Explicit Proxy Best Practices
Focus
Focus
Prisma Access

Explicit Proxy Best Practices

Table of Contents

Explicit Proxy Best Practices

Use the recommended best practices when implementing a Prisma Access Explicit Proxy deployment.
Where Can I Use This?
What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • Prisma Access
    license
Use the recommended Best Practices when implementing your Explicit Proxy deployment for optimal performance and an ideal user experience:
  • General Explicit Proxy Deployment Best Practices
    :
    • Deploy Explicit Proxy in at least two regions for redundancy.
    • If all your users are behind a NAT device, and if Explicit Proxy sees the IP address of the NAT device as the source IP address, you should allocate one NAT IP address per 500 mobile users.
  • PAC File Best Practices
    —When setting up the PAC file, bypass all SAML, CIE, and Authentication Cache Service (ACS) URLs.
  • SAML Authentication Best Practices
    :
  • Kerberos Authentication Best Practices
    —The keytab file should be less than 60 KB in size.
  • Security Policy Rule Best Practices
    —Use security policy rule best practices by setting the
    Action
    in policies to
    Deny
    instead of
    Drop
    or
    Reset
    . This actions helps in releasing the resources quickly inside the Explicit Proxy Security Processing Node (EP-SPN) for optimal performance.
  • Decryption Best Practices
    —Configure at least one decryption policy and one decryption certificate.
  • IP Source Address Best Practices
    —To restrict access to Explicit Proxy to specific source IP addresses, use special objects, which include Address Objects, Address Groups, and External Dynamic Lists (EDLs).

Recommended For You