About Locations

Watch a video about Locations

Locations identify the various networks from which your organization sends its Internet traffic. When an organization forwards its traffic to the Zscaler service through a GRE or IPSec tunnel, Zscaler provisions your organization's IP addresses, which you then add as locations in the Admin Portal. You can either add locations individually or import a CSV file with your locations.

When the Zscaler service receives traffic, it checks whether the traffic is from a known location (a location that is configured on the Admin Portal), or from an unknown location (remote user traffic). If the traffic is from a known location, the service processes the traffic based on the location settings. For example, the service checks whether the location has authentication enabled, or whether it has SSL inspection enabled, and proceeds accordingly. It also applies any location policies that you configure and logs Internet activity by location.

About the Locations Page

On the Locations page, you can do the following:

  1. Add a location
  2. Import new locations and sub-locations, or modifying existing locations and sub-locations, using a CSV file
  3. Download a CSV file that lists your locations and sub-locations
  4. Download a Sample Import CSV file that shows the correct CSV format for adding or modifying locations and sub-locations
  5. Enter Grouping Mode to add locations and sub-locations to a location group
  6. Expand all sub-locations
  7. Collapse all sub-locations
  8. Search for a location or sub-location
  9. Filter by location group
  10. View a list of all location and sub-locations that were configured for your organization. For locations, you can see the following:
    • Name: The name of the location or sub-location
    • IP Addresses: The static IP addresses for your local gateway for the location
    • Proxy Ports: The subscribed proxy ports for the location, if applicable
    • X-Forwarded-For Insertion: Indicates whether the Enable XFF Forwarding feature is enabled for the location
    • Authentication: Indicates whether the Enforce Authentication feature is enabled for the location. If you are also using the Enable IP Surrogates feature, this column displays the specified Idle Time to Disassociation.
    • SSL: Indicates whether the Enable SSL Scanning feature is enabled for the location
    • Firewall Filtering: Indicates whether the Enforce Firewall Control feature is enabled for the location
    • Bandwidth: If the Enforce Bandwidth Control feature is enabled for the location, the download and upload bandwidth limits are displayed in Mbps
    • Virtual ZENS: The VZENs and s VZEN clusters for the location, if applicable
    • Group: The location group associated to the location and its sub-locations
    • Managed By: The name of the SD-WAN partner that manages the location
  11. Add a sub-location
  12. Edit a location or sub-location, including the ability to delete a location
  13. Modify the table and its columns
  14. Expand a location to see its sub-locations
  15. Go to the Location Groups page, to add a new location groups or manage existing groups

Locations Page within the Admin Portal