Explicit Proxy Best Practices
Focus
Focus
Prisma Access

Explicit Proxy Best Practices

Table of Contents

Explicit Proxy Best Practices

Use the recommended best practices when implementing a Prisma Access Explicit Proxy deployment.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • Prisma Access license
Use the recommended Best Practices when implementing your Explicit Proxy deployment for optimal performance and an ideal user experience:
  • General Explicit Proxy Deployment Best Practices:
    • Deploy Explicit Proxy in at least two regions for redundancy.
    • If all your users are behind a NAT device, and if Explicit Proxy sees the IP address of the NAT device as the source IP address, you should allocate one NAT IP address per 500 mobile users.
    • Use forwarding profiles to configure a PAC file.
  • PAC File Best Practices—When setting up the PAC file, bypass all SAML, CIE, and Authentication Cache Service (ACS) URLs.
  • SAML Authentication Best Practices:
  • Kerberos Authentication Best Practices—The keytab file should be less than 60 KB in size.
  • Security Policy Rule Best Practices—Use security policy rule best practices by setting the Action in policies to Deny instead of Drop or Reset. This actions helps in releasing the resources quickly inside the Explicit Proxy Security Processing Node (EP-SPN) for optimal performance.
  • Decryption Best Practices—Configure at least one decryption policy and one decryption certificate.
  • IP Source Address Best Practices—To restrict access to Explicit Proxy to specific source IP addresses, use special objects, which include Address Objects, Address Groups, and External Dynamic Lists (EDLs).