Day 1 - MSP Bootcamp Training 201
Day 1 - MSP Bootcamp Training 201
Day 1 - MSP Bootcamp Training 201
2 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
What is Bootcamp Training About?
Interactive technical course on core functions for new hires
3 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Agenda
Five day dive into ZIA
4 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Intro/Zscaler Core Function Overview
5 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
What services do we offer as a company?
Zscaler Core Functions
• We act as a secure web gateway (proxy) for customers’ outbound internet traffic
• Type of services we offer
• ZIA - Zscaler Internet Access
• ADP, AV, Cloud, FW, Cloud IPS, Sandbox, BW Control, Cloud, Browser Isolation, CASB, DLP
• ZPA - Zscaler Private Access
• Alternate for VPN, Browser Access
• ZDX - Zscaler Digital Experience
• Monitoring Tool
• ZCP - Zscaler Cloud Protection
• Zscaler Workload Segmentation, Cloud Connectors, Security Posture Management
6 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Where are we in the industry?
Gartner Quadrant (We are the best!)
7 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
ZS Evolution
2019
2018 2020
2017
2016
2015
2014
2013
2012
2011
2010
8 ©2019 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION Securing your cloud transformation
ZIA Architecture Review
9 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Module 1 Objectives
By the end of the module, you will be able to describe all of the
Zscaler cloud components, functions, and architecture.
● Explain SMCA and its role and functionalities
● Describe the different clouds that Zscaler customers can be provisioned in
● Explain the use case of Feed Central Cloud(FCC).
● Explain how traffic is forwarded to Zscaler
● Explain how Zscaler processes customer transactions
● Explain how to log customer transactions
● Define the components of a Zscaler Datacenter
● Describe the Zscaler Load Balancers and explain the different types of
load balancing algorithms.
● Explain Zscaler Cloud Firewall.
10 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Major components of ZIA
What powers the cloud
11 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Major components of ZIA cont.
What powers the cloud
• SMSM or Nanolog Servers:
• Servers that store the transaction logs received from the ZEN’s.
• Writes the data in compressed id form.
• High speed data read and writing.
• PAC servers:
• Delivers the PAC file contents.
• Serves PAC file over http and https.
12 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
ZIA Architecture Overview(Per cloud view)
13 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMCA
• SMCA being the brain behind the entire operation is the most critical piece in this entire
puzzle.
• Responsibilities of SMCA
• Stores the entire database of the cloud and each organization.
• Takes care of user authentication/provisioning.
• Monitors all nodes in cloud.
• Keeps an up-to-date view of entire cloud. Removes systems/VIP’s which are found unhealthy.
14 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMCA
15 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMCA
• SMCA also acts as IdP for the case where Zscaler is an IdP for certain applications.
16 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMCA
• SMCA monitors all the components in the cloud and keeps an up-to-date view of state of every system.
17 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMCA
• For this purpose, we always have a cluster of 5 or more SMCA nodes, participating in HA.
18 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SME+ZVPN+SVPN+SMLB= A Typical Zscaler DC
19 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Types of Zscaler Nodes handling customer traffic
• SME(Zen nodes) 🡪 These are called ZEN(Zscaler Enforcement Nodes). They handle customer
traffic and apply configured policies.
• ZVPN 🡪 These are IPSEC terminating nodes. They terminate both IKEv1 and IKEv2 traffic.
• SVPN 🡪 These are SSLVPN terminating nodes. They terminate ZCC Tunnel2.0 traffic.
• SMLB 🡪 All of the above said nodes sit behind a LB node. We can have up to 128 instances of
same type behind a SMLB node.
20 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Types of Zscaler Nodes handling customer traffic
• Before we dig deep into the types of nodes, lets be clear on following terms:
• Service IP & Service Interface
• Management IP & Management Interface
• Our driver software is written such a way that, our OS(ZscalerOS) does not get a copy of the packets coming on the service interface. Instead,
the process(SME process) directly handles the traffic.
