Zscaler - ZPA Initial Design Plan Template.pdf
Zscaler - ZPA Initial Design Plan Template.pdf
{customer_name}
Table of Contents
1 Executive Summary 4
3 ZPA Certificates 8
4.1 Connectors 8
5 ZPA Authentication 9
Subhead
date
6.2 Browser Access 10
10.1 Overview 13
11.1 FAQ 14
Subhead
date
Document Change Control
Date Changed Version Pages Changed Changed By
Sign-off
Name Role Position Date
Subhead
date
1 Executive Summary
1.1 Business Objectives ( List Business Objectives )
●
●
●
●
ZMCA is a configuration audit performed by Zscaler, to ensure the most important configuration
options chosen by customers, align to Zscaler best practices. Zscaler provides this audit in the form of
a ZMCA Score card.
Traffic 1 Ensure ZCC processes are whitelisted and have access to all cloud To be verified
Forwarding hub IPs in ZPA cloud: (http://ips.<cloudname>.net/zscaler_app)
1 Ensure Firewall rules open from Connectors to all cloud hub IPs: To be verified
(http://ips.<cloudname>.net/zpa)
Service 1 Ensure connectors capacity requirements are met per connector To be verified
Performance sizing requirements
Subhead
date
2 For TCP/UDP applications, avoid ACL/FW between connector To be verified
and application server
For UDP applications, ensure connectors have ICMP access to
servers
2 If servers are statically defined; the health dashboard should show To be verified
reachability to all applications assigned.
Subhead
date
2 ZPA Traffic Forwarding Use Cases
2.1 Roaming Users & Corporate Users
Subhead
date
IOS {{IOS_PKG_MANAGEMENT_TOOL}} {{IOS_CLIENT_AV}} {{IOS_IN_SCOPE}}
The forwarding profile tells the Zscaler Client Connector how to treat traffic from your users' systems in
different network environments for the Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA)
services. You can configure as many forwarding profiles as you need, then select the appropriate one when
configuring your App Profiles.
Profile Definition
Subhead
date
Conditional Match Any
Windows
Name {$ZCC_PROFILE_NAME}
Rule Order 1
Subhead
date
Log Mode Debug Logging mode level
Mac OS X
Rule Order 1
Groups {$SELECT_GROUP}
Android
Rule Order 1
Groups {$SELECT_GROUP}
Subhead
date
Forwarding Profile {$SELECT_FORWARDING_PROFILE} Specify which profile
to use
iOS
Rule Order 1
Groups {$SELECT_GROUP}
Subhead
date
• MAC
○ Please refer to KB for customizing the MAC installation options. Please use the below
switches
■ --cloudName <<Zscaler Cloud Name>>
■ --userDomain <<User Domain Name >>
■ --hideAppUIOnLaunch 1
• Use the package management tool to distribute ZCC installer for MAC OS
• For iOS and Android devices, please use the MDM solution in order to install ZCC with the following
switches:
■ cloudName <<Zscaler Cloud name>>
■ userDomain <<User Domain name>>
Deployment examples can be found on the help portal
• Deploy only when the user is in the office or if connected through VPN
• Do not push enrollments for more than 1K users simultaneously. Should you deploy to more than 1K
users in a day, please maintain a gap of 3 to 4 hours between every batch of 1K users.
3 ZPA Certificates
ZPA issues certificates to Connectors and clients (i.e., user devices enrolled with the Zscaler Client
Connector) so that it can authenticate them before each connection. To allow ZPA to issue these
certificates, you must specify which signing certificate ZPA must use to sign certificates issued
to Connectors, and which signing certificate it must use to sign certificates issued to clients. These signing
certificates then enable ZPA to confirm the identities of the Connector and the client whenever they connect
to ZPA.
• You can choose to use the default signing certificates provided by ZPA within the admin portal
If you are evaluating ZPA, Zscaler recommends for expediency that you use the default signing certificates
provided in the ZPA admin portal. When you deploy ZPA to your production environment, you can either
continue using the default signing certificates or generate custom signing certificates, as needed.
Custom signing certificates are mandatory if you are planning to use “Double Encryption” (separately
purchased) feature.
