Day 1 ZPA Bootcamp Slides - New Hire Version
Day 1 ZPA Bootcamp Slides - New Hire Version
Day 1 ZPA Bootcamp Slides - New Hire Version
2 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
What is Bootcamp Training About?
1-week interactive technical course on core functions for new hires
• Goal is to extend your technical knowledge on Zscaler in live instructor led sessions by
SME’s (Subject Matter Experts) within the GSC organization.
3 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Agenda
This week is to dive into ZPA
4 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Intro/Zscaler Core Function Overview
5 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
What services do we offer as a company?
Zscaler Core Functions
• We act as a secure web gateway (proxy) for customers’ outbound internet traffic
• Type of services we offer
• ZIA - Zscaler Internet Access
• ADP, AV, Cloud, FW, Cloud IPS, Sandbox, BW Control, Cloud, Browser Isolation, CASB, DLP
• ZPA - Zscaler Private Access
• Alternate for VPN, Browser Access
• ZDX - Zscaler Digital Experience
• Monitoring Tool
• ZCP - Zscaler Cloud Protection
• Zscaler Workload Segmentation, Cloud Connectors, Security Posture Management
6 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Where are we in the industry?
Gartner Quadrant (We are the best!)
7 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
ZPA Architecture Review
8 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Module 1 Objectives
By the end of the module, you will be able to understand and identify all
the different component of the ZPA infrastructure
Objectives
● Understand and identify all the different component of the ZPA
infrastructure
● Explain the role of the main components of the ZPA cloud like: Wally, ZPA
Broker and App connector
9 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Why ZPA ?
Why should customers use ZPA
10 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
What ZPA helps with?
What should customers that use ZPA expect
11 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
What is Zero Trust?
What is ZTNA
• Zero Trust means that even Zscaler cannot see or inspect client private traffic if it is not
desired.
• Use of your organization's private CA certificates means traffic can be double encrypted
(the "Bring Your Own Encryption" or BYOE model). Making it impossible for Zscaler to
gain insight into the traffic.
• It is possible for your applications to also use their own encryption when transiting ZPA
tunnels.
• Further, the tunnels used in ZPA are double certificate-pinned and this means traffic is
immune to Man In the Middle attacks. If the certificate used in the tunnel traffic is altered in
anyway, traffic is immediately blocked.
12 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Threat Landscape and ZPA
Threats and Counter Measures
13 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
ZPA Privacy Controls
Controls at various levels
To summarize the high level privacy controls adopted by ZPA are as follows:
14 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Major components of ZPA.
Components That Make Up the ZPA Cloud...
15 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Major components of ZPA.
Components That Make Up the ZPA Cloud...
ITASCA Components Components
written in C-Language written in JAVA DB SCHEMA GULF ATLANTIC UI
Dashboard/Diagn
Broker Geo-IP Updates
ostics
AuthSP/AdminS
Slogger
P
Lookup
Exporter
zShift
16 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Major components of ZPA
What powers the cloud
• Dispatcher:
● Finds the best route from the Broker to the Application via the best possible App Connector.
● Ephemeral health propagation layer, tracks health of all connectors and private applications
behind them
● Checks for resolvability of DNS names of private applications
● Less number of dispatchers than ZPA SEs (reduces the number of state messages being sent
across the network)
● Path selection : using server latency(comes from health reporting), round robin and user
stickiness cache
• AuthSP/AdminSP:
• Helps with the Authentication Service.
• AuthSP helps with the user login.
• AdminSP helps with the Admin login.
18 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Major components of ZPA cont.
What powers the cloud
• Connectors:
• Lightweight Linux package, also available as OVA, AWS/Azure instance.
• Connector process maintained by Zscaler (customer has only control over the upgrade time
window)
• Upgrades are always staggered across connectors in the same group.
• Enrollment using provisioning keys and certificate.
• Provisioning key deleted after enrollment through the ZPA SE
• Functions:
• DNS, application reporting/discovery, health reporting(latency and reachability of
applications), sets up mtunnels on request from the dispatcher.
19 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Major components of ZPA cont.
What powers the cloud
• Data forwarding(mtunnel signaling)
• Client auth (cert+SAML) : client certificate, saml assertion, user id and hardware fingerprint
• Connector auth : connector certificate, hardware fingerprint
• Config distribution to connector
• Config distribution to client
• DNS Message passing between dispatchers and connectors (no local DNS resolution)
• Logging of auth, ztunnels(tunnel nego, termination, every 5 minutes), mtunnels(tunnel nego,
termination, every 5 minutes) and health
• All authentication using public keys (Only the customer knows the private keys)
20 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Major components of ZPA cont.
What powers the cloud
• Slogger:
● It is used by the LSS.
● It evaluates the LSS and informs the Broker to forward the logs to the connector designated for
LSS.
• LookUp:
● Converts IDs to name
● Used in the UI for the Dashboard and Diagnostics sections.
• Exporter:
● Used in Browser Access
● Browser Access is for Client-less Access of Applications.