• We run our own TCP/IP stack in user space, which we call as SMNET.
21 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SME/ZEN nodes
• After the traffic is processed by SME nodes, they are sent out to the internet to the actual
destination.
• Each ZEN node can have anywhere between 3-6 SME instances.
22 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SME/ZEN nodes
• Each SME is typically assigned one 1G interface. As we are scaling we are having SME’s with 10G nic as well.
• This interface is used for both sending and receiving data by the SME.
• All Zscaler instances follow the same model.
23 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
ZVPN nodes
24 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SVPN nodes
25 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMLB nodes
26 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMLB nodes
• In Master-Backup setup, we use CARP(Common Address Redundancy Protocol) to achieve VIP failover.
• Although we are migrating to Active-Active LB setup slowly, we still use Active-Passive LB setup in following
deployments:
• Vzen
• Pzen
• Smaller DC’s where we do not expect capacity to hit high numbers.
27 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMLB nodes
28 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMLB nodes(Active-Active in one cluster)
• Router uses ECMP based on source IP and destination IP to decide the next hop
• AA LB in one cluster means that all the SME and SMLB instances are in one broadcast domain.
29 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Active-Active multi cluster
• In multi cluster setup, multiple clusters spread across multiple networks, share
same VIP IP address.
• As shown in last diagram, internet router leverages ECMP to decide the next hop
and sends the traffic to LB instance. Now depending on which cluster you land on,
your egress IP will vary.
• Since internet routers always use outer source IP + outer Destination IP load
balancing, all the traffic from one public IP always land on one LB.
• In the output below, you can see that the VIP is in 104.129.194.32/24 subnet,
while SME instances are in 136.226.48.0/24 subnet.
30 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
SMLB nodes
31 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Packet Flow Within An SME.
32 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
About Policy Enforcement
• Once the SSMA inspection process is complete, the ZIA Public Service Edge executes policies with
specific precedence. Each ZIA Public Service Edge has two main modules for applying policies:
• A web module &
• A firewall module.
33 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
About Policy Enforcement
34 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
About Policy Enforcement
35 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
About Zscaler Firewall
36 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Detailed Next Gen Firewall Packet Flow (Client)
37 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Break
38 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
ZIA Traffic Forwarding
PAC/GRE/IPSEC/ZCC
39 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Module 2 Objectives
By the end of the module, you will be able to explain the different ways of
forwarding traffic to Zscaler.
● Define PAC files and PAC servers.
● Describe the use cases of all Zscaler specific PAC variables.
● Explain how to forward traffic to Zscaler while bypassing certain domains.
● Explain the concepts of subcloud.
● Explain GRE(Generic Routing Protocol).
● Explain IPSec as a traffic forwarding.
● Identify the differences between IKEv1 and IKEv2.
● Setup a IKEv1 tunnel to Zscaler.
● Explain how the packet flow changes, depending on the traffic forwarding method.
● Describe the concepts and functions of IKEv2-ALG.
● Describe the internal working of Zscaler Client Connector(ZCC).
● Deploy ZCC in various forwarding methods.
● Explain the Zscaler Mobile portal.
40 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Traffic Forwarding - PAC Files
41 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
PAC file
What is a PAC file
A Proxy Auto-Configuration (PAC) file is a JavaScript function that determines whether web browser
requests (HTTP, HTTPS, and FTP) go directly to the destination or are forwarded to a web proxy server.
The JavaScript function contained in the PAC file defines the function:
function FindProxyForURL(url, host) { // ... }
42 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
PAC Files
Traffic Flow
43 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
HTTP CONNECT TUNNEL A HTTP CONNECT is sent by client.
The CONNECT shows client's intent to connect to
Traffic Flow through the eyes of Wireshark www.google.com on port 443.
Destination IP would be proxy IP
Client now sends data. In case of SSL, this would be Client Hello.
