With transparent proxy, the client browser is not aware of the proxy's existence. Traffic is intercepted and redirected to the proxy based on network configuration (specifically NAT policies on the firewall).
This mode supports inline firewall deployments but does not support WCCP (Web Cache Communication Protocol). Authentication is typically not performed directly by the transparent proxy itself in this mode, as the client isn't configured to interact with it for authentication.
While PAN-OS can achieve transparent interception and inspection, it differs from traditional dedicated transparent proxy appliances. The PAN-OS approach relies on policy-based interception (NAT, Security, Decryption) rather than a specific "proxy mode" setting for traffic flow itself, although specific proxy *features* are enabled under
Network > Proxy
.
For specific models like VM-Series, PA-1400, and PA-3400, the web proxy feature requires license activation.
Device > Licenses > Retrieve license keys from license server
). Restart if retrieval fails initially.
Configure the necessary interfaces. Best practice is to use Layer 3 interfaces, each in its own zone within the same virtual router.
ethernet1/1
in zone
Trust
).
ethernet1/2
in zone
Untrust
).
loopback.1
). Assign it an IP address (e.g.,
192.168.254.254/32
) and place it in its own zone (e.g.,
Proxy-Zone
) within the same virtual router as the client and internet interfaces.
This loopback IP is where client traffic will be redirected via NAT.
Note down this IP address.
Configure DNS Proxy to handle DNS requests intercepted by the proxy function.
Network > DNS Proxy
). Enable it on the interface facing the clients (e.g.,
ethernet1/1
).
Device > Server Profiles > DNS
) specifying Primary and Secondary DNS servers.
Ensure reliable DNS resolution is available for the firewall.
If you intend to decrypt HTTPS traffic intercepted by the transparent proxy (which is essential for full visibility), configure SSL Forward Proxy. This involves generating/importing a Forward Trust CA certificate and deploying it to clients. Refer to SSL Forward Proxy documentation for details.
(See Create a Self-Signed Root CA Certificate or use an Enterprise CA).
Network > Proxy
.
Edit
for
Proxy Enablement
.
OK
.
If 'Transparent Proxy' is not an option, verify the license activation (Step 1).
Edit
for
Transparent Proxy Configuration
.
loopback.1
).
OK
.
This rule redirects the client's original web request (port 80/443) to the proxy loopback interface.
Policies > NAT
and
Add
a NAT rule.
Trust
).
Untrust
).
service-http
and
service-https
(or a service group containing TCP/80, TCP/443).
None
(No SNAT in this rule).
Dynamic IP (with session distribution)
(or Static IP if preferred, DIPP generally suitable here).
192.168.254.254
).
8080
).
Round Robin
- not strictly applicable here but required field).
OK
.
Multiple rules are needed to allow the complete flow:
Objects > Decryption Profile > SSL Decryption > SSL Forward Proxy
), check
Block sessions on SNI mismatch with Server Certificate (SAN/CN)
for added security.
Commit the configuration. The documentation suggests making a minor change in DNS Proxy and Interface settings and committing again if this is the initial setup to ensure all settings populate correctly (this might be less necessary in modern versions but worth noting).
A Destination NAT (DNAT) rule is absolutely essential for a Palo Alto Networks firewall to function as a transparent proxy because of how client traffic is initially addressed and how the proxy service needs to intercept it.
Here's why:
www.example.com
on port 80 or 443) directly to the internet. The client has no knowledge of the firewall's internal proxy service or its dedicated IP address and port (e.g., the loopback IP 192.168.254.254
on port 8080
, as per the example).
Trust
) and destined for the internet zone (e.g., Untrust
).8080
).In summary, the DNAT rule is the critical component that makes the "transparent" interception possible. It hijacks the client's original web-bound connection and steers it towards the firewall's internal proxy service without the client needing to be aware or reconfigured. Without DNAT, the proxy service would never receive the traffic it's supposed to inspect.
Imagine you want to send a letter (your internet request) to a friend in another city (a website).
Why "Transparent"? Because you (your computer) never knew the address was changed. You still think you sent the letter directly to your friend. The DNAT and the proxy did their work invisibly in the background.
So, DNAT is needed to trick the internet traffic into going to the firewall's internal inspection engine (the proxy) instead of directly out to the internet, all without you having to change any settings on your computer.
Okay, here's the sequence diagram and explanation illustrating the flow of traffic and where decryption happens in a Palo Alto Networks transparent proxy setup with SSL Forward Proxy enabled.
This diagram shows how the Palo Alto Networks Firewall (FW) intercepts and decrypts HTTPS traffic between a Client PC and a Web Server.
example.com
on port 443. It sends a "Client Hello" message.example.com
. It sends its "Forward Trust Certificate" to the Client PC.example.com
Web Server.example.com
.The firewall effectively performs a "man-in-the-middle" for SSL/TLS traffic, but it's a legitimate interception for security inspection purposes within an organization. This requires the client devices to trust the CA certificate that the firewall uses for impersonation (the Forward Trust CA).
For the PCNSE exam, understand: