Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

About the PAC Files Page

To access the PAC Files page, click Secure Edge>Service Administration>PAC Files.

Use the PAC Files page to download proxy auto configuration files, generate new proxy auto configuration files, clone the configuration files, and edit the cloned files.

Tasks You Can Perform

You can perform the following tasks from this page:

  • Edit, clone, or delete a proxy auto configuration file—See Edit, Clone, and Delete a Proxy Auto Configuration File.

  • Generate new default proxy auto configuration files with the latest Juniper-recommended configurations—

    1. Click Generate New PAC.

      An alert message asking you to confirm the new proxy auto configuration file generation is displayed.

    2. Click Yes.

      The new proxy auto configuration file is generated and listed on the PAC Files page.

    The new proxy auto configuration files you generate contain the latest configurations recommended by Juniper. These recommendations might be different from the configurations recommended in the past.

  • View the details of a proxy auto configuration file—Select the configuration file to view the details, and click More>Detail. The Details page opens.Fields on the PAC Files Page

    Table 1 describes the fields on this page.

  • Search for proxy auto configuration files using keywords—Click the search icon, enter the search term in the text box, and press Enter. The search results open on the same page.

Field Descriptions

Table 1 describes the fields on the PAC Files page.

Table 1: Fields on the PAC Files Page

Field

Description

Name

The name of the proxy auto configuration file.

Predefined/Custom

Indicates whether the proxy auto configuration file is automatically generated or edited.

URL

The URL of the proxy auto configuration file.

Description

The description of the proxy auto configuration file.

Created Time

The time when the proxy auto configuration file is created.

Table 2: Details Page Fields

Field

Description

Basic

Exclude by domain

The traffic to these domains bypasses Juniper Secure Edge.

If the client domain matches any of these domains, the proxy auto configuration file is not used.

Exclude by destination prefix

The traffic to these destination prefixes bypasses Juniper Secure Edge.

If the client IP address any of these IP prefixes, the proxy auto configuration file is not used.

Exclude by source prefix

The traffic to these source IP prefixes bypasses Juniper Secure Edge.

If the client IP address matches any of these IP prefixes, the proxy auto configuration file is not used.

On-premises servers

The servers designated as on-premises servers.

You can configure the FQDNs of maximum three servers as on-premises servers. If the FQDNs for any of these on-premises servers return a valid DNS response, the client is considered to be on premises and the proxy auto configuration file configuration is not utilized.

Advanced

Name

The name of the proxy auto configuration file.

Description

The description of the proxy auto configuration file.

URL

The location of the proxy auto configuration file.

XML Code

The XML-based code in the proxy auto configuration file.