44 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
PAC file bypassing
Force some traffic to go out direct bypassing the proxy. Samples below
45 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Zscaler PAC variables
Gateway Variable
• Gateway Variable:
• You can use the ${GATEWAY} and ${SECONDARY_GATEWAY} variables to determine the ZIA Public Service
Edge closest to the client.
• The Zscaler service uses its geo-location technology to find the closest ZIA Public Service Edge with the
quickest response time. These variables provide the optimal user experience.
• If the organization has a large number of users behind a single egress IP address, then all the traffic lands on the
same SME. This can cause issues like overloading a particular SME.
46 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Zscaler PAC variables
Gateway Index Token
• Zscaler recommends this method if you want the users to be distributed across multiple SME's IP
addresses in a datacenter, for load balancing purposes.
• For example, ${GATEWAY_F0} corresponds to the first healthy IP address that is available,
${GATEWAY_F1} corresponds to the second healthy IP address and so on. We support from F0 till
F7.
• If the data center has less than eight healthy gateway IP addresses, then the PAC server allocates the
available healthy VIPs to all the eight variables in a round-robin fashion.
47 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Zscaler PAC variables
Dynamic Gateway Tokens
• Use the suffix, _FX to the ${GATEWAY} variable in the PAC file for the PAC server to dynamically
issue gateway IP addresses based on the client fingerprints, i.e., all users coming from a single egress
IP address are given an IP address from a pool of healthy gateway IP addresses.
• This variable is effective only for Zscaler Client Connector (formerly Zscaler App or Z App)
48 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Zscaler PAC variables
Source IP Variable
• You can use the ${SRCIP} variable to determine the client's public IP address
• Example:
var egressip = "${SRCIP}";
if (shExpMatch(egressip,"203.0.113.10")) {
/* User is in the office */
return "PROXY 10.84.0.188:80;DIRECT";
}
49 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Zscaler PAC variables
Country Gateway Variable
• You can use the ${COUNTRY_GATEWAY} and ${COUNTRY_SECONDARY_GATEWAY} variables
to determine the closest ZIA Public Service Edge in the client's country.
return "PROXY ${COUNTRY_GATEWAY}:80; PROXY ${COUNTRY_SECONDARY_GATEWAY}:80";
• When there is no ZIA Public Service Edge configured in your country, the ${COUNTRY_GATEWAY}
variable behaves just like the ${GATEWAY} variable.
• If your organization has a large number of users behind a single egress IP address, you can configure
the PAC file to choose from multiple gateway IP addresses within a country to distribute load.
• You can also set exceptions for specific URLs when accessed from a specific country using the ${COUNTRY} variable
as shown in the following sample:
51 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
PAC Files
Subcloud
• Why subcloud:
• Customers want users to only go through a small subset of Zscaler nodes.
• Customers want to use PZEN’s along with public ZEN’s.
• Customers want to use DC’s that are not in public rotation. (Regional Surcharge nodes).
• In such cases, customers will ask Zscaler to provision a subcloud for them.
• Customers will then use return variables that is specifically created for subclouds.
52 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Zscaler PAC variables(For subcloud)
• Gateway Variable
• ${GATEWAY.<Subcloud>.<Zscaler Cloud>}
• ${SECONDARY.GATEWAY.<Subcloud>.<Zscaler Cloud>}
53 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
PAC Files
Public API’s
• http://pac.cloudname.net/getGatewayEndpoints?srcip=115.112.60.134
• pac.<cloudname>/getGatewayEndpoints?subcloud=<Subcloudname>"
• pac.<cloudname>/getVpnEndpoints?subcloud=<Subcloudname>"
• pac.<cloudname>/getGatewayEndpoints?lat=-<lat>&long=<long>
• pac.zscaler.net/getGatewayEndpoints?lat=-11&long=170“
• pac.zscaler.net/getGatewayEndpoints?subcloud=<subcloud>&srcip=2.2.2.2
54 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Lab Exercise #1
Issue: Traffic is going to the wrong Zscaler Datacenter
• Problem Scenario:
a. Customer is using PAC files to route their internet traffic to Zscaler using the ${GATEWAY}
variable. Their office is physically located in San Jose, CA but their traffic is being routed to
Zscaler’s Dallas, TX datacenter. The customer expectation is that their traffic be routed to our
San Jose datacenter for best performance.
b. PAC file -
• Task:
a. Analyze the pac file and determine where the problem might be.
b. From your analysis, how would you communicate the results to the customer?
c. What would you advise the customer as next steps?
