About Hosted PAC Files

Zscaler recommends that organizations use a combination of tunneling, PAC files, Surrogate IP, and Zscaler App to forward traffic to the Zscaler service. If your organization has an internal router, switch or firewall that supports GRE and its egress port has a static address, Zscaler recommends that you configure a GRE tunnel to forward all outbound traffic from your location to the Zscaler service.

If your router or firewall does not support GRE or if you use dynamic IP addresses, you can use an IPsec VPN tunnel instead. IPsec tunnels have additional processing overhead on your equipment, compared to GRE tunnels. Zscaler also recommends that organizations deploy mechanisms such as IP SLA to monitor tunnel health and enable fast failover. In addition to the GRE or IPsec VPN tunnel, Zscaler recommends that you install a PAC file for each user to ensure coverage outside the corporate network. 

Watch a video about Hosted PAC Files

Read about Hosted PAC Files

Read about What You Can Do on the Hosted PAC Files Page

The Zscaler service hosts four non-editable default PAC files, recommended.pac, proxy.pac, mobile_proxy.pac, and kerberos.pac, which are all configured to automatically forward all browser traffic to the nearest Zscaler Enforcement Node (ZEN). If necessary, your organization can use more than one PAC file. For example, you can use one PAC file for mobile devices and another for all other devices. Use the Kerberos PAC file if you are deploying Kerberos authentication. To forward web traffic to the Zscaler service, you can use the default PAC file or a custom PAC file.

  1. View a list of URLs for the default and custom PAC files if you've configured any.
  2. Add a custom PAC file.
  3. View the default PAC file.
  4. Edit a custom PAC file.
  5. Search for a PAC file.
  6. Modify the table and its columns.

Screenshot of the Hosted PAC Files page and its features