Experience Center
Deployment Scenarios for SSL Inspection
Zscaler's SSL inspection can be deployed in different scenarios. Click on the following scenarios to see how the service applies SSL inspection based on traffic source, and whether authentication or other features are enabled.
- HTTPS Traffic from Known Locations
When an organization’s traffic is forwarded from a known location (an internet gateway configured in the Admin Portal), the Zscaler service applies URL Filtering and Cloud App Control policies as described below, depending on whether user authentication is enabled.
- Authentication Enabled: Zscaler recommends this configuration because it enables the service to enforce granular URL and Cloud App Control policies at the user level.
- Authentication Disabled: The service applies location-based URL and Cloud App Control policies. It cannot apply any user or group policies because authentication is disabled. Ensure that the appropriate location is specified in the Location setting of the URL and Cloud App Control policies.
- HTTPS Traffic from Remote Users
There are some extra steps needed when dealing with remote users, or users from an unknown location. Following are some options:
Zscaler Client Connector
The recommended option is to install and use the Zscaler Client Connector on the client machines of your remote users and activate the Enable SSL Scanning for Mobile Traffic option.
Dedicated Proxy Port
If your organization has subscribed to a dedicated port and has getaway locations created using the dedicated port, your organization’s users may forward traffic to Zscaler on said port.
Whether SSL traffic should be inspected or not is something that can be defined by the location configuration. As the port is unique to the organization, it would be used as an identifier to apply your organization's SSL and Authentication bypasses.
However, if the first transaction from a user is from an unregistered IP and is an HTTPS request, the identity of the user is unknown and in order to accept the traffic the transaction needs to be authenticated. This is to ensure Zscaler is not used as an open proxy by unauthorized users.
If the organization has Show Notifications enabled, then the transaction is intercepted and checked for a valid authentication cookie. If the cookie is not present, the user is redirected for authentication. After authentication, the traffic is accepted by Zscaler and appropriate policies applied.
The user would need to have appropriate root certificates installed on the user’s browsers to avoid certificate warnings.
If the organization has Show Notifications disabled, then the transaction is dropped. The user would need to access an HTTP page and provide a valid authentication cookie or go through the authentication process before accessing the HTTPS page.
TCP Port 9443
Users can connect to Internet & SaaS Public Service Edges on port 9443 and all HTTPS connections will be subject to SSL inspection. The drawback of this method is that the capability to bypass certain traffic based on URLs and URL categories from SSL scanning and authentication is lost.
Users should also have the appropriate SSL certificate installed. If it is not installed and a user forwards traffic to port 9443, the browser displays certificate warnings.
TCP Port 80/443/9400/9480
Remote users may forward traffic to Zscaler on ports 80/443/9400 and 9480. However, there are a few issues to be aware of:
- SSL traffic is not intercepted and policies are not implemented on SSL traffic.
- If the first transaction from an unregistered IP address and is on HTTPS, the transaction is blocked. The user would need to access an HTTP page and provide a valid authentication cookie or go through the authentication process before accessing the HTTPS page.
- SSL and Authentication Bypass is not applied.
TCP Port 8800
Remote users may use port 8800 to forward traffic to Zscaler and Internet & SaaS Public Service Edges will attempt to authenticate the user using the Kerberos method of authentication. The organization may choose to inspect HTTPS traffic by enabling Enable SSL Inspection for Remote Users with Kerberos.
Close
Be aware of whether you protect HTTPS traffic by deploying SSL inspection or by blocking specific HTTPS traffic, the Zscaler service must first identify the host in an HTTPS request through an explicit or transparent proxy mode.
The Zscaler service supports TLS 1.0, 1.1, and 1.2. When SSL inspection is enabled, the service inspects all SSL/TLS sessions, regardless of version.