Subhead
date
The following certificates should be configured under Administration->Enrollment certificates
Name Creation Date Expiry Date Common Name Use for Zscaler Client
Connector Enrollment
4.1 Connectors
Connectors are one of the main parts of the Zscaler Private Access infrastructure. They provide the
secure authenticated interface between a customer’s servers and the ZPA cloud. Connectors can be
deployed in several forms.
For
application
Subhead
date
Access
{{DC_1_City}}
{{DC_2_City}}
{{DC_3_City}}
{{DC_4_City}}
{{DC_5_City}}
Subhead
date
TBD TBD Dynamic
Connectors can be deployed in a few ways (described in appendix B). {{customer_name}} will use the
following option in all data centers with connectors.
5 ZPA Authentication
{{customer_name}} will be using {{authentication_vendor}} for authentication. Because the ZPA access is
based on the user data, the authentication is required to make the ZPA work. More information about
authentication with ZPA can be found in Appendix A.
Please refer to the following KB article regarding the IdP configuration for Zscaler Private Access
https://help.zscaler.com/zpa/configuring-idp-single-sign
Subhead
date
As it is possible to use multiple IdP with ZPA, the table below describes which IdPs will be used
An application segment is a grouping of defined applications, based upon access type or user
privileges. ZPA features such as double encryption, health check and reporting, etc. are configured per
application segment. Please follow the best practices listed below when configuring the segments:
Browser Access allows you to leverage a web browser for user authentication and application access
over ZPA, without requiring users to install the Zscaler Client Connector on their devices.
Subhead
date
Name Domain Application Application Port Certificate name
Protocol
Because ZPA by default blocks access to the applications, there is a need to configure policies which
will allow users to access specific application segments or application segment groups.
• ZPA uses a first match principle when evaluating policies. When a user requests a specific
application, ZPA evaluates your configured policies from top to the bottom. As soon as it finds
a policy that applies to the user, it enforces that policy and disregards all other policies that
follow, including any potentially conflicting policies
• Policies use the following logic:
(Application Segments OR Segment Group) AND SAML Attributes AND Client Types AND
Posture profiles
• If the traffic does not match any of the configured policies, it will be automatically blocked
• Access policy configuration examples can be found here
Subhead
date
7.2 Timeout Policy
Timeout policies allow administrators to define re-authentication time interval and a user application
session idle timeout for each application segment group. More information about timeout policies can be
found in the KB article
Re-authentication interval allows Zscaler cloud to update user information, because all information is
sent to Zscaler as SAML attributes during the user authentication. By default, the re-authentication
interval is configured to 7 days, Zscaler recommends any value between 24 hours and 7 days
(depending on how often the changes in the user directory are made).
The device posture profile is a set of criteria that a user’s device must meet in order to access
applications with ZPA. To learn more about device posture profiles, see About Device Posture.
Subhead
date
8 Log Streaming Service
The Log Streaming Service (LSS) provides a better understanding of the information coming from the ZPA
service, by allowing an administrator to create log receivers that can receive information about Connectors
and users. LSS is deployed using two components, a log receiver and a ZPA Connector. LSS resides in
ZPA and initiates a log stream through a ZPA ZEN. The Connector resides in the company's enterprise
environment. It receives the log stream and then forwards it to a log receiver.
The LSS can be deployed on a regular Connector Group that also supports application access, however for
production deployments Zscaler strongly recommends that Connectors will be installed adjacent to the
SIEM and added to a group dedicated to receiving the logs. Otherwise a burst of user traffic that consumes
the available bandwidth through a Connector, could disrupt log streaming (which is best effort application)
resulting in some loss of logs.
Subhead
date
should be able to authenticate all users including external (Should be accessible from the internet).
Connectors provide the secure authenticated interface between a customer’s servers and the ZPA cloud. Connectors
can be deployed in several forms. Zscaler distributes a standard virtual machine (VM) image for deployment in
enterprise data centers, local private cloud environments such as VMware, or public cloud environments such as
Amazon Web Services (AWS) EC2. Additionally, Zscaler provides packages that can be installed on supported Linux
distributions. Connectors can be deployed in a few options:
Subhead
date
10.2 Deployment Requirements
1. Open Firewalls for Connector outbound communication, the firewall requirements can be
found here to deploy connectors.
