Configure Explicit Proxy
The explicit proxy method allows you to troubleshoot
issues more easily, since the client browser is aware of the existence
of the proxy.
- (VM Series only) If you have not already done so, activate the license for web proxy.You must activate the web proxy license for the PA-1400 Series, PA-3400 Series, and VM-Series. Learn how to activate your subscription licenses for the PA-1400 Series and PA-3400 Series or activate the web proxy license for the VM-Series in the following step.
- Log in to the Customer Service Portal (CSP).
- Editthe deployment profile.
- SelectWeb Proxy (Promotional Offer).
- ClickUpdate Deployment Profile.
- On the firewall, retrieve the license keys from the server.If the license key retrieval is not successful, restart the firewall and repeat this step before proceeding.
- Set up the necessary interfaces and zones.As a best practice, use Layer 3 (L3) for the three interfaces the web proxy uses and configure a separate zone for each interface within the same virtual routers and the same virtual systems.
- Configure an interface for the client traffic.Be sure to carefully copy the IP address for this interface and save it in a secure location because you must enter it as theProxy IPaddress when you configure the web proxy.
- Configure an interface for the outgoing traffic to the internet.
- Configure a loopback interface for the proxy.All incoming traffic is routed through this interface to the proxy.
- Set up the DNS proxy for Explicit Proxy.
- Configure a DNS proxy object for the proxy connection.
- Configure a DNS Server profile with both primary and secondary DNS servers.You must configure both a primary and a secondary DNS server for web proxy.
- To enable decryption for MITM detection, create a self-signed root CA certificate or import a certificate signed by your enterprise certificate authority (CA). For more information, refer to the best practices for administrative access.
- Ensure you have completed the pre-deployment steps for the authentication method you want to configure.
- If you have a DNS security subscription, integrate the web proxy firewall with Explicit Proxy to sinkhole any requests that match the DNS security categories that you specify.
- Select.PanoramaCloud ServicesConfigurationOn-Prem Proxy
- Editthe settings then select theDevice Groupyou want the web proxy firewall to use orAdda new device group.To integrate the web proxy firewall with Prisma Access, you must configure the web proxy firewall in a separate device group that contains no other firewalls or virtual systems. If the firewall is already a member of a device group, create a child device group as a sub-group and move the firewall to the child device group.
- (Optional) SelectBlock SettingstoAddaBlocked Domainor any domains that areExempted Domainsbecause they are sinkholed due to matching one or more of the DNS Security categories.
- (Optional) Select whether you want toLog any requests made to blocked domains.
- ClickOK.
- Set up the Explicit Proxy.
- On the firewall, selectthenNetworkProxyEdittheProxy Enablementsettings.
- SelectExplicit Proxyas theProxy Typethen clickOKto confirm the changes.If the only available option is None, verify that you have an active license for the web proxy feature.
- EdittheExplicit Proxy Configuration.
- Specify theConnect Timeoutto define (in seconds) how long the proxy waits for a response from the web server. If there is no response after the specified amount of time has elapsed, the proxy closes the connection.
- Select theListening Interfacethat contains the firewall where you want to enable the web proxy.Specify the ingress interface for the client traffic.
- Select theUpstream Interfacethat contains the interface with the web proxy that reroutes the traffic to the server.If you are using a loopback interface, specify that interface as theUpstream Interface.
- Specify the IP address of the listening interface as theProxy IP.Enter the IP address of the interface you created in Step 2.a
- Specify theDNS Proxyobject you created in Step 3.a.
- SelectCheck domain in CONNECT & SNI are the sameto prevent domain fronting attacks by specifying different domains between the CONNECT request and the Server Name Indication (SNI) field in the HTTP header.
- Select theAuthentication service typeyou want to use (eitherSAML/CASorKerberos Single Sign On).Be sure to complete all necessary pre-deployment and configuration steps for the authentication method you select. Select only one of the following authentication methods:
- ClickOKto confirm the changes.
- Configure the necessary security policy rules to decrypt traffic and reroute applicable traffic to the proxy.You will need to create the following types of rules:
- Source NAT (if applicable)
- Decryption
- Security
- Configure a decryption policy to decrypt the traffic so it can be rerouted if necessary.To avoid decrypting traffic twice, select the zone that contains the upstream interface as the source zone for the decryption policy.
- (Optional but recommended) Selectand selectObjectsDecryption ProfileBlock sessions on SNI mismatch with Server Certificate (SAN/CN)to automatically deny any sessions where the Server Name Indication (SNI) does not match the server certificate.
- Configure the necessary security policy rules.
- Create a security policy rule to allow traffic from the client to the interface you selected as the listening interface.
- Configure a security policy rule to allow traffic from the zone that contains the upstream interface to the internet.
- Configure a security policy rule to allow traffic from the DNS proxy zone to the internet.
- Configure a security policy rule using the authentication profile you configured in Step 5 to route traffic to the proxy as appropriate.