<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prisma Access Security policy enforcement in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/prisma-access-security-policy-enforcement/m-p/597031#M5780</link>
    <description>&lt;P&gt;So I was looking at prisma access content and came across this:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;If traffic is initiated from a service connection and bound for a mobile user or a remote network, Prisma Access cannot restrict the traffic. The traffic hits no security-enforcement point, because the RN-SPN and MU-SPNs enforce Security policy only on sessions ingressing into Prisma Access from behind the security processing node. This is not a recommended architecture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The proper way to control traffic sessions that come out of a service connection is with an on-premises firewall on the network behind the service connection. An on-premises firewall at the data center is the correct way to enforce Security policy for a session initiated by a service connection to a remote network.&lt;BR /&gt;&lt;BR /&gt;when they say firewall on the network behind the service connection, can this be the same palo alto that the service connection terminates to? I would assume so no?&lt;/P&gt;</description>
    <pubDate>Thu, 05 Sep 2024 21:32:26 GMT</pubDate>
    <dc:creator>S_Williams901</dc:creator>
    <dc:date>2024-09-05T21:32:26Z</dc:date>
    <item>
      <title>Prisma Access Security policy enforcement</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/prisma-access-security-policy-enforcement/m-p/597031#M5780</link>
      <description>&lt;P&gt;So I was looking at prisma access content and came across this:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;If traffic is initiated from a service connection and bound for a mobile user or a remote network, Prisma Access cannot restrict the traffic. The traffic hits no security-enforcement point, because the RN-SPN and MU-SPNs enforce Security policy only on sessions ingressing into Prisma Access from behind the security processing node. This is not a recommended architecture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The proper way to control traffic sessions that come out of a service connection is with an on-premises firewall on the network behind the service connection. An on-premises firewall at the data center is the correct way to enforce Security policy for a session initiated by a service connection to a remote network.&lt;BR /&gt;&lt;BR /&gt;when they say firewall on the network behind the service connection, can this be the same palo alto that the service connection terminates to? I would assume so no?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 21:32:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/prisma-access-security-policy-enforcement/m-p/597031#M5780</guid>
      <dc:creator>S_Williams901</dc:creator>
      <dc:date>2024-09-05T21:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access Security policy enforcement</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/prisma-access-security-policy-enforcement/m-p/597469#M5805</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/271836"&gt;@S_Williams901&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes! It can be the same palo that the service connection terminates to or another on-premises palo to manage and enforce policies. It really comes down to&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;Service Connection (SC-CAN) being aimed aimed for HQ or Data Centers where its assumed you already have existing firewalls on-premise or virtually to enforce security.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 03:08:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/prisma-access-security-policy-enforcement/m-p/597469#M5805</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-09-11T03:08:10Z</dc:date>
    </item>
  </channel>
</rss>

