple /24 subnets may be needed to account for the number of simultaneously connected users. These subnets are assigned to the MU-SPNs at random out of a larger global or regional pool by the service infrastructure. You can choose to use one large global pool or lots of smaller regional pools. If a regional pool is depleted, the global pool will be used to extract additional...

Summary

In this chapter, we covered the basic building blocks of what makes up Prisma Access and how these are connected. You should now be able to identify that an RN-SPN is used to connect a remote office, an SC-CAN is used to connect a data center, and an MU-SPN is used as an in-country gateway for mobile users.

In the next chapter, we’ll go over the activation process and how to deploy the infrastructure and Cortex Data Lake.

Left arrow icon Right arrow icon

Key benefits

  • Find out how to activate, deploy, and configure Prisma Access
  • Configure mobile user and remote network security processing nodes
  • Understand user identification and the Cloud Identity Engine
  • Purchase of the print or Kindle book includes a free PDF eBook

Description

Discover how Palo Alto Networks' Prisma Access, a firewall as a service (FWaaS) platform, securely connects mobile users and branch offices to resources. This guide, written by renowned Palo Alto Networks expert Tom Piens, introduces cloud-delivered security and Prisma Access components. You’ll learn how Prisma Access fits into the security landscape and benefits organizations with remote networks and mobile workforces, and gain essential knowledge and practical skills in setting up secure connections, implementing firewall policies, utilizing threat prevention, and securing cloud applications and data. By the end, you'll be able to successfully implement and manage a secure cloud network using Prisma Access.

Who is this book for?

This book is for network engineers, security engineers, security administrators, security operations specialists, security analysts, and anyone looking to integrate Prisma Access into their security landscape. Whether you're a newcomer to the field or a seasoned expert, this guide offers valuable insights for implementing and managing a secure cloud network effectively. Basic knowledge of Palo Alto will be helpful, but it’s not a prerequisite.

What you will learn

  • Configure and deploy the service infrastructure and understand its importance
  • Investigate the use cases of secure web gateway and how to deploy them
  • Gain an understanding of how BGP works inside and outside Prisma Access
  • Design and implement data center connections via service connections
  • Get to grips with BGP configuration, secure web gateway (explicit proxy), and APIs
  • Explore multi tenancy and advanced configuration and how to monitor Prisma Access
  • Leverage user identification and integration with Active Directory and AAD via the Cloud Identity Engine

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : May 17, 2024
Length: 346 pages
Edition : 1st
Language : English
ISBN-13 : 9781835086605
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning

Product Details

Publication date : May 17, 2024
Length: 346 pages
Edition : 1st
Language : English
ISBN-13 : 9781835086605
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just zł20 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just zł20 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 645.97
The Ultimate Kali Linux Book
zł221.99
Implementing Palo Alto Networks Prisma® Access
zł221.99
Mastering Palo Alto Networks
zł201.99
Total 645.97 Stars icon

Table of Contents

16 Chapters
Part 1:Activate and Configure Prisma Access Chevron down icon Chevron up icon
Chapter 1: Designing and Planning Prisma Access Chevron down icon Chevron up icon
Chapter 2: Activating Prisma Access Chevron down icon Chevron up icon
Chapter 3: Setting Up Service Infrastructure Chevron down icon Chevron up icon
Chapter 4: Deploying Service Connections Chevron down icon Chevron up icon
Part 2:Configure Mobile User and Remote Network Security Processing Nodes Chevron down icon Chevron up icon
Chapter 5: Configuring Remote Network SPNs Chevron down icon Chevron up icon
Chapter 6: Configuring Mobile User SPNs Chevron down icon Chevron up icon
Chapter 7: Securing Web Gateway Chevron down icon Chevron up icon
Chapter 8: Setting Up Your Security Policy Chevron down icon Chevron up icon
Part 3:Advanced Configuration and Best Practices Chevron down icon Chevron up icon
Chapter 9: User Identification and Cloud Identity Engine Chevron down icon Chevron up icon
Chapter 10: Advanced Configurations and Insights Chevron down icon Chevron up icon
Chapter 11: ZTNA Connector Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Full star icon Full star icon 5
(1 Ratings)
5 star 100%
4 star 0%
3 star 0%
2 star 0%
1 star 0%
Amazon Customer Sep 24, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Tom's book does a very good job of explaining the high level architectural components of Prisma Access in a way that anyone familiar with SASE solutions and Palo Alto Networks network security products would find it pretty easy to digest.The first chapter provides a high level description, and each successive chapter dives into the configuration and implementation details for each of the components, with PLENTY of explanation of not only the how-to for each configuration element/component, but the WHY and how each configuration tied back to the broader architecture.In addition to architecture and implementation, there is also plenty of operational configuration overview and explanation in the final chapters, as well as an overview of some of the additional features like ZTNA connectors and ADEM.Good book to have on your shelf if you're involved in the design, implementation, or operation of a Prisma Access infrastructure. Lots of detailed screen shots of the configurations.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.