PAN-OS: Configure a Web Proxy

Introduction to Web Proxy on PAN-OS

PAN-OS firewalls provide built-in web proxy capabilities, allowing you to leverage proxy functionalities within the Next-Generation Firewall platform. This offers a unified interface for managing both security policy and web proxy features.

There are two main types of web proxy configurations:

This guide covers the configuration steps for setting up these proxy modes.

Prerequisites and Initial Setup

  1. License Activation (Specific Models):

    Web proxy functionality requires license activation on PA-1400 Series, PA-3400 Series, and VM-Series firewalls.

    • VM-Series Example: Log in to CSP, edit the deployment profile, select Web Proxy (Promotional Offer) or the appropriate license, and update.
    • [Image Placeholder: Screenshot of CSP Deployment Profile showing Web Proxy option. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image001.png]

    • On the firewall, retrieve license keys ( Device > Licenses > Retrieve license keys from license server ). Restart if needed.
    • PA-1400/PA-3400: Follow standard subscription license activation steps .
  2. Interfaces and Zones Setup:

    Configure necessary interfaces (Layer 3 recommended) and assign them to distinct zones within the same virtual router.

    • Client Interface: Interface facing clients (e.g., ethernet1/1 in zone Trust ).
    • Internet Interface: Interface facing the internet (e.g., ethernet1/2 in zone Untrust ).
    • Loopback Interface (Highly Recommended for Proxy Service): Configure a dedicated Loopback interface (e.g., loopback.1 ). Assign it an IP address (e.g., 192.168.254.254/32 ) and place it in its own zone (e.g., Proxy-Zone or similar) within the same virtual router. This loopback IP is often used as the target for NAT redirection (Transparent) or as a stable upstream interface (Explicit). Note its IP address.
  3. DNS Proxy Setup:

    The web proxy needs reliable DNS resolution.

    • Configure a DNS Proxy Object ( Network > DNS Proxy ) and enable it on the appropriate interface(s) (often client-facing).
    • Configure a DNS Server Profile ( Device > Server Profiles > DNS ) with reliable Primary and Secondary DNS servers.

    Ensure both Primary and Secondary DNS servers are configured for the profile used by the proxy.

  4. Certificate Setup (for Decryption):

    If decrypting HTTPS traffic (recommended for visibility and required for many features), configure SSL Forward Proxy. This requires a Forward Trust CA certificate setup and client deployment.

    (See Create a Self-Signed Root CA Certificate or relevant Enterprise CA documentation).

  5. Authentication Prerequisites (Explicit Proxy):

    If using authentication with Explicit Proxy, complete the setup for your chosen method (Kerberos SPN/Keytab, SAML IdP, CIE) before configuring the proxy.

Enabling Proxy Mode

  1. Navigate to Network > Proxy .
  2. Click Edit for Proxy Enablement .
  3. Select the desired Proxy Type :
    • Explicit Proxy
    • Transparent Proxy
  4. [Image Placeholder: Screenshot of Proxy Enablement settings showing Proxy Type dropdown. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image004.png / configuring%20transparent%20proxy_files/image002.png]

    If the only option is `None`, verify license activation on applicable platforms.

  5. Click OK .

Configuring Explicit Proxy Details

If you selected Explicit Proxy in the previous step:

  1. Click Edit for Explicit Proxy Configuration .
  2. [Image Placeholder: Screenshot of Explicit Proxy Configuration dialog. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image005.png]

  3. Specify the Connect Timeout (seconds).
  4. Select the Listening Interface (interface clients connect to, e.g., client-facing L3 interface).
  5. Select the Upstream Interface (interface proxy uses to send traffic onward, often the configured Loopback interface).
  6. Enter the IP address of the Listening Interface as the Proxy IP .
  7. Select the DNS Proxy object.
  8. (Optional) Check Check domain in CONNECT & SNI are the same .
  9. Select the Authentication service type ( Kerberos Single Sign On or SAML/CAS ) and configure the corresponding Authentication Profile . Refer to specific authentication method documentation for details.
  10. (Optional) Check Strip ALPN if using HTTPS decryption.
  11. Click OK .

Remember to configure Authentication Policy rules to enforce the chosen authentication method.

Configuring Transparent Proxy Details

If you selected Transparent Proxy in the Proxy Enablement step:

  1. Click Edit for Transparent Proxy Configuration .
  2. [Image Placeholder: Screenshot of Transparent Proxy Configuration dialog. Original src: configuring%20transparent%20proxy_files/image003.png]

  3. Specify the Connect Timeout (seconds).
  4. Select the Upstream Interface : This must be the dedicated Loopback interface configured earlier.
  5. Enter the IP address of the Loopback interface as the Proxy IP .
  6. Select the DNS Proxy object created earlier.
  7. Click OK .

Transparent Proxy relies critically on NAT and Security policies (configured separately) to redirect traffic to this proxy service running on the loopback interface.

Supporting Policies (Crucial for Functionality)

Required for Both Modes:

Required Specifically for Transparent Proxy:

DNS Security Integration (Optional)

If you have a DNS Security subscription, you can integrate Explicit Proxy (via Panorama Cloud Services configuration) to apply DNS Security policy actions (like sinkholing) to requests handled by the proxy.

[Image Placeholder: Screenshot of Panorama On-Prem Proxy settings for DNS Security. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image002.png]

[Image Placeholder: Screenshot of Block/Exempt settings within On-Prem Proxy config. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image003.png]

Final Steps

References