Cookie Notice

icon-zia.svg
Secure Internet and SaaS Access (ZIA)

About Firewall

The Zscaler service provides integrated cloud-based next-generation firewall capabilities that allow granular control over your organization’s outbound TCP, UDP, and ICMP traffic.

You can configure the following firewall policies:

  • Firewall Filtering Policy: Add rules to allow or block specified types of traffic from your network to the internet. You can also specify how the sessions are logged.
  • NAT Control Policy: Add rules to perform destination NAT. You can redirect traffic to specific IP addresses or ports.
  • DNS Control Policy: Add rules to allow or block DNS requests, redirect requests to a different DNS server, or redirect DNS responses by substituting the IP address in a DNS response with a preconfigured IP address.
  • IPS Control Policy: Add rules to control and protect your traffic from intrusion over all ports and protocols using signature-based detection.

Configuring Firewall Policies requires configuring the four policies above as applicable and enabling the firewall for your locations. You might also need to create source and destination IP groups, modify network services, create network application groups, and configure custom ports.

Configuring a firewall policy also requires the following:

  • An organization must forward its IP traffic from a known location.
  • If your organization wants to apply firewall policies at the user level, user authentication and surrogate IP must be enabled. Otherwise, the Zscaler firewall service applies organization and location policies.

Standard and Advanced Cloud Firewall

The following table lists the features and functionalities offered by Standard and Advanced Cloud Firewall subscriptions:

Features and Functionalities Standard Firewall Advanced Cloud Firewall

Firewall policies based on the following criteria:

  • Network and Application Services: Manage your traffic based on network services and application services that are designated to use specific IP addresses, ports, and protocols (5-tuple firewall).
  • FQDN Filtering: Control your network traffic based on fully qualified domain names (FQDN).
  • Location Awareness: Enforce policies on internet traffic from known locations (locations configured in the ZIA Admin Portal), sub-locations, and remote users.
  • User Awareness: Define granular policies based on users, groups, and departments.
  • Application Awareness: Identify and control traffic that belongs to network applications using deep packet inspection (DPI).

Supported with limitations:

  • User Awareness and Application Awareness criteria are not supported
  • Only 10 firewall filtering rules are allowed
Supported
Destination NAT: Create rules to redirect your traffic to specific IP addresses and ports within a network using destination NAT. Supported Supported
FTP Traffic Control: Use configuration settings to manage native FTP traffic and FTP over HTTP traffic. Configure policies to allow access to specific FTP sites. Supported Supported
DNS Security and Control: Define granular DNS filtering policies to control DNS attributes, requests, and responses. Optimize DNS resolution using Zscaler Trusted DNS Resolver hosted in Zscaler data centers. Supported (only 64 rules are allowed) Supported
DNS Tunneling: Secure your DNS traffic from DNS tunneling, malicious domains, malware, and phishing attacks. N/A Supported
IPS Control: Use Signature-based IPS to monitor your traffic in real time and protect your network against identified threats over all ports and protocols. N/A Supported
Traffic Forwarding for Non-Standard Ports: Identify outbound HTTP, HTTPS, FTP, DNS, RTSP, and PPTP traffic that is destined for non-standard ports and redirect the traffic to the web proxy (secure web gateway) for full web visibility and security. N/A Supported
Firewall & IPS Dashboards, Insights, and Logs: Analyze your traffic information using customizable dashboards, interactive charts, and real-time logs generated with Full Logging for traffic that is allowed or blocked. Supported with limitations–Full Logging is not supported; session logs are available only for blocked sessions. Supported
DNS Dashboards, Insights, and Logs: Analyze your traffic information using customizable dashboards, interactive charts, and real-time logs generated with Full Logging for traffic that is allowed or blocked. Supported Supported
Related Articles
About Firewall Configuring Firewall PoliciesEnabling the Firewall for LocationsFirewall HTTP Tunnel ConnectivityConfiguring Custom PortsZIA & Application Layer Gateway Enabled Applications