2. Install the Connectors on an internal network segment, adjacent to the applications that they
are to provide connectivity to;
3. Ideally that network segment should be configured with a default route to the Internet;
4. The Connector should be configured to contact an internal DNS server capable of resolving
hosts for all the applications that need to be supported, and for hosts on the Internet;
5. The Connectors should have unrestricted access to the applications, with no protocol or port
limitations or restrictions, to include ICMP access;
6. While an explicit proxy on the Connector enrollment and subsequent data path can be
supported, it is certainly not recommended. Also remember that any attempt at SSL
interception on the Connector’s traffic will cause ZPA communications to fail (because of the
certificate pinning).
Note that ICMP access to UDP applications is a hard requirement, as it is used to determine the RTT to
the application host (which is important for making load-balancing decisions). For TCP applications ICMP
access is less critical although highly desirable.
Subhead
date
For ‘location-sensitive’ apps, such as Active Directory domain controllers used for DFS and other AD
services, where the user needs to be associated to a local AD Domain Controller, the following best
practices apply:
1. You SHOULD statically define the site location (Latitude and Longitude) in the connector group
definition, as this is used to determine the geographically closest instance of an application.
2. You MUST use location-based connector groups (meaning that all connectors at site A are in
connector group A, all connectors at site B are in connector group B, etc.); this is to ensure that the
user is always connected to an application instance that is local to them.
For apps that are not location-sensitive, and all UDP-based apps are ICMP-reachable, then the
following best practices apply:
1. You MAY use a single connector group per Geo (for example, all US connectors are in a US
connector group, all EMEA connectors are in an EMEA connector group) to allow the system to
choose an optimal path based on the RTT between the Connectors and application instances. In
this case, the Connectors in one Geo SHOULD NOT be able to reach applications in another Geo
(to avoid any possibility of sub-optimal path selection). Note that if you only have end users within a
single Geo, then you should have all your Connectors in the one Connector Group.
2. Connector Groups that have Connectors at many different geographic locations SHOULD NOT
have the location (Latitude and Longitude) defined in the Connector Group definition. Note that
while having this defined would not impact optimum path selection, it would be inaccurate and
potentially confusing for future administrators.
Subhead
date
• On a per connector group basis, customers may pick a day of the week, and hour of the day
as a maintenance window. Upgrades to connectors will start during that window if they are
available. The system is also careful to ensure that it doesn’t start the next upgrade until the
previous one has finished.
Subhead
date
11. Appendix A: Requirements and Discovery -
*(SA & SE - A review by pre-sales is recommended)
1.1.Products Purchased
Product Purchased
1.2.Infrastructure
Capture information about customer’s network infra, routers, switches
Network Infrastructure
{{Geo_Locations}}
Subhead
date
Remote Access VPN
Security Infrastructure
CASB {{CASB_VENDOR}}
{{SIEM_VENDOR}}
SIEM vendor Other: {{SIEM_Other}}
DLP {{DLP_VENDOR}}
{{SANDBOX_POLICY}}
Sandbox {{SANDBOX_VENDOR}}
Is SSL inspection Used {{SSL_SCANNING_USED}}
Any apps using Application Layer Gateway (ALG)
feature on Firewall {{ALG_FEATURE_USER}}
Is FW default blocking all outbound connections {{FW_DEFAULT_BLOCK}}
Windows {{WIN_IN_SCOPE}}
{{WINDOWS_NETWORK_SEGMENTED}}
Laptops/Desktops
Subhead
date
MAC {{MAC_NETWORK_SEGMENTED}} {{MAC_IN_SCOPE}}
Shared {{SHARED_PC_IN_SCOPE}}
{{SHARED_PC_KIOSK_SEGMENTED}}
Machines/Kiosk
Printer/IOT/Netwo {{IOT_IN_SCOPE}}
{{IOT_NETWORK_SEGMENTED}}
rk devices
other NA {{other_source_in_scope}}
1.4.User management
User Management
Subhead
date
1.5.End user environment
User Environment
Subhead
date