Tip - Check if customer has support access already open, you can check many things before asking questions or gathering data from them.
55 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Lab Exercise #2
Issue: cnn.com not being bypassed using an exception
• Problem Scenario:
a.Customer is trying to bypass cnn.com using a wildcard, for all users who have private IP in range
172.16.0.0/12.
• Task:
a.The objective is to write a PAC file which helps achieve this objective.
b.Achieve this objective using shExpMatch
c.Repeat the same using dnsDomainIs
56 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Traffic Forwarding - GRE
57 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
What is a tunnel in networking terms
• In the physical world, tunneling is a way to cross terrain or boundaries that could not normally be
crossed.
• Similarly, in networking, tunnels are a method for transporting data across a network using some
protocols.
• Example:
• Suppose you have an office location in Bangalore, India and another in San Jose, USA.
• Say you have an internal webserver hosted in Bangalore, that employees working in San Jose want to access.
• Since private IP's can’t communicate over the internet directly, we use tunneling protocols like GRE/IPSEC.
• So, your tunneling protocol like GRE/IPSEC would communicate over a public network, but inside it would carry
data, which preserves the internal IP addresses.
58 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
What is a tunnel in networking terms
Through the eyes of Wireshark
Tunneling internal IP traffic. Here you can see 172.30.39.175 is communicating to 197.90.201.10.
This traffic is received by 197.98.201.9(Zscaler DC), over the internet.
59 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
What is a tunnel in networking terms
Tunneling and Zscaler
• In case of Zscaler, we are internet facing proxy. Which means we only receive internet bound
traffic.
• Customer should not traffic which is destined to a private IP through any tunnels established to Zscaler.
• Customer is recommended to send all internet bound traffic to Zscaler via these tunnels.
• When customers send traffic via a tunnel, we get to know the internal IP(Client Private IP). This helps us
better log the traffic.
60 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
GRE Tunnels
What is GRE
• The GRE (Generic Routing Encapsulation) protocol will encapsulate the actual traffic as payload
and utilizes the transport protocol like IP to forward the data to the destination
61 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
GRE Tunnels
What is GRE
• A GRE tunnel, just encapsulates data. It does not encrypt the data between endpoints.
62 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
GRE Tunnels
GRE Keep-Alive
• GRE tunnels typically use keepalive packets to determine if a tunnel is up. The GRE tunnel source
creates the keepalive request and response packets that are encapsulated and sent together to
the tunnel destination. When the tunnel destination receives an encapsulated packet, it just
decapsulates the original packet and sends the inner response packet back to the originating
peer.
63 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
GRE Tunnels
GRE Keep-Alives
You can see here how a GRE Keep-Alive looks. Source 103.220.234.45 is sending a GRE packet to 165.225.124.32.
Inside you will see the response packet which the client sends.
Source for that packet is 165.225.124.32 and destination is client(103.220.234.45).
64 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
GRE Tunnels
GRE Keep-Alives
You can see the keep-alive response here. Zscaler would just open the GRE headers and see that the
packet is destined to 103.220.214.45.
At this point, Zscaler would just send that packet back.
This completes one iteration of GRE Keep-Alive.
65 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
GRE Provisioning:
How do we provision tunnels.
• Customer must own at least one public IP.
• Customer now must create a location on the portal, attaching the public IP to the location.
• Starting 6.1r, customers can self provision the public IP and attach GRE tunnels in Admin UI.