21 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Break
22 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Zscaler Client Connector (ZCC)
23 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
About ZCC / ZPA
• ZCC is nothing but a “Smart traffic forwarder”. Using ZCC, users can get all of the benefits of the
Zscaler service for Internet traffic, as well as granular, policy-based access to internal resources from a
single point.
• When ZCC is configured for ZIA , you can protect your users' web traffic even when they are outside
your corporate network. The app forwards user traffic to the Zscaler service and ensures that your
organization's security and access policies are enforced wherever they might be accessing the internet.
• With Zscaler Private Access (ZPA), you can enable your users to securely access enterprise
applications from outside the corporate network. ZPA establishes a secure transport for accessing your
enterprise apps and services.
• Mobile Admin portal (Zscaler App portal) is a Web portal used for administration of Zapp devices ,
configuring policies , generating reports , upgrading Zscaler App on all customer devices..etc
ZCC Enrollment
25 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Zscaler App Provisioning and Enrollment
Company Admin
Enterprise
2. Enroll
User
Internet
Zscaler App Provisioning and Enrollment
• User Workflow
‣ User enters userid@domain in App.
‣ ZCC starts cloud discovery. App discovers the cloud based on the domain captured from the userID.
‣ If more than one cloud has the domain provisioned, it asks the user to select the cloud.
‣ Or if, as part of installation parameters cloud was given, then App directly connects to the same cloud.
‣ App discovers the cloud based on the domain captured from the cloud
DeviceID and
PIN becomes
username
and password
for completing
digest auth
with ZIA.
ZCC App profile
• Administrator configures the “Forwarding profile” on the Mobile Admin portal to decide “when” and
“which “ traffic forwarding mechanism Zscaler app should use
• The forwarding profile tells the Zscaler App how to treat traffic from your user's device in “different
network environments” for the Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA)
services.
• App profile PAC is used by ZCC to decide which SME to connect to.
• It can also contain bypasses that customer configures.
• Forwarding profile PAC is the PAC which ZCC enforces on the browsers/system.
Forwarding Modes in ZCC.
33 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Forwarding modes
• 80/443 traffic is sent to SME based on pac bypasses in App profile pac. Rest of traffic is sent direct through default Physical
interface.
• After the traffic lands on ZCC, we evaluate the app profile PAC
and determine action for all web traffic.
• Command lists all installed network drivers so can be used to find out other LWF based drivers installed on
machine.netcfg -s n
• If there is need to dump current filters set during live debugging, execute filter.exe utility to print all filters on cmd. Link
to download: FilterTable.zip
Trusted Network
For Zscaler Client Connector, to identify one of your organization’s trusted networks, you must define
conditions for that network as criteria that Zscaler Client Connector uses for verification.
• DNS Search Domains: The DNS servers to which your corporate network sends DNS requests. Enter the DNS
servers, separated by commas. IPv6 addresses are supported if you’re using Zscaler Client Connector version 3.4
or later. The app verifies at least one DNS server.
• Hostname to IP mapping: The search domains configured as the primary domains for the network adapter
used for connecting to Zscaler. Enter the search domains, separated by commas. The app only verifies the
primary domains assigned to the active network adapter.
• Pre-defined trusted networks: A hostname and the IP addresses to which the hostname resolves when users
are on the corporate network. For Hostname, enter the hostname. For Resolved IPs for Hostname, enter the IP
addresses that the hostnames resolve to, separated by commas. IPv6 addresses are supported if you’re using
Zscaler Client Connector version 3.4 or later. The app verifies at least one IP address.
Configuring Trusted Networks for Zscaler Client Connector
ZCC Troubleshooting
Most common issues and what to look for
39 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Lab Exercise #1
Issue: Customer seeing FW Errors in the ZCC browser
• Problem Scenario:
a. Customer using ZCC and seeing FW Errors in the ZCC application and it cannot establish
a connection to the cloud.
b. ZCC logs -
https://drive.google.com/file/d/1RlWUt1BYWhykCHDK7fFvvAB95Wg0qhr5/view?usp=sha
ring
• Task:
a. If you do not have LOGAN access, open a helpdesk ticket and ask for it to be added to
Okta
b. Watch the demo on the LOGAN page and also additional training LOGAN training here.
c. Download the ZCC logs above and the upload them to LOGAN
d. Analyze the data and determine what the problem might be.
e. You can also use a text editor to analyze if you are unable to find the issue in LOGAN
f. From your analysis, what do you think the issue is?
g. What would you advise the customer as next steps?
40 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Mobile Admin Portal (ZCC)
41 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
ZCC portal / ZAPP portal overview
ZCC Help
Device detail
App Profiles
• Problem Scenario:
a.Customer configured to update users to the latest version of ZCC. Some users were not getting
updated to the latest version.
b.CVS file from Mobile portal showing ZCC versions for users -
c.ZCC log from user who did get the update -
• Task:
a.Review the CSV file to see who did not get the update to the latest ZCC version
b.Analyze the ZCC log from the user who did not get the latest update.
c.How would you communicate your steps you did to the customer?
d.What would you advise the customer on issues it may cause when they do this?
53 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Thank you For Attending
Day1
54 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION