Palo Alto

    Palo Alto Prisma Access: SASE design for distributed enterprises

    TechLeague Editorial··8 min read

    Prisma Access turns Palo Alto policy into a globally delivered SASE service. Done right, it replaces hub firewalls and MPLS.

    Building blocks

    • Service connections to HQ/DC for east-west.
    • Remote networks (IPSec) from branches/SD-WAN.
    • Mobile users via GlobalProtect to Prisma.

    Policy

    • Same App-ID/Content-ID stack as on-prem PAN-OS.
    • Posture via HIP and device certs.

    Steering

    • Per-app routing to direct internet vs corporate.
    • Privileged access for SaaS via Cloud Identity Engine.

    Observability

    • Cortex Data Lake centralizes logs.
    • ADEM for end-to-end user experience.

    Pitfalls

    • Right-size compute units; over-provision early.
    • Plan IP allocation pools per region.

    Train SASE-style policy reasoning in a TechLeague tournament.