Summary
In this chapter, you learned about the explicit proxy as an alternative means to connect mobile users and remote networks to the internet using a PAC file to control how traffic flows, as opposed to IPSec tunnels. This knowledge can be helpful in migrating a legacy network that relies on a proxy configuration into a SASE deployment.
In the next chapter, we’ll take a look at how we can build security rules to control who is allowed to access which resources and how.