EMAIL SUPPORT

dclessons@dclessons.com

LOCATION

US

ZTDA Connectivity Services Overview

ZTDA Connectivity Services Overview

Connectivity to the Zero Trust Exchange (ZTE) enables secure communication by using different connection mechanisms suited to various use cases and locations. A key concept behind these mechanisms is tunneling, which works like a private, locked tunnel through which only authorized users can send or receive data.

In networking, tunneling encapsulates each data packet inside an additional protective wrapper. The outer header carries routing information, while the payload contains the original data. By wrapping (encapsulation) and later unwrapping (decapsulation) the packets, tunneling ensures that the data can move through networks without being exposed or detected. This process keeps communication secure, private, and protected from external threats.

Types of Tunnels

Different tunneling methods help securely route and protect network traffic, and Zscaler uses several of these to ensure safe, seamless connectivity within the Zero Trust Exchange framework. Each method has its own strengths:

  • HTTP Connect Tunnels
    Securely route web browsing traffic through a proxy, ensuring web requests reach the correct destination while staying protected.

  • SSH Port Forwarding
    Creates an encrypted communication path between a client and server over an insecure network. Commonly used by remote workers to securely access internal systems without exposing sensitive data.

  • Generic Routing Encapsulation (GRE)
    A flexible Cisco-developed method that can encapsulate many types of traffic—voice, video, or data—inside a tunnel. Ideal for scalable, multipurpose data transport across IP networks.

  • IPSec
    Provides strong security between two networks by encrypting data during transit. Often used for securely connecting two office branches over the internet.

  • DTLS / TLS Encrypted Tunnels
    Secure data that needs low latency, such as voice or video. These tunnels maintain both real-time performance and strong encryption.

  • Zscaler Proprietary Microtunnels
    Zscaler’s specialized, optimized tunnels designed for high security and efficiency within the Zero Trust Exchange. They provide dedicated, secure pathways for traffic inside the Zscaler environment.


Comment

    You are will be the first.

LEAVE A COMMENT

Please login here to comment.