An explicit proxy is a specific type of web proxy configuration on PAN-OS firewalls. Unlike transparent proxies, explicit proxies require client devices (e.g., web browsers) to be explicitly configured to send their web traffic directly to the proxy server's IP address and port.
Because the client is aware of the proxy, this method can sometimes simplify troubleshooting specific connection issues. PAN-OS allows leveraging its security features within this explicit proxy deployment model.
This guide focuses on configuring the explicit proxy itself and its authentication methods. Options include:
You can also configure exemptions for specific devices or choose to exclude all traffic from authentication if needed (see separate documentation links in the original text).
Web proxy functionality requires license activation on PA-1400 Series, PA-3400 Series, and VM-Series firewalls.
Device > Licenses
). Restart if needed.
Configure necessary interfaces (Layer 3 recommended) and assign them to distinct zones within the same virtual router.
The explicit proxy often needs to perform DNS lookups.
Network > DNS Proxy
).
Device > Server Profiles > DNS
) with reliable Primary and Secondary DNS servers.
Reliable DNS resolution for the firewall is required.
If you plan to decrypt SSL/TLS traffic passing through the proxy (highly recommended for security), configure SSL Forward Proxy. This involves setting up a Forward Trust CA (self-signed or enterprise subordinate) and deploying its public certificate to clients.
(See Create a Self-Signed Root CA Certificate or relevant Enterprise CA documentation).
Complete the specific setup steps for your chosen authentication method (Kerberos SPN/keytab, SAML IdP integration, CIE setup) before configuring it in the explicit proxy settings.
If using Panorama to manage the web proxy firewall:
Network > Proxy
.
Edit
for
Proxy Enablement
.
OK
.
Verify the Web Proxy license is active if this option isn't available on applicable platforms.
Edit
for
Explicit Proxy Configuration
.
Kerberos Single Sign On
SAML/CAS
(Used for both SAML and Cloud Identity Engine)
OK
.
When configuring SAML or Cloud Identity Engine authentication, the firewall/Panorama automatically creates supporting rules and objects:
SWG-allow-vpc-dns-rule
,
SWG-block-unsolicited-dns-rule
,
SWG-allow-outbound-auth-domain-rule
.
SWG-DNS-Security-Profile
, URL Category
hybrid-swg-authdomain-bypass
.
These are automatically generated and generally do not require manual modification. They allow necessary DNS lookups and communication with Palo Alto Networks cloud services for the authentication process.
Refer to specific documentation for detailed steps on setting up the chosen authentication method:
Device > User Identification > User Identification Settings > Trusted Authentication Gateways
) if accepting X-Authenticated-User headers from a downstream proxy.
After setting up the proxy and authentication method, configure necessary policies:
Policies > Authentication
) Create rule(s) matching traffic destined for the proxy (based on ingress zone, potentially source/destination if needed) and set the Authentication Enforcement action to use the Authentication Profile configured for the proxy (Kerberos, SAML, or CIE). Place exemption rules above enforcement rules.
Commit all configuration changes to activate the explicit proxy setup.