easy-accordion-free
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114zoho-flow
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114wordpress-seo
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114Post Content\u00a0\u00a0<\/p>\n
\u200b<\/p>\n
Zscaler Cloud Connector is a VM-based solution built to forward traffic from cloud-based workloads to public and\/or private destinations using the Zscaler cloud. As such, it needs to be able to initiate traffic to Zscaler Service Edges, which requires public IP addresses (more detailed information on Cloud Connector communication can be found at https:\/\/help.zscaler.com\/cloud-branch-connector\/networking-flows-cloud-connector<\/a>).\u00a0<\/p>\n In general, Zscaler recommends setting up Cloud Connector with a NAT Gateway as it solves a number of required functions:<\/p>\n It assigns public IP addresses to all interfaces for outbound traffic \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Diagram: recommended Cloud Connector setup with NAT-GW<\/em><\/p>\n However, NAT Gateways can introduce significant additional costs, especially when combined with high data throughput. At the same time, Cloud Connectors are designed to be exposed to the internet and only require outbound internet access, which makes them less of a target and, in turn, non-reliant on the NAT Gateway for security. Moreover, since Cloud Connectors act as the default forwarding function, this means that internal workloads don\u2019t need a NAT Gateway either.\u00a0<\/p>\n This document describes a Cloud Connector setup that replaces the NAT Gateway functionality where it makes sense, while still maintaining the same security considerations.<\/p>\n \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Diagram: alternative Cloud Connector setup without NAT-GW<\/em><\/p>\n Note that the main article describes setup and considerations; a few configuration examples have been added at the bottom of this document.<\/p>\n Setting up public IP addresses to the CC interfaces<\/strong><\/p>\n The first thing to do is to assign public IP addresses to these interfaces. Note that (as the NAT Gateway already implied) this doesn\u2019t have to be a fixed address, as long as it\u2019s consistent during the Cloud Connector\u2019s uptime.\u00a0<\/p>\n In Azure,<\/strong> you link public IP addresses to the Cloud Connector interfaces. First, ensure there is no NAT Gateway associated with the subnet (or remove it when there is). Then go into the Cloud Connector VM, select the Network Interface, select IP Configuration, and toggle the Public IP address settings to \u201cAssociate\u201d. Do this for all interfaces.<\/p>\n In AWS,<\/strong> you need to place the Cloud Connector in a public subnet which will assign one public IP address to it, and assign Elastic IP addresses to all other interfaces.\u00a0<\/p>\n When using Terraform, this can be achieved by first creating an aws_eip resource<\/em>, then associating it to the Cloud Connector interface-ids through aws_eip_association<\/em><\/p>\n When using CloudFormation, you must assign a public subnet when creating the stack. This will automatically assign one Public IP address to the instance and, as such, to one of the Interfaces. Allocate an Elastic IP address and, once the Cloud Connector EC2 instance is created, associate it with another interface. Repeat until all Cloud Connector interfaces have a public IP association.\u00a0<\/p>\n
\n\tIt prevents unsolicited inbound connections (from the internet)
\n\tIt allows for the use of private IP space within the cloud, making for an easier local routing setup<\/p>\n