Configure Transparent Proxy
Focus
Focus

Configure Transparent Proxy

Table of Contents

Configure Transparent Proxy

Where Can I Use This?What Do I Need?
  • NGFW (Cloud Managed)
  • NGFW (PAN-OS or Panorama Managed)
  • Web proxy license
  • (For cloud-managed NGFW) AIOps for NGFW Premium license.
With transparent proxy, the client browser is not aware of the proxy. Transparent proxy supports inline mode deployment and does not support web cache communication protocol (WCCP). Transparent proxy is transparent to the user without requiring additional authentication.

PAN-OS

  1. (VM Series only) If you have not already done so, activate the license for web proxy.
    This step is required for the PA-1400, PA-3400, and VM Series. The following steps are for the VM series; for the PA-1400 and PA-3400, follow the steps to activate subscription licenses.
    1. Log in to the Customer Service Portal (CSP).
    2. Edit the deployment profile.
    3. Select Web Proxy (Promotional Offer).
    4. Click Update Deployment Profile.
    5. On the firewall, retrieve the license keys from the server.
      If the license key retrieval is not successful, restart the firewall and repeat this step before proceeding.
  2. Set up zones and interfaces.
    As a best practice, use Layer 3 (L3) for all interfaces and configure a separate zone for each interface within the same virtual routers and the same virtual systems.
    1. Configure an interface for the client.
    2. Configure an interface for the outgoing traffic to the internet.
    3. Configure a loopback interface for the proxy.
      All incoming traffic is routed through this interface to the proxy. Be sure to carefully copy the IP address for this interface and save it in a secure location because you must enter it as the Proxy IP address when you configure the web proxy.
  3. Set up the DNS proxy for Transparent Proxy.
    1. Configure a DNS proxy object for the proxy connection.
    2. Configure a DNS Server profile with both primary and secondary DNS servers.
      You must configure both a primary and a secondary DNS server for web proxy.
    3. Specify the loopback interface for the proxy connection.
  4. To enable decryption for MITM detection, create a self-signed root CA certificate or import a certificate signed by your enterprise certificate authority (CA). For more information, refer to the best practices for administrative access.
  5. Set up the Transparent Proxy.
    1. On the firewall, select NetworkProxy then Edit the Proxy Enablement settings.
    2. Select Transparent Proxy as the Proxy Type then click OK to confirm the changes.
      If the only available option is None, verify that you have an active license for the web proxy feature.
    3. Edit the Transparent Proxy Configuration.
    4. Specify the Connect Timeout to define (in seconds) how long the proxy waits for a TCP response from the web server. If there is no response after the specified amount of time has elapsed, the proxy closes the connection.
    5. Select the Upstream Interface.
      The upstream interface must be a loopback interface that is not associated with any other subnets.
    6. Specify the IP address of the loopback interface as the Proxy IP.
      Enter the IP address of the interface you configured in an earlier step.
    7. Specify the DNS Proxy object you created in an earlier step.
      Specify the loopback interface as the Upstream Interface.
    8. Click OK to confirm the changes.
  6. Configure the destination network address translation (DNAT) policy.
    You must configure the DNAT policy rule exactly as described in the following steps for the firewall to successfully use the web proxy to route traffic. Be sure to configure the DNAT policy rule so that it precedes the source network address translation (SNAT) policy rule.
    1. Select PoliciesNAT and Add a NAT policy rule.
    2. Enter a unique Name and verify that Group Rules by Tag is None then select the NAT Type.
    3. Select Original Packet and Add a trusted zone as the Source Zone and the Destination Zone as the interface that contains the web proxy.
    4. Select Translated Packet and verify that Translation Type for Source Address Translation is None.
    5. Select Dynamic IP (with session distribution) as the Translation Type for the Destination Address Translation.
    6. Enter the IP address of the web proxy as the Translated Address.
      Enter the same IP address as the Proxy IP address specified in an earlier step.
    7. Enter 8080 as the Translated Port.
    8. Select a Session Distribution Method (for example, Round Robin).
      The session distribution method is not applicable for web proxy.
    9. Click OK and Commit the changes.
  7. Configure a security policy to allow and route the proxy traffic.
    1. Configure a source network address translation (SNAT) policy rule after the DNAT rule.
    2. Configure a decryption policy to decrypt traffic.
      Select the zone that contains the proxy interface as the source zone.
    3. (Optional but recommended) Select ObjectsDecryption Profile and select Block sessions on SNI mismatch with Server Certificate (SAN/CN) to automatically deny any sessions where the Server Name Indication (SNI) does not match the server certificate.
    4. Configure policy rules to allow access to the DNS proxy servers for both the client and the proxy.
    5. Configure a policy rule to allow traffic from the client to the proxy.
    6. Configure a policy rule to allow traffic from the proxy to the internet.
  8. If this is your initial transparent web proxy configuration, make a change in your proxy configuration (Network DNS Proxy) and in your interface configuration (Network Interfaces), then Commit your changes to ensure the transparent web proxy configuration is correctly populated on the firewall.

