EMAIL SUPPORT
dclessons@dclessons.comLOCATION
USZTDA Connectivity Services Overview
Connectivity to the Zero Trust Exchange (ZTE) enables secure communication by using different connection mechanisms suited to various use cases and locations. A key concept behind these mechanisms is tunneling, which works like a private, locked tunnel through which only authorized users can send or receive data.
In networking, tunneling encapsulates each data packet inside an additional protective wrapper. The outer header carries routing information, while the payload contains the original data. By wrapping (encapsulation) and later unwrapping (decapsulation) the packets, tunneling ensures that the data can move through networks without being exposed or detected. This process keeps communication secure, private, and protected from external threats.
Types of Tunnels
Different tunneling methods help securely route and protect network traffic, and Zscaler uses several of these to ensure safe, seamless connectivity within the Zero Trust Exchange framework. Each method has its own strengths:
-
HTTP Connect Tunnels
Securely route web browsing traffic through a proxy, ensuring web requests reach the correct destination while staying protected. -
SSH Port Forwarding
Creates an encrypted communication path between a client and server over an insecure network. Commonly used by remote workers to securely access internal systems without exposing sensitive data. -
Generic Routing Encapsulation (GRE)
A flexible Cisco-developed method that can encapsulate many types of traffic—voice, video, or data—inside a tunnel. Ideal for scalable, multipurpose data transport across IP networks. -
IPSec
Provides strong security between two networks by encrypting data during transit. Often used for securely connecting two office branches over the internet. -
DTLS / TLS Encrypted Tunnels
Secure data that needs low latency, such as voice or video. These tunnels maintain both real-time performance and strong encryption. -
Zscaler Proprietary Microtunnels
Zscaler’s specialized, optimized tunnels designed for high security and efficiency within the Zero Trust Exchange. They provide dedicated, secure pathways for traffic inside the Zscaler environment.

LEAVE A COMMENT
Please login here to comment.