Reader small image

You're reading from  Zscaler Cloud Security Essentials

Product typeBook
Published inJun 2021
PublisherPackt
ISBN-139781800567986
Edition1st Edition
Right arrow
Author (1)
Ravi Devarasetty
Ravi Devarasetty
author image
Ravi Devarasetty

Ravi Devarasetty is originally from India and came to the United States for his higher education. He started his IT career in embedded software development, moved into 24x7 network operations, later transitioned into secure web gateways, and now works in public cloud security. He likes constant learning, both through self-study and via mentoring relationships. He likes to tinker with technology and loves it when he is able to put the things he has learned toward creating a unique solution. He has experience working as a Zscaler solution deployment engineer as part of a Managed Security Service Provider (MSSP) and as a Zscaler consultant. He holds multiple Zscaler certifications, and is also certified in CISSP, CCSK, AlienVault, AWS, and Microsoft Azure.
Read more about Ravi Devarasetty

Right arrow

Chapter 9: Using ZPA to Provide Secure Application Access

In this chapter, we will continue our journey into the ZPA Admin Portal configuration. Specifically, we will learn about the best practices when it comes to deployments within an enterprise, and the steps involved in deploying the App Connectors in both on-premises environments and cloud accounts.

These topics will further solidify the understanding you'll need to deploy a ZPA solution within an enterprise as an administrator. In this chapter, we are going to cover the following topics:

  • Deploying App Connectors
  • Configuring ZPA applications
  • Exploring the best practices for enterprise deployments

Deploying App Connectors

Now that we've reviewed how to install and configure the ZCC app for the originating enterprise end users, let's learn how to deploy the App Connectors for the enterprise's private applications.

Connector requirements

App Connectors are the only elements of ZPA that connect to the enterprise's internal network, near the private applications that need sharing. A connector is a lightweight Linux-based implementation that boots up extremely quickly and provides access to applications. Connectors only establish outbound connections to the ZPA infrastructure using a provisioning key.

Upon bootup, the connector is configured to contact the nearest healthy ZPA PSE. A control channel is then established that enables us to register and configure the connector. This also allows the connector to inform the ZPA Central Authority (CA) of the applications that have been discovered. Although not a requirement, it is recommended to deploy connectors...

Configuring ZPA applications

An application is defined as a combination of a port, along with a Fully Qualified Domain Name (FQDN), IP address, or a local domain hostname.

The next step after deploying the App Connectors is to configure the private applications themselves. After authenticating into the ZPA Admin Portal, the enterprise administrator needs to navigate to Administration -> Application Management -> Application Segments. This page displays a list of the existing application segments.

DNS search domains

If the enterprise wants end users to be able to access the private applications using a short name rather than the FQDN, the administrator needs to add the relevant domains that can be used to form an FQDN. For this, the administrator needs to select the DNS Search Domains icon from the top right-hand corner of the Application Segments page.

In the pop - up window, enter the domain name and then click on the Add More link to add more domains on a new line...

Exploring the best practices for enterprise deployments

The best practices for an enterprise ZPA deployment can be divided per component. Let's start with the connectors.

App Connectors

When configuring your App Connectors as part of an enterprise deployment, you should install the App Connectors on an internal network segment, adjacent to the private applications. It is recommended that the network segment be configured with a default route to the internet.

The connector should also have access to an internal DNS server that can resolve both the application hosts and the hosts on the internet. Full application port and protocol access, including internet control message protocol (ICMP) access, should be granted to the connectors. If possible, avoid an explicit proxy on the path between the connector and the ZPA cloud. ICMP access is required for User Data Protocol (UDP) applications, which allows the round-trip time (RTT) calculations to the application host. This is...

Summary

In this chapter, we continued our journey toward configuring the various components of a ZPA solution for an enterprise. We learned the steps involved in provisioning App Connectors and the applications themselves. We also explored the best practices that an administrator should know about before attempting to deploy a ZPA solution within their enterprise.

In the next chapter, we will explore the migration process to ZPA and how to troubleshoot the most common ZPA end user issues.

Questions

As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:

  1. Every new ZPA account comes with which of the following default certificates?

    a. Root

    b. Connector

    c. Client

    d. All the above

  2. SSL interception can be performed on the path between which of the following?

    a. The ZCC app and the ZPA cloud

    b. App Connectors and the ZPA cloud

    c. None of the above

    d. All the above

  3. Applications such as active FTP and VoIP work great on ZPA.

    a. True

    b. False

Further reading

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Zscaler Cloud Security Essentials
Published in: Jun 2021Publisher: PacktISBN-13: 9781800567986
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Ravi Devarasetty

Ravi Devarasetty is originally from India and came to the United States for his higher education. He started his IT career in embedded software development, moved into 24x7 network operations, later transitioned into secure web gateways, and now works in public cloud security. He likes constant learning, both through self-study and via mentoring relationships. He likes to tinker with technology and loves it when he is able to put the things he has learned toward creating a unique solution. He has experience working as a Zscaler solution deployment engineer as part of a Managed Security Service Provider (MSSP) and as a Zscaler consultant. He holds multiple Zscaler certifications, and is also certified in CISSP, CCSK, AlienVault, AWS, and Microsoft Azure.
Read more about Ravi Devarasetty