What is the PrismaAccess-Allow-Internet rule appearing in logs?

What is the PrismaAccess-Allow-Internet rule appearing in logs?

1282
Created On 03/20/25 19:36 PM - Last Modified 10/17/25 21:45 PM


Symptom


• Started seeing new traffic logs matching a rule called 'PrismaAccess-Allow-Internet' which we didn't create.
• Source IP address is unfamiliar and classified as a class E.
• Logs show traffic allowed from 'inter-fw' zone to 'untrust' zone.
• The rule 'PrismaAccess-Allow-Internet' seems to be a built-in rule and was never configured by the customer.



Environment


  • Prisma Access: 3.2
  • PANOS: 10.2.4
  • NGPA (Nat Gateway Prisma Access)


Cause


  • The logging is due to traffic from the Mobile User Gateway (MU-GW) being routed through a NAT instance, as part of the IP Optimization feature in Prisma Access.
  • The NAT instance uses a source IP address that is automatically generated and is not expected to be familiar to the customer.
  • This traffic is then logged with the source zone as 'inter-fw' because the NAT instance is in that zone, and the untrust zone as destination when the traffic is allowed to reach public IP addresses.
  • This NAT layer is enabled when there are multiple MU-SPNs deployed in the compute region and IP Optimization is enabled.
  • The rule 'PrismaAccess-Allow-Internet' is a built-in rule and not configured directly by the customer.
  • This is working as expected.


Resolution


"Nat Layer" is enabled which means the traffic for the mobile user instance go through a NAT instance for source NAT before getting routed to the internet.



Additional Information


N/A

Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000sdYjCAI&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail