<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PA with third party proxy scenario in Integration Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/integration-discussions/pa-with-third-party-proxy-scenario/m-p/247331#M9</link>
    <description>&lt;P&gt;i am looking for PA with proxy scenario deplyment as best practice and use caching of proxy with PA features.&lt;/P&gt;</description>
    <pubDate>Thu, 24 Jan 2019 11:58:27 GMT</pubDate>
    <dc:creator>AymanShimy</dc:creator>
    <dc:date>2019-01-24T11:58:27Z</dc:date>
    <item>
      <title>PA with third party proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/pa-with-third-party-proxy-scenario/m-p/247331#M9</link>
      <description>&lt;P&gt;i am looking for PA with proxy scenario deplyment as best practice and use caching of proxy with PA features.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 11:58:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/pa-with-third-party-proxy-scenario/m-p/247331#M9</guid>
      <dc:creator>AymanShimy</dc:creator>
      <dc:date>2019-01-24T11:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: PA with third party proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/pa-with-third-party-proxy-scenario/m-p/253392#M12</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you provide a little bit more context around what you are trying to accomplish?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you interested in caching responses to HTTP requests from internal users? Or are you looking to deploy a caching solution in front of a web server sitting behind a Palo Alto firewall?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-JeffH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jeff Hochberg | Sr. Systems Engineer - Technical Business Development&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Palo Alto Networks&amp;nbsp;|&amp;nbsp;Atlanta, GA&amp;nbsp;|&amp;nbsp;&amp;nbsp;USA&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Mobile:&lt;/STRONG&gt;&amp;nbsp;404.432.1112&amp;nbsp;|&amp;nbsp;&lt;U&gt;www.&lt;/U&gt;&lt;U&gt;&lt;A href="https://www.paloaltonetworks.com/" target="_blank"&gt;paloaltonetworks.com&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;The content of this message is the proprietary and confidential property of Palo Alto Networks and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by reply e-mail. Any unauthorized use or distribution of the content of this message is prohibited.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 20:14:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/pa-with-third-party-proxy-scenario/m-p/253392#M12</guid>
      <dc:creator>jhochberg</dc:creator>
      <dc:date>2019-03-12T20:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: PA with third party proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/pa-with-third-party-proxy-scenario/m-p/253417#M15</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am looking for two scenarios&amp;nbsp;&lt;/P&gt;&lt;P&gt;1- proxy located in LAN (inside network) for caching and url filtering and integarted with an active directory then PA for remaining security.&lt;/P&gt;&lt;P&gt;2- Proxy located behind the PA FW.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 21:33:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/pa-with-third-party-proxy-scenario/m-p/253417#M15</guid>
      <dc:creator>AymanShimy</dc:creator>
      <dc:date>2019-03-12T21:33:36Z</dc:date>
    </item>
    <item>
      <title>Re: PA with third party proxy scenario</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/pa-with-third-party-proxy-scenario/m-p/253525#M20</link>
      <description>&lt;P&gt;Ayman,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the additional context.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Candidly, it's difficult to recommend any "best practices" here because of what's lost by deploying a proxy between the users and the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Out of curiosity, why would you not leverage the URL-Filtering and User-ID capabilities present in the firewall? In doing so, you are able to leverage Active Directory authentication and authorization for per-rule enforcement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would greatly simplify your environment and have a lot more visibility from one location if you collapsed these functions into the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not to mention, if you're looking to take advantage of the inspection capabilities within PAN-OS, by deploying a proxy behind the firewall, you lose the ability to leverage SSL-Decryption. Given the vast majority of HTTP traffic is SSL encrypted, all of that traffic would pass through the firewall and not be inspected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And, unless the proxy supports WCCP (or similar), the firewall logs would show all outbound access coming from the egress IP address on the proxy server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only advantage I see in deploying a proxy is in taking advantage of caching for increased performance - I don' t know that the performance gain is worth the sacrifices made to the overall security posture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jeff Hochberg | Sr. Systems Engineer - Technical Business Development&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Palo Alto Networks&amp;nbsp;|&amp;nbsp;Atlanta, GA&amp;nbsp;|&amp;nbsp;&amp;nbsp;USA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;The content of this message is the proprietary and confidential property of Palo Alto Networks and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by reply e-mail. Any unauthorized use or distribution of the content of this message is prohibited.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 23:20:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/pa-with-third-party-proxy-scenario/m-p/253525#M20</guid>
      <dc:creator>jhochberg</dc:creator>
      <dc:date>2019-03-12T23:20:26Z</dc:date>
    </item>
  </channel>
</rss>

