Summary
In this chapter, we explored the various mechanisms we can use to forward end user web traffic to Zscaler and the benefits of user authentication. We also saw how locations can be created on the Zscaler Admin Portal for GRE and IPsec tunnels. The various user authentication options were also discussed.
Understanding these concepts allows ZIA administrators to decide on which traffic forwarding and authentication option is suitable for their enterprise.
In the next chapter, we will use this information to architect and implement a ZIA solution.