Chapter 2 Basic Connectivity
Chapter 2 Basic Connectivity
6. The Zscaler on the endpoint to create a tunnel to the Zero Trust Ex-
Client Connec- change for the protection of SaaS and internet-bound
tor is installed traffic.
where?
1 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
12.
2 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
Additional op- 1) Enforced PAC mode, which basically instruments the
tions that sup- PAC file in the browser, similar to what you'd get from a
port lega- group policy object. That means that the browser itself is
cy implementa- forced to go to Zscaler Internet Access via a specified
tions are: (2) proxy.
(Zscaler client
connector) 2) None, meaning that the policy is not going to do any
configuration of proxy or tunneling mode, and relies on the
group policy object or the default configuration within the
browser.
13. ZTunnel modes 1) The Legacy Z-Tunnel 1.0 2) The modern ZTunnel 2.0
come in two for-
mats:
15. With ZTunnel 1.0, A tunnel towards the Zero Trust Exchange for the authen-
there are essen- tication, enrollment and passing traffic
tially two tun-
nels: Another for the policy updates that would occur every 60
minutes against the Zscaler Client Connector Portal where
all those configuration changes are made.
16. ZTunnel 2.0 a DTLS (Datagram Transport Layer Security) tunnel with
fallback to TLS supporting all client traffic, which means
the Zscaler Firewall, as part of the Zero Trust Exchange,
3 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
could inspect and apply policy on all traffic.
17. With Z-Tunnel control channel and a single tunnel from the client to the
2.0, which is the Zero Trust Exchange.
best practice op-
tion, the tunnel is Any notifications from the Client Connector admin portal
the: (aka. "Mobile Admin") are passed through the Zero Trust
Exchange directly to the client, and those happen in real
time.
21. Tunnel Failure There are also connection timeout options and additional
options for redirecting traffic to a local listener ( tunnel with
local proxy, providing safe fallback within the client if the
tunnel mode connection is not successful.
24. DNS Search Do- The DNS search domain, provided by DHCP, where the
mains client will receive a DNS search domain.
25. DNS Server The DNS server looks at the primary network adapter
on the client and understands what DNS server is being
provided to it through DHCP.
27. Forwarding Pro- Finally, within the forwarding profile, we can select a trust-
file: Profile Ac- ed network criteria and then select from your predefined
tion for ZIA list of multiple trusted networks, confirming which ones are
going to apply to the forwarding profile.
28. Forwarding Pro- Within the system proxy settings, you can control how
file: System the browser, or more specifically the operating system,
Proxy Settings receives proxy settings.
31. Use Automat- Explicitly configure where the Zscaler Client Connector
ic Configuration sets your custom system PAC file to download and run
Script through that PAC file configuration for traffic to be explicitly
proxied to a proxy server.
32. Use Proxy Server This is a hard-coded proxy import (IP address and a port
for Your LAN or an FQDN and a port) with the ability to bypass local
addresses.
33. Execute GPO Up- The Windows machine will provide a GPO (Group Policy
date Object) update/force from Active Directory to set the proxy
settings on the machine.
34. It's really impor- With a tunnel mode configuration, we do not want to set
tant to under- any forwarding PAC file and have the client intercept the
stand the distinc- traffic natively as the browser or the client configuration
tion between a resolves an internet address and intercepts the traffic as
forwarding PAC it routes toward the internet and tunnels it toward the Zero
and how the Trust Exchange through the DTLS tunnels.
forwarding PAC
is implemented
within Zscaler
Client Connec-
tor:
35. Application Pro- An application profile exists to map the forwarding profiles
file to different users and different devices based on certain
6 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
criteria.
The app profile PAC URL defines the Zero Trust Exchange
node to be used based on the client's geographic IP
information.
37. Custom PAC URL References the PAC file configured in the ZIA Admin Por-
tal, making decisions on traffic that should be forwarded
or bypassed from the Zero Trust Exchange.
38. Override WPAD Ensures that the system GPO WPAD configuration is pre-
vented, and makes sure that the WPAD configuration in
the forwarding profile is used as a precedence
40. Install Zscaler If you aren't pushing out your own certificates from your
SSL Certificate own Certificate Authority, then simply enabling this option
will use the one provided by Zscaler.
41. Tunnel Internal Ensures that the health updates and policy traffic passes
Client Connector through the Zscaler tunnels towards the Zero Trust Ex-
Traffic change.
42. Cache System Ensures that Zscaler Client Connector stores the sys-
Proxy tem proxy state from before it was installed or enabled,
and makes sure that when Zscaler Client Connector is
uninstalled or disabled, a system proxy configuration is
reverted and the user can continue to function as before.
