PAN-OS firewalls provide built-in web proxy capabilities, allowing you to leverage proxy functionalities within the Next-Generation Firewall platform. This offers a unified interface for managing both security policy and web proxy features.
There are two main types of web proxy configurations:
This guide covers the configuration steps for setting up these proxy modes.
Web proxy functionality requires license activation on PA-1400 Series, PA-3400 Series, and VM-Series firewalls.
[Image Placeholder: Screenshot of CSP Deployment Profile showing Web Proxy option. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image001.png]
Device > Licenses > Retrieve license keys from license server
). Restart if needed.
Configure necessary interfaces (Layer 3 recommended) and assign them to distinct zones within the same virtual router.
ethernet1/1
in zone
Trust
).
ethernet1/2
in zone
Untrust
).
loopback.1
). Assign it an IP address (e.g.,
192.168.254.254/32
) and place it in its own zone (e.g.,
Proxy-Zone
or similar) within the same virtual router.
This loopback IP is often used as the target for NAT redirection (Transparent) or as a stable upstream interface (Explicit). Note its IP address.
The web proxy needs reliable DNS resolution.
Network > DNS Proxy
) and enable it on the appropriate interface(s) (often client-facing).
Device > Server Profiles > DNS
) with reliable Primary and Secondary DNS servers.
Ensure both Primary and Secondary DNS servers are configured for the profile used by the proxy.
If decrypting HTTPS traffic (recommended for visibility and required for many features), configure SSL Forward Proxy. This requires a Forward Trust CA certificate setup and client deployment.
(See Create a Self-Signed Root CA Certificate or relevant Enterprise CA documentation).
If using authentication with Explicit Proxy, complete the setup for your chosen method (Kerberos SPN/Keytab, SAML IdP, CIE) before configuring the proxy.
Network > Proxy
.
Edit
for
Proxy Enablement
.
Explicit Proxy
Transparent Proxy
[Image Placeholder: Screenshot of Proxy Enablement settings showing Proxy Type dropdown. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image004.png / configuring%20transparent%20proxy_files/image002.png]
If the only option is `None`, verify license activation on applicable platforms.
OK
.
If you selected
Explicit Proxy
in the previous step:
Edit
for
Explicit Proxy Configuration
.
[Image Placeholder: Screenshot of Explicit Proxy Configuration dialog. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image005.png]
Kerberos Single Sign On
or
SAML/CAS
) and configure the corresponding
Authentication Profile
. Refer to specific authentication method documentation for details.
OK
.
Remember to configure Authentication Policy rules to enforce the chosen authentication method.
If you selected
Transparent Proxy
in the Proxy Enablement step:
Edit
for
Transparent Proxy Configuration
.
[Image Placeholder: Screenshot of Transparent Proxy Configuration dialog. Original src: configuring%20transparent%20proxy_files/image003.png]
OK
.
Transparent Proxy relies critically on NAT and Security policies (configured separately) to redirect traffic to this proxy service running on the loopback interface.
If you have a DNS Security subscription, you can integrate Explicit Proxy (via Panorama Cloud Services configuration) to apply DNS Security policy actions (like sinkholing) to requests handled by the proxy.
Panorama > Cloud Services > Configuration > On-Prem Proxy
.
[Image Placeholder: Screenshot of Panorama On-Prem Proxy settings for DNS Security. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image002.png]
[Image Placeholder: Screenshot of Block/Exempt settings within On-Prem Proxy config. Original src: An%20explicit%20proxy%20is%20one%20of%20the%20types%20of_files/image003.png]