A Transparent Proxy intercepts network traffic destined for specific services (most commonly web traffic on ports 80/443) without requiring any explicit configuration on the end-user's client device . From the client's perspective, it appears to be connecting directly to the destination server, but the proxy sits in the middle, examining and potentially modifying the traffic.
This contrasts with an Explicit Proxy , where clients (e.g., browsers) must be manually configured with the proxy server's IP address and port number to direct traffic through it.
While PAN-OS doesn't have a single feature named "Transparent Proxy," it achieves the *effect* and *benefits* of transparent web proxying through the integration of its core Security Policy, App-ID, URL Filtering, Threat Prevention, and SSL Decryption features.
Instead of a dedicated proxy object, PAN-OS uses its standard policy engine to transparently intercept and inspect web traffic:
service-http
or
service-https
) intercepts the session. The rule's action must be `Allow` for inspection to occur.
In both HTTP and decrypted HTTPS scenarios, the firewall acts transparently – the client initiated the connection to the original destination, and the firewall intercepted and inspected it based on policy without requiring client-side proxy settings.
graph LR Client[Internal Client] -- HTTP/S Request --> FW(Firewall); subgraph Firewall SecPol{Security Policy\nMatches Dst Port 80/443,\nAction=Allow}; DecPol{Decryption Policy\nMatches HTTPS,\nAction=Decrypt?}; Profiles{Security Profiles\nURL Filt, Threat Prev,\nFile Block, etc.}; Traffic((Traffic)) --> SecPol; SecPol -- If HTTPS --> DecPol; DecPol -- If Decrypt=Yes --> DecryptedTraffic((Decrypted Traffic)); DecPol -- If Decrypt=No --> EncryptedTraffic((Encrypted Traffic)); SecPol -- If HTTP --> CleartextHTTP((Cleartext HTTP)); DecryptedTraffic --> Profiles; CleartextHTTP --> Profiles; Profiles -- Enforce Actions --> FinalTraffic((Final Traffic)); end FW -- Forwards --> Internet[Internet Server]; linkStyle 0 stroke:#007bff,stroke-width:1px; linkStyle 1 stroke:#dc3545,stroke-width:1px,color:red; linkStyle 2 stroke:#fd7e14,stroke-width:1px,color:orange; linkStyle 3 stroke:#fd7e14,stroke-width:1px,color:orange; linkStyle 4 stroke:#17a2b8,stroke-width:1px,color:teal; linkStyle 5 stroke:#17a2b8,stroke-width:1px,color:teal; linkStyle 6 stroke:#28a745,stroke-width:1px,color:green; linkStyle 7 stroke:#007bff,stroke-width:1px;Simplified Flow for Transparent Web Inspection.
Achieving transparent web proxy functionality involves configuring these standard components:
service-http
(TCP/80).
Allow
.
service-https
(TCP/443).
ssl
(as the app isn't known pre-decryption).
Allow
.
Decrypt
and Type
SSL Forward Proxy
.
facebook
,
google-drive
). You might have *additional* Security rules matching these specific App-IDs (placed *after* the initial `ssl` allow rule) if you need different Security Profiles or actions for specific decrypted applications.
For the PCNSE exam, understand:
1. How does a PAN-OS firewall achieve the functionality of a transparent web proxy for HTTP traffic (port 80)?
2. What is absolutely required for a PAN-OS firewall to inspect the content (URLs, files, threats) within outbound HTTPS traffic transparently?
3. Which component is responsible for performing URL category lookups on web traffic intercepted transparently by the firewall?
4. What is the main difference between how PAN-OS handles transparent web proxying versus how an explicit web proxy works?
5. When configuring a Security Policy rule to allow initial HTTPS traffic (before decryption), which Application ID is most commonly used?
6. What critical component must be deployed to client devices to avoid certificate errors when the firewall transparently decrypts HTTPS traffic using SSL Forward Proxy?
7. Does the PAN-OS firewall, when acting as a transparent web proxy, typically perform web caching?
8. What is the primary security benefit of inspecting HTTPS traffic transparently via SSL Forward Proxy?
9. If a web application uses a non-standard port (e.g., TCP/8443) for HTTPS, how would the firewall typically be configured to transparently inspect it?
10. What is a major consideration when deciding how much HTTPS traffic to decrypt using SSL Forward Proxy?