• Zscaler recommends that customers configure two GRE tunnels from an internal router
behind the firewall to the ZIA Public Service Edges.
• Zscaler requires building primary and backup GRE tunnels from every Internet egress
location and, if applicable, from each Internet service provider.
• While GRE Self Provisioning via Admin UI, Zscaler identifies the endpoints of the tunnels
based on your geolocation information. Customers can request alternative locations for the
tunnels by contacting Zscaler Support.
• Zscaler recommends that customers calculate the maximum transmission unit (MTU) and
maximum segment size (MSS) values on the GRE tunnel based on the MTU and MSS
configuration of the WAN interface.
• In this example, the tunnel MTU and MSS values are calculated for a WAN interface that is 1500
bytes.
WAN Interface MTU = 1500
WAN Interface MSS = MTU (1500) – IP (20) – TCP (20) = 1460 (40 bytes TCP+IP Header)
GRE = 4 bytes header
GRE MTU = MTU (1500) – IP (20) – GRE (4) = 1476
GRE MSS = GRE MTU (1476) – IP (20) – TCP (20) = 1436
68 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Deploying GRE Tunnels
Supported Bandwidth for GRE Tunnels
• Zscaler supports a maximum bandwidth of 1 Gbps for each GRE tunnel if its internal IP
addresses aren't behind NAT.
• If the internal subnet is behind NAT, Zscaler can only support up to 250 Mbps of traffic for
each tunnel.
• If any organization wants to forward more than 1 Gbps of traffic, Zscaler recommends
configuring more GRE tunnels with different public source IP addresses.
• For example, if the organization forwards 2 Gbps of traffic, they can configure two primary GRE
tunnels and two backup GRE tunnels.
• If the organization forwards 3 Gbps of traffic, they can configure three primary GRE tunnels and
three backup GRE tunnels.
69 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Deploying GRE Tunnels
Monitoring GRE Tunnels
• Zscaler does not monitor customer GRE tunnels.
• Zscaler requires customers to monitor their GRE tunnels so that failover between the
primary and backup tunnels will trigger if a tunnel goes down.
• Customer must at least enable GRE keepalives to serve as a basic detection mechanism.
• The GRE keepalives monitor the interface, but not the service beyond the interface.
70 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
GRE Tunnels
How the tunnel configuration looks like
• The customer must register the public static IP address from which they are building the GRE tunnel.
• As of 6.1r, customers can self provision their public IP onto Zscaler.
• If the DC’s listed in GRE Self-Provisioning utility is not as per expectation, then customer can open a
support case with Zscaler for the same.
• Zscaler provisioning team will add the IP address to the organization and configure GRE tunnel on
Zscaler side.
• Sample configuration:
71 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
GRE Router Configuration
Example of a Cisco 881
73 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Lab Exercise #1
Issue: Customer internet performance is slow using GRE
• Problem Scenario:
a.Customer has GRE tunnels to Zscaler, but all their users are complaining about slowness. If the
customer disables the tunnels, meaning bypassing Zscaler and going out direct, the issue goes away.
Below are the mtr traces during the slowness.
b.Client-side MTR trace to Zscaler -
• Task:
a.Analyze the MTR traces and determine where the problem might be.
b.From your analysis, how would you communicate the results to the customer?
c.What would you advise the customer as next steps?
74 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION
Lab Exercise #2
Issue: Customer GRE tunnels are not coming up
• Problem Scenario:
a.Customer GRE tunnels to Zscaler are not coming up and they provided you a packet capture from their
GRE router during the failure. Below are the pcaps from the SMLB and SME on Zscaler side
a.Zscaler SME pcap file -
• Customer config:
• Task:
a.Analyze the pcap files and cross verify with the config & determine where the problem might be.
b.From your analysis, how would you communicate the results to the customer?
c.What would you advise the customer as next steps?
75 ©2021 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION SECURING YOUR DIGITAL TRANSFORMATION