PAN-OS: Configure Exemptions for Explicit Web Proxy Authentication

Use Case for Exemptions

When using PAN-OS as an Explicit Web Proxy , you typically configure authentication (e.g., using Kerberos or SAML) to identify users connecting through the proxy. However, certain devices on the network, such as printers, IoT devices, or servers initiating outbound web requests, cannot respond to interactive authentication prompts or handle client certificates/PAC files.

To ensure these essential devices can still function correctly when their traffic is directed through the explicit proxy, you need to configure Authentication Exemptions . These exemptions allow traffic matching specific criteria (source IP, destination URL) to bypass the authentication requirement enforced by the proxy.

You can create up to 20 web proxy authentication exemptions within your Authentication Policy.

Alternatively, if you do not require *any* authentication for your explicit proxy traffic, you can Exclude All Explicit Proxy Traffic From Authentication globally (not covered here).

Configuration Steps for Exemptions

  1. Prerequisites:

  2. Define Exemption Criteria Objects:

    Create objects representing the traffic you want to exempt. You can exempt based on source, destination, or both:

    • Source Exemption: Create an Address Object or Address Group ( Objects > Addresses / Objects > Address Groups ) containing the source IP addresses of the trusted devices (printers, servers, IoT devices) that should bypass authentication.
    • Destination Exemption: Create a Custom URL Category ( Objects > Custom Objects > URL Category ) containing the destination domains or specific URLs these devices need to access without authentication (e.g., update servers, specific internal web services accessed via proxy). Review guidelines for URL category exceptions .
  3. Enable Authentication Portal (Required):

    Even though you are creating bypass rules, the Authentication Portal feature must be generally enabled for Authentication Policy rules to be processed. Configure it under Device > Setup > Management > Authentication Settings > Authentication Portal (refer to Configure Captive Portal/Authentication Portal documentation if needed, though the portal itself might not be actively used if all traffic is exempt or uses other auth methods).

  4. Configure Authentication Policy Rule for Exemption:

    • Navigate to Policies > Authentication .
    • Click Add or edit an existing rule that applies to your explicit proxy traffic. Place this exemption rule ABOVE your standard authentication enforcement rule(s) for the proxy.
    • Source Tab: If exempting by source, select the Address Object/Group created in Step 2 for the Source Address . Otherwise, leave as needed.
    • Destination Tab: If exempting by destination, select the Custom URL Category created in Step 2 for the URL Category . Otherwise, leave as needed.
    • Service/URL Category Tab: Ensure Service matches your explicit proxy service (likely HTTP/HTTPS or Any if proxy handles various protocols).
    • Action Tab (CRITICAL):
      • Check the box: Bypass Web Proxy Authentication .
      • Note: When this box is checked, the Authentication Enforcement field automatically becomes `None` and cannot be changed for this rule.
    Authentication Policy Rule Actions Tab showing 'Bypass Web Proxy Authentication' checkbox Authentication Policy Rule Actions Tab showing Authentication Enforcement set to None when Bypass is checked
  5. Commit and Verify:

    • Commit your changes.
    • Verify Policy View: Go to Policies > Authentication and confirm a checkmark appears in the Bypass Web Proxy Authentication column for your exemption rule.
    • Authentication Policy list view showing checkmark in Bypass column
    • Verify via CLI (Optional): Use counter commands depending on the primary authentication method being bypassed:
      • For SAML bypass: show counter global name ctd_eproxy_skip_auth_url_match
      • For Kerberos bypass: show counter global name flow_swg_ep_kerberos_skip_auth
      • These commands show hit counts for traffic matching exemption rules.
    • Test Functionality: Ensure devices matching the exemption criteria can access required resources via the proxy without authentication prompts, while other devices are still prompted for authentication as expected.

PCNSE Exam Focus

For the PCNSE exam, concerning Explicit Proxy Authentication Exemptions:

References