Header Ads

Recently post

ZIA Cloud Architecture

 ZIA Cloud Architecture -----

There are three thing involve in zscaler Architecture

Zscaler Central Authority, ZIA Public Service Edges (formerly Zscaler Enforcement Nodes or ZENs), and Nanolog clusters





Zscaler Central Authority --


Zscaler Internet Access (ZIA) Central Authority (CA) is the brain and nervous system of a Zscaler cloud, It monitors the cloud and provides a central location for software and database updates, policy and configuration settings, and threat intelligence.

The CA consists of one active server and two servers in passive standby mode. The active CA send data in real time to the two standby CAs, so any of them can become active at any time. Each server is hosted in a separate location to ensure fault tolerance.

ZIA Public Service Edges --

ZIA Public Service Edges are full-featured, inline internet security gateways that inspect all internet traffic bi-directionally for malware, and enforce security and compliance policies.

An organization can forward its traffic to any ZIA Public Service Edge in the world or use the advanced geo-IP resolution capability of Zscaler to direct its users' traffic to the nearest ZIA Public Service Edge.

just example -->>  if user working from India in Delhi location so the user will connect nearest Zscaler MPLS cloud which may be in Delhi.

policy follows the user based on user location, with the ZIA Public Service Edge downloading the appropriate policy


Nanolog Clusters --->>>


Nanolog clusters store transaction logs and provide reports. Each cluster consists of one active server and two servers in passive standby mode. The active Nanolog immediately replicates data to the other two servers, so any of them can become active at any time, with no data loss

Note- Each Nanolog server is hosted in a separate location to ensure fault tolerance

Zscaler offers a Nanolog Streaming Service (NSS), which uses a virtual appliance to stream web and firewall traffic logs in real time from the Zscaler Nanolog to the customer’s security information and event management (SIEM) system




 






No comments