icon-unified.svg
Experience Center

Networking Deployed Private Service Edges

Before you deploy the Private Service Edge on a supported platform, you need to complete the following networking configurations:

  • By default, virtual machine-based Private Service Edges are configured to use DHCP networking on their primary interface. If necessary, you can configure a static IP address for a Private Service Edge.

    Close
  • If DHCP is not available, you can configure a static IP address on a VM-based Private Service Edge.

    1. Log in to the Private Service Edge console using your admin credentials.
    2. Edit the /etc/sysconfig/network-scripts/ifcfg-eth0 file. Use an editor, such as vi.
    [admin@zpa-service-edge ~]$ sudo vi /etc/sysconfig/network-scripts/ifcfg-eth0

    In the following example, the edited file is using a Private Service Edge IP address of 192.168.2.100, highlighted in green:

    DEVICE="eth0"
    BOOTPROTO="none"
    ONBOOT="yes"
    NETWORK="192.168.2.0"
    NETMASK="255.255.255.0"
    IPADDR="192.168.2.100"
    USERCTL="no"
    1. Edit the /etc/sysconfig/network file and configure the default gateway. For example:
    NETWORKING=yes 
    GATEWAY=192.168.2.254
    1. To apply the changes, restart the networking subsystem using the following command:
    [admin@zpa-service-edge ~]$ sudo systemctl restart network
    Close
  • If necessary, additional interfaces can be configured by creating additional files in /etc/sysconfig/network-scripts.

    1. Log in to the Private Service Edge console using your admin credentials.
    2. Copy the /etc/sysconfig/network-scripts/ifcfg-eth0 file to /etc/sysconfig/network-scripts/ifcfg-eth1. For example:
    [admin@zpa-service-edge ~]$ sudo cp /etc/sysconfig/network-scripts/ifcfg-eth0 /etc/sysconfig/network-scripts/ifcfg-eth1
    1. Edit the new /etc/sysconfig/network-scripts/ifcfg-eth1 file with the network configuration information required for the interface. Use an editor, such as vi.
    [admin@zpa-service-edge ~]$ sudo vi /etc/sysconfig/network-scripts/ifcfg-eth1

    The content within the new file should be similar to the following:

    DEVICE="eth1" 
    BOOTPROTO="none" 
    ONBOOT="yes"
    NETWORK="192.168.2.0" 
    NETMASK="255.255.255.0"
    IPADDR="192.168.2.100" 
    USERCTL="no"
    1. To apply the changes, restart the networking subsystem using the following command:
    [admin@zpa-service-edge ~]$ sudo systemctl restart network
    Close
  • To add static routes to the interface control files for a Private Service Edge:

    1. Log in to the Private Service Edge console using your admin credentials.
    2. Edit the /etc/sysconfig/network-scripts/route-eth0 file. Use an editor, such as vi.
    [admin@zpa-service-edge ~]$sudo vi /etc/sysconfig/network-scripts/route-eth0

    Add additional static routes using the following format: <CIDR> via <GATEWAY> dev <INTERFACE>. For example:

    192.168.0.0/16 via 192.0.2.1 dev eth0
    172.16.0.0/12 via 192.0.2.1 dev eth0
    10.0.0.0/8 via 192.0.2.2 dev eth0
    1. To apply the changes, restart the networking subsystem using the following command:
    [admin@zpa-service-edge ~]$ sudo systemctl restart network
    
    Close
  • DNS resolution is critical for the successful operation of the Private Service Edge. Private Service Edges must also be able to resolve external DNS names, such as those of the cloud infrastructure.

    1. Log in to the Private Service Edge console using your admin credentials.
    2. Edit the /etc/resolv.conf file. Use an editor, such as vi.
    [admin@zpa-service-edge ~]$sudo vi /etc/resolv.conf

    Replace the example nameserver IP addresses and search domains with your company-specific configuration. For example:

    nameserver 8.34.34.34
    nameserver 8.35.35.35 
    search myexampledomain.com
    
    1. To apply the changes, restart the networking subsystem using the following command:
    [admin@zpa-service-edge ~]$ sudo systemctl restart network
    
    Close
  • To configure Private Service Edges to use internal NTP servers:

    1. Log in to the Private Service Edge console using your admin credentials.
    2. Edit the /etc/chrony.conf file. Use an editor, such as vi.
    [admin@zpa-service-edge ~]$sudo vi /etc/chrony.conf

    Add your internal NTP servers to the list. For example:

    server 0.zscaler.pool.ntp.org iburst
    server 1.zscaler.pool.ntp.org iburst
    server 2.zscaler.pool.ntp.org iburst
    server 3.zscaler.pool.ntp.org iburst
    1. To apply the changes, restart the chrony daemon using the following command:
    [admin@zpa-service-edge ~]$ systemctl restart chronyd
    
    Close
  • If your traffic is going through a proxy, you must manually configure the Private Service Edge to work through that proxy. The following procedure allows the Private Service Edge to communicate with the broker by using CONNECT requests through a standard HTTP proxy server.

    To configure the Private Service Edge to work through an explicit proxy:

    1. Log in to the Private Service Edge console using your admin credentials.
    2. Create a file named, /opt/zscaler/var/service-edge/proxy. Use an editor, such as vi.
    [admin@zpa-service-edge ~]$ sudo vi /opt/zscaler/var/service-edge/proxy

    Enter the proxy information using the following format: <Proxy Hostname or IP Address>:<Proxy Port> (e.g., 192.0.2.0:0).

    1. To apply the changes, restart the Private Service Edge using the following command:
    [admin@zpa-service-edge ~]$ sudo systemctl restart zpa-service-edge

    The Private Service Edge will attempt to create a TLS session through the proxy specified in step 2.

    Close
  • If you want to configure yum to communicate through an HTTP proxy server, refer to the CentOS and Red Hat documentation.

    Close
Related Articles
About Deploying Private Service Edges for Private ApplicationsPrivate Service Edge Deployment Prerequisites for Private ApplicationsPrivate Service Edge Software by PlatformPrivate Service Edge Deployment Guide for Amazon Web ServicesPrivate Service Edge Deployment Guide for DockerPrivate Service Edge Deployment Guide for Google Cloud PlatformPrivate Service Edge Deployment Guide for LinuxPrivate Service Edge Deployment Guide for Microsoft AzurePrivate Service Edge Deployment Guide for VMware PlatformsRed Hat Enterprise Linux 9 Migration for Private Service EdgesDisabling Password Expiration for STIG-Hardened Private Service Edge ImagesNetworking Deployed Private Service Edges