Cloud Management
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
-
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
Strata Cloud Manager
Strata Cloud Manager
Explicit Web Proxy for
Strata Cloud Manager
is supported
only with the legacy router stack. If you'd like this enabled, please reach out to
your account team.You can configure an explicit web proxy on cloud-managed firewalls using
Strata Cloud Manager
.- (VM Series only) If you have not already done so, activate the license for web proxy.You must activate the web proxy license for the PA-1400 Series, PA-3400 Series, and VM-Series. Learn how to activate your subscription licenses for the PA-1400 Series and PA-3400 Series or activate the web proxy license for the VM-Series in the following step.
- Log in to the Customer Service Portal (CSP).
- Editthe deployment profile.
- SelectWeb Proxy (Promotional Offer).
- ClickUpdate Deployment Profile.
- On the firewall, retrieve the license keys from the server.If the license key retrieval is not successful, restart the firewall and repeat this step before proceeding.
- Set up the necessary interfaces and zones.As a best practice, use Layer 3 (L3) for the three interfaces the web proxy uses and configure a separate zone for each interface within the same virtual routers and the same virtual systems.
- Configure an interface for the client traffic.Be sure to carefully copy the IP address for this interface and save it in a secure location because you must enter it as theProxy IPaddress when you configure the web proxy.
- Configure an interface for the outgoing traffic to the internet.
- (Optional) Configure a loopback interface for the proxy.Strata Cloud Managerautomatically creates a loopback interface. Only configure one if you would like to use a different loopback interface.All incoming traffic is routed through this interface to the proxy.
- To enable decryption for MITM detection, create a self-signed root CA certificate or import a certificate signed by your enterprise certificate authority (CA). For more information, refer to the best practices for administrative access.
- Ensure you have completed the pre-deployment steps for the authentication method you want to configure.
- If you are using SAML, you must have configured Explicit Proxy for Mobile Users.
- If you are using Kerberos, you must have completed pre-deployment requirements for Kerberos.
- If you have a DNS security subscription, integrate the web proxy firewall with Explicit Proxy to sinkhole any requests that match the DNS security categories that you specify.
- InStrata Cloud Manager, select.ManageConfigurationNGFW and Prisma AccessDevice SettingsProxyBlock DomainsCustomize
- (Optional)AddBlock Domain Categories,Block Domain Lists, or any domains that areException Domainsbecause they are sinkholed due to matching one or more of the DNS Security categories.
- (Optional)Select whether you want toLog blocked domain requests.
- Saveyour selections.
- Set up the Explicit Proxy.
- InStrata Cloud Manager, select.ManageConfigurationNGFW and Prisma AccessDevice SettingsConfiguration Scope
- Select the folder or snippet for which you want to configure Explicit Proxy.
- Select.Device SettingsProxyProxy SettingsCustomize
- SelectExplicit Proxyas theMode.
- Select theAuthentication Methodyou want to use (eitherKerberos Single Sign OnorSAML/CAS).Be sure to complete all necessary pre-deployment and configuration steps for the authentication method you select.
- If you selectedKerberos Single Sign On, specify theAuthentication Profilethat you created when configuring Kerberos.
- Specify theClient Facing Interface.This is the interface for client traffic that you configured in an earlier step.
- Specify anOutbound Zonefor outgoing traffic to the internet.You canCreate Newif you don't already have an outbound zone configured.
- Specify the IP addresses for the primary and secondary DNS servers that you want to connect to.
- Specify the interface for the DNS proxy connection.
- (Optional) Specify theConnect Timeoutto define (in seconds) how long the proxy waits for a response from the web server. If there is no response after the specified amount of time has elapsed, the proxy closes the connection. The default is 5 seconds.
- (Optional) Specify theWeb Traffic Service Portif you'd like web traffic to use special ports. The default ports are 80 and 443.
- (Optional) Specify the loopback interface for the proxy that you configured in an earlier step.
- (Optional) In case of legitimate business need, deselectReset if SNI does not match HTTP CONNECT.It's recommended to leave this enabled to prevent domain fronting attacks by specifying different domains between the CONNECT request and the Server Name Indication (SNI) field in the HTTP header.
- SelectSaveto confirm the changes.
- If it applies to your deployment, create a Source NAT policy rule.
- Customize web access policies for any exceptions to the default policies you may need.
- If this is your initial explicit web proxy configuration, make a change to your proxy auto-configuration (PAC) file.
- SelectManageConfigurationNGFW and Prisma AccessDevice SettingsProxyProxy Auto Configuration
- Follow the PAC file guidelines to make the necessary changes to the PAC file.
- When you're finished making changes,Savethe file.
The PAC file applies to all firewalls associated with yourStrata Cloud Managertenant. If you need different PAC files for different firewalls, you'll have to manually upload a different PAC file to those firewalls.