Configure Transparent Proxy
With transparent proxy, the client browser is not aware of the proxy. Transparent
proxy supports inline mode deployment and does not support web cache communication
protocol (WCCP). Transparent proxy is transparent to the user without requiring
additional authentication.
- (VM Series only) If you have not already done so, activate the license for web proxy.This step is required for the PA-1400, PA-3400, and VM Series. The following steps are for the VM series; for the PA-1400 and PA-3400, follow the steps to activate subscription licenses.
- Log in to the Customer Service Portal (CSP).
- Editthe deployment profile.
- SelectWeb Proxy (Promotional Offer).
- ClickUpdate Deployment Profile.
- On the firewall, retrieve the license keys from the server.If the license key retrieval is not successful, restart the firewall and repeat this step before proceeding.
- Set up zones and interfaces.As a best practice, use Layer 3 (L3) for all interfaces and configure a separate zone for each interface within the same virtual routers and the same virtual systems.
- Configure an interface for the client.
- Configure an interface for the outgoing traffic to the internet.
- Configure a loopback interface for the proxy.All incoming traffic is routed through this interface to the proxy. Be sure to carefully copy the IP address for this interface and save it in a secure location because you must enter it as theProxy IPaddress when you configure the web proxy.
- Set up the DNS proxy for Transparent Proxy.
- Configure a DNS proxy object for the proxy connection.
- Configure a DNS Server profile with both primary and secondary DNS servers.You must configure both a primary and a secondary DNS server for web proxy.
- Specify the loopback interface for the proxy connection.
- To enable decryption for MITM detection, create a self-signed root CA certificate or import a certificate signed by your enterprise certificate authority (CA). For more information, refer to the best practices for administrative access.
- Set up the Transparent Proxy.
- On the firewall, selectthenNetworkProxyEdittheProxy Enablementsettings.
- SelectTransparent Proxyas theProxy Typethen clickOKto confirm the changes.If the only available option is None, verify that you have an active license for the web proxy feature.
- EdittheTransparent Proxy Configuration.
- Specify theConnect Timeoutto define (in seconds) how long the proxy waits for a TCP response from the web server. If there is no response after the specified amount of time has elapsed, the proxy closes the connection.
- Select theUpstream Interface.The upstream interface must be a loopback interface that is not associated with any other subnets.
- Specify the IP address of the loopback interface as theProxy IP.Enter the IP address of the interface you configured in Step 2.c.
- Specify theDNS Proxyobject you created in Step 3.a.Specify the loopback interface as theUpstream Interface.
- ClickOKto confirm the changes.
- Configure the destination network address translation (DNAT) policy.You must configure the DNAT policy rule exactly as described in the following steps for the firewall to successfully use the web proxy to route traffic. Be sure to configure the DNAT policy rule so that it precedes the source network address translation (SNAT) policy rule.
- Enter a uniqueNameand verify thatGroup Rules by TagisNonethen select theNAT Type.
- SelectOriginal PacketandAdda trusted zone as theSource Zoneand theDestination Zoneas the interface that contains the web proxy.
- SelectTranslated Packetand verify thatTranslation TypeforSource Address TranslationisNone.
- SelectDynamic IP (with session distribution)as theTranslation Typefor theDestination Address Translation.
- Enter the IP address of the web proxy as theTranslated Address.Enter the same IP address as the Proxy IP address specified in Step 2.c.
- Enter8080as theTranslated Port.
- Select aSession Distribution Method(for example,Round Robin).The session distribution method is not applicable for web proxy.
- ClickOKandCommitthe changes.
- Configure a security policy to allow and route the proxy traffic.
- Configure a source network address translation (SNAT) policy rule after the DNAT rule.
- Configure a decryption policy to decrypt traffic.Select the zone that contains the proxy interface as the source zone.
- (Optional but recommended) Selectand selectObjectsDecryption ProfileBlock sessions on SNI mismatch with Server Certificate (SAN/CN)to automatically deny any sessions where the Server Name Indication (SNI) does not match the server certificate.
- Configure policy rules to allow access to the DNS proxy servers for both the client and the proxy.
- Configure a policy rule to allow traffic from the client to the proxy.
- Configure a policy rule to allow traffic from the proxy to the internet.