Techclick Infosec Training Document

Zero Trust & Prisma Access
Complete Guide

How Palo Alto Networks implements Zero Trust architecture across physical NGFW and cloud-delivered SASE — from concept to configuration.

TC
Techclick Infosec
// Network Security Training & Research · techclick.in
Enterprise network security training covering Palo Alto NGFW, Prisma Access, Zscaler SASE, and Zero Trust architecture — designed for L2/L3 security engineers across India, SEA & Middle East.
🔥 PCNSE ☁ Zscaler ZIA ☁ Zscaler ZPA 🛡 CISSP ⚡ Expert Level
LEVEL L2/L3 Network Security Engineers
UPDATED March 2026
TECH PAN-OS · Prisma Access · SCM
READ TIME ~25 min
01

Introduction

This document covers how Palo Alto Networks implements Zero Trust — both on physical NGFW and via Prisma Access (cloud-delivered SASE). It explains the architecture, configuration, and policy logic for a company with HQ, branch offices, and remote users.

Key Principle Zero Trust is not a product — it is a security framework. Palo Alto implements it through a combination of features: User-ID, App-ID, HIP, SSL Decryption, DLP, WildFire, and Prisma Access working together.
02

Zero Trust Concept

✗  Old Model — Trust But Verify
Inside network = trusted automatically
Perimeter firewall is the only control
Once inside LAN, move anywhere freely
VPN gives full network access
No device posture check
IP-based rules only — no user context
✓  Zero Trust — Never Trust, Always Verify
Every access request verified regardless of location
Microsegmentation — no lateral movement
Identity-aware policies (user + group)
Device posture checked before access
Least privilege — only what you need
Continuous re-verification — not one-time
03

6 Pillars of Zero Trust in Palo Alto

All 6 pillars must pass for a session to be allowed. Failure in any single pillar results in deny or quarantine.

PILLAR 01
User Identity
User-ID + SAML + MFA
Maps every IP to a real username via AD Security Event logs. Policies reference usernames/groups, not IP addresses. Step-up MFA enforced for sensitive resources.
PILLAR 02
Device Trust
HIP Check via GlobalProtect
GlobalProtect agent reports device posture — AV installed, disk encrypted, OS patched, domain joined. Valid credentials alone are not enough — device must also pass HIP.
PILLAR 03
Application Control
App-ID — Layer 7 inspection
Identifies actual application inside traffic regardless of port. Port 443 could be Office365, Dropbox, TeamViewer, or malware. Allow named apps only — deny everything else.
PILLAR 04
Network Segmentation
Zones + Microsegmentation
Every zone crossing is inspected. Finance servers cannot reach HR servers without explicit allow rules. Attacker who compromises one host cannot move laterally.
PILLAR 05
Data Security
SSL Decrypt + DLP
90% of traffic is encrypted — without SSL decryption you are blind. Decrypts, inspects for sensitive data (PII, credit cards, IP), re-encrypts. Blocks exfiltration even by trusted users.
PILLAR 06
Threat Prevention
IPS + WildFire + DNS Security
Even authenticated, compliant users on allowed apps — traffic itself is scanned. WildFire sandboxes unknown files. DNS Security blocks C2 domains. IPS catches exploit patterns.
04

Zero Trust Policy Decision Logic

This is what Prisma Access evaluates for every single session — in order. All checks must pass.

👤Check 1 — User-IDIs "[email protected]" in allowed AD group?PASS ✓
💻Check 2 — HIP / DeviceDisk encrypted + AV running + OS patched?PASS ✓
📱Check 3 — App-IDApplication = web-browsing to ERP? Not TeamViewer?PASS ✓
🔒Check 4 — Zone PolicySource=Prisma-Zone → Dest=ERP-Zone policy exists?PASS ✓
📄Check 5 — DLPAny sensitive data (PII, credit card) being sent out?PASS ✓
Check 6 — ThreatAny exploit signatures, malware, C2 callbacks?PASS ✓
Result All 6 checks passed → Session ALLOWED. If any single check fails → DENY or QUARANTINE. That is Zero Trust.
05

Why Prisma Access — Not Just Physical PA

Physical PA firewall protects your building. Prisma Access protects your users and data — wherever they are.

ScenarioPhysical PA OnlyPrisma Access (SASE)
Branch protectionNeed PA box at every branchIPSec tunnel — no hardware needed
Remote / WFH userVPN → backhauled to HQGP → nearest PoP (Mumbai for India)
SaaS inspectionTraffic hairpins through HQInspected in cloud before reaching SaaS
Policy managementPer-device or PanoramaStrata Cloud Manager — single pane
ScalingBuy more hardwareElastic — auto-scales
New branch setupShip hardware, rack, configureConfigure tunnel in SCM — done
CapExHigh — PA-3200/5200 seriesZero — OpEx subscription
Zero Trust coverageWhere hardware existsEverywhere — all users, all locations
06

Mobile User → Private App Flow

This is how a remote user in Pune accesses an internal ERP application at HQ Delhi — without a traditional VPN.