Strata Cloud Manager

  1. (VM Series only) If you have not already done so, activate the license for web proxy.
    This step is required for the PA-1400, PA-3400, and VM Series. The following steps are for the VM series; for the PA-1400 and PA-3400, follow the steps to activate subscription licenses.
    1. Log in to the Customer Service Portal (CSP).
    2. Edit the deployment profile.
    3. Select Web Proxy (Promotional Offer).
    4. Click Update Deployment Profile.
    5. On the firewall, retrieve the license keys from the server.
      If the license key retrieval is not successful, restart the firewall and repeat this step before proceeding.
  2. Set up the necessary interfaces and zones.
    Do not edit the proxy zone.
    As a best practice, use Layer 3 (L3) for all interfaces and configure a separate zone for each interface within the same virtual routers and the same virtual systems.
    1. Configure an interface for the client.
    2. Configure an interface for the outgoing traffic to the internet.
  3. Set up the Transparent Proxy.
    1. In Strata Cloud Manager, select ManageConfigurationNGFW and Prisma AccessDevice SettingsConfiguration Scope.
    2. Select the folder, snippet, or device for which you want to configure Transparent Proxy.
    3. Select Device SettingsProxyProxy Settings
      Customize
      .
    4. Select Transparent Proxy as the Mode.
    5. Specify the Client Facing Interface.
      This is the interface for client traffic that you configured in an earlier step.
    6. Specify an Outbound Zone for outgoing traffic to the internet.
      You can Create New if you don't already have an outbound zone configured.
    7. Specify the IP addresses for the primary and secondary DNS servers that you want to connect to and the interface for the DNS proxy connection.
      After you push your configuration, Strata Cloud Manager will automatically create a DNS Proxy Object with these specifications on your devices. You can view the object on the devices themselves but not in Strata Cloud Manager.
    8. (Optional) Specify the Connect Timeout to define (in seconds) how long the proxy waits for a response from the web server. If there is no response after the specified amount of time has elapsed, the proxy closes the connection. The default is 5 seconds.
    9. (Optional) Specify the Web Traffic Service Port if you'd like web traffic to use special ports. The default ports are 80 and 443.
    10. (Optional) Use the default loopback interface (loopback.999) or enter a different one.
      The loopback interface must follow the format loopback.x, with x being any integer value.
      After you push your configuration, Strata Cloud Manager will automatically create a loopback interface with these specifications on your devices. You can view the interface on the devices themselves but not in Strata Cloud Manager.
    11. (Optional) Choose Whether to nat outbound traffic and enter an Outbound Interface.
      This creates a source NAT rule. Select this if your network cannot directly reach the internet.
    12. Save.
  4. Configure Transparent Proxy Policy Rules.
    These are a set of rules that determine what traffic passes through the proxy. After you push your configuration, these rules create Destination NAT rules on your devices, which apply NAT to the traffic that passes through the loopback interface configured earlier.
    In Strata Cloud Manager, however, Transparent Proxy Policy rules are visible only in web proxy configuration, not under NAT elsewhere in the app.
    1. Select Add Rule.
    2. Name the rule.
    3. (Optional) Add tags to label your rule.
    4. Specify a source address or leave it as Any.
    5. Specify a destination address or leave it as Any.
      (Optional) Specify a destination interface.
    6. (Optional) Select a Service.
    7. Save.
  5. Push your configuration and verify on your firewalls.
    1. To verify, log in to the firewall and select NetworkProxy.
    2. You should see information corresponding to the transparent proxy that you just configured.