8 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
45. application by- There are some specific application bypasses for things
pass like UCaaS. If we want to bypass Microsoft Teams or
Zoom traffic from going into the tunnel, we can do that by
selecting them under the application bypass
46. Forwarding Pro- Steers traffic toward or away from the Client Connector
file PAC
Controls System PAC file - which HTTP Proxy to be used
for a URL, tunnel with local proxy or other explicit proxy.
47. App Profile PAC Steers traffic toward or away from the Zscaler Cloud
48. How A Forward- Gets defined within the forwarding profile and it steers
ing Profile PAC traffic toward or away from Zscaler Client Connector. It's
works: essentially the system PAC file, stating which HTTP proxy
is going to be used for a specific URL.
If it's the PAC file for a Tunnel with Local Proxy, it's going
to point traffic at the loopback address or another explicit
proxy. It has no bearing on where Zscaler Client Connector
will route traffic, only where the user's applications will
send traffic.
9 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
And that proxy server could be Zscaler, or that proxy
server could be the local proxy that's enabled in Zscaler
Client Connector
49. How Applica- The Application Profile PAC steers traffic towards or away
tion Profile PAC from the Zscaler cloud - after traffic has been intercepted
works: by the tunnel mode or after traffic has been directed to it
with the local proxy.
50. Within the Zs- the PAC files that are hosted on the cloud
caler Internet Ac-
cess (ZIA) Admin
Portal, we can de-
fine:
51. PAC files PAC files are essentially JavaScript functions that take two
inputs that are dynamically provided to it by the browser, or
in the case ofthe App Profile PAC, through the inspection
process.
52. Forwarding PAC Forwarding PAC is processed by the web browser or the
vs. Application system proxy
Profile PAC
the Application Profile PAC is for Zscaler Client Connector
to make its traffic routing decisions.
53. ZIA: Browser Be- can be pushed out through group policy objects and iden-
havior - PAC to tified from your existing PAC file, migrated into the brows-
10 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
Tunnel Mode and er configuration, and pushed out before the migration to
site authentica- Zscaler occurs.
tion
54. Inclusions vs. Ex- The bottom line is that there are going to be exclusions
clusions (Tunnel and inclusions
Mode - Packet Fil-
ter Based - ZTun- Anything that's included will be sent through to Zscaler
nel 2.0) Client Connector, or Zscaler Client Connector will physi-
cally intercept traffic.
55. Tunnel Mode With Z-Tunnel 1.0, it's important to understand that traffic
- Packet Filter at a network layer will only intercept traffic that's 80 or 443.
Based - ZTunnel
1.0 So if you've got, again, the application generating packets,
if it's port 80 or 443, it'll be intercepted and passed to
Zscaler Client Connector.
56. Tunnel Mode In the route-based mode, again, there is a routed adapter.
- Route-Based
Flow There's an additional network adapter that's configured on
the machine.
57.
11 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
ZIA Enrollment 1) As the Zscaler Client Connector launches, it's going to
Process (5 steps) talk to the mobile admin portal (Zscaler Client Connector
Portal) and understand what domain the user is in and
what SAML identity provider the user should authenticate
against.
2) The user receives that IdP redirect and they are redi-
rected to their SAML IdP
12 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
4) Zscaler Client Connector provides that response token
and registers the device into Zscaler Client Connector
Portal, which passes that registration through to Zscaler
Private Access, and Zscaler Private Access enrollment
then enables the Zscaler Client Connector certificates to
be generated and Zscaler Client Connector is enrolled in
Zscaler Private Access.
- Every hour
- Every 15 minutes
- Manually
60. Device Posture Device Posture enables a level of trust of the device as
(Client connec- part of the Zero Trust Network Access policy.
tor)
- endpoint protection
13 / 15
Chapter 2: Basic Connectivity (20%)
Study online at https://quizlet.com/_epvp51
63. Fundamentals of Always deploy App Connectors as a pair (minimum) and
App connectors as a different Connector Group in separate data centers.
Ensure app connectors:
Ï Can route to the internet and internal applications.
Ï Meet the minimum VM requirements.
Ï Can connect to applications (TCP/UDP) for health check-
ing.
Ï Source IPs are registered in Active Directory Sites &
Services, as
the requests will be seen as coming from the App Connec-
tors.
64. Deploy app con- Create a provisioning key for each Connector GroupPro-
nectors visioning keys are signed by an intermediate certificate
authority and the intermediate trusted by the root CA.
Clients are enrolled against a client intermediate certifi-
cate authority. Revoking/deleting the intermediates breaks
the trust, invalidating the provisioning keys.
Treat provisioning keys as credentials (don't share in clear-
text = download from the UI and upload via SCP or
copy/paste over SSH or use the API to retrieve or generate
dynamically).
70. How Browser Ac- 1) User types in the URL of internal web application or the
cess Works (4 User Portal and is redirected to appropriate IDP for user
steps) authentication.
15 / 15