STEP 01
User opens laptop
GP auto-connects
STEP 02
SSL tunnel
To Mumbai PoP
STEP 03
IdP Auth + HIP
SAML + posture
STEP 04
Policy check
SCM security rule
STEP 05
IPSec svc conn
Prisma → HQ PA
STEP 06
Private app
LAN delivery
Pro Tip The Service Connection is the bridge. One IPSec tunnel at HQ serves all remote users globally. You don't need VPN concentrators or per-user firewall rules at HQ. Prisma handles all user sessions in the cloud.
07

SCM Portal Setup — Step by Step

  • 1

    Service Connection — HQ IPSec Tunnel

    Define the IPSec tunnel from Prisma cloud to your HQ firewall. After saving, SCM gives you Prisma's public IP — copy it for HQ firewall config.

    Manage → Service Connections → Add
  • 2

    Mobile User Configuration

    Set the PoP region (India South — Mumbai), IP pool for GP users (100.64.0.0/10), internal DNS server, DNS suffix, and split-tunnel setting.

    Manage → Mobile Users → Add
  • 3

    IdP Integration (Azure AD / Okta)

    Upload SAML Federation Metadata XML from Azure AD. Map attributes: username → userprincipalname, groupname → groups. Copy ACS URL back to Azure.

    Identity Services → Identity Provider → Add
  • 4

    HIP Profile — Device Posture

    Define checks: AV running + definitions <7 days, disk encryption enabled, host firewall on, OS patched <30 days. Attach HIP profile to security policy.

    Objects → HIP Profiles → Add
  • 5

    Security Policy Rule

    Source: mobile-user zone, 100.64.0.0/10, AD group. HIP: compliant-devices. Destination: service-conn zone, 10.10.0.0/16. Action: Allow + Threat Prevention profile.

    Policies → Security → Add Rule
  • 6

    Commit and Push

    Select Mobile Users (India region) + Service Connections (HQ-Delhi-SC). Push takes 2–5 minutes to propagate to Prisma PoP.

    Commit → Push to Devices
FieldService Connection Value
NameHQ-Delhi-SC
RegionAsia Pacific — India South (Mumbai)
Subnets to advertise10.10.0.0/16 (your HQ LAN)
IKE VersionIKEv2
EncryptionAES-256-GCM
DH GroupGroup 20
Pre-Shared KeyGenerate strong PSK — save for HQ firewall
08

HQ Firewall IPSec Config — Palo Alto

After completing SCM setup, configure the IPSec peer on your HQ PA firewall.

IKE CRYPTO PROFILE # Network → Network Profiles → IKE Crypto → Add
Name : Prisma-IKE-Crypto
DH Group : group20
Authentication: sha256
Encryption : aes-256-gcm
Key Lifetime : 8 hours
IPSEC CRYPTO PROFILE # Network → Network Profiles → IPSec Crypto → Add
Name : Prisma-IPSec-Crypto
Protocol : ESP
Encryption : aes-256-gcm
Authentication: none (GCM is AEAD — auth is built-in)
DH Group : group20
Key Lifetime : 1 hour
IKE GATEWAY # Network → Network Profiles → IKE Gateways → Add
Name : Prisma-SC-GW
Version : IKEv2 only
Interface : ethernet1/1 (WAN interface)
Local IP : 203.x.x.x (HQ WAN IP)
Peer IP : 34.100.x.x (Prisma SC IP from SCM)
Authentication : Pre-Shared Key
PSK : YourStrongPSKHere
IKE Crypto Profile: Prisma-IKE-Crypto
IPSEC TUNNEL + STATIC ROUTE # Network → IPSec Tunnels → Add
Name : Prisma-SC-Tunnel
Tunnel Interface : tunnel.10 (zone = Prisma-Zone)
IKE Gateway : Prisma-SC-GW
IPSec Crypto : Prisma-IPSec-Crypto

# Static Route — return path for mobile users
Destination : 100.64.0.0/10 (GP IP pool)
Next Hop : tunnel.10
09

Verification Commands

PALO ALTO CLI # IKE Phase 1 status
show vpn ike-sa

# IPSec Phase 2 status
show vpn ipsec-sa

# Traffic counter through tunnel
show vpn flow tunnel-id <id>

# User-ID mapping check
show user ip-user-mapping all

# HIP report for a specific IP
show user hip-report ip <ip>

# Active GlobalProtect sessions
show global-protect-gateway current-user
TestExpected Result
GP agent connectsStatus = Connected, IP = 100.64.x.x assigned
ping 10.10.1.50 from laptopReply from HQ server
tracert 10.10.1.50Hops: 100.64.x.x → Prisma PoP → HQ LAN
show vpn ike-saState = ESTABLISHED, Peer = 34.100.x.x
SCM → Monitoring → TrafficUser session visible with App-ID resolved
Non-compliant device (AV off)HIP fails → access denied, remediation page
10

Zero Trust Coverage: Physical PA vs Prisma Access

PA FeatureZero Trust RolePhysical PAPrisma Access
User-IDVerify WHO — username not IPHQ onlyAll locations
GP + HIPVerify WHAT device — posture checkVPN usersAll users globally
App-IDVerify WHAT application — not just portHQ onlyAll locations
Zones + PolicyLeast privilege — no lateral movementWhere hardware existsCloud-wide
SSL DecryptionSee inside encrypted trafficHQ onlyAll users, all apps
DLPProtect what data is leavingLimitedFull SaaS + web
WildFire + IPSVerify traffic is not maliciousHQ onlyAll locations
Summary Zero Trust in Palo Alto is not one toggle — it is the combination of all these features working together, enforced on every session, continuously re-evaluated. Prisma Access extends this enforcement to every user, every location, without requiring hardware at each site.