Views:

Prepare your environment to use Internet Access and AI Service Access with Secure Access Modules or internet proxies.

Zero Trust Secure Access Internet Access requires that you set up your environment before creating rules that control user and device access.
The following lists out the high-level overview of the steps involved in setting up your Zero Trust Internet Access environment.
  1. Choose how your end users and devices send traffic to the Internet Access Gateway.
    • Deploy the Secure Access Module to secure end user access through managed devices.
      Note
      Note
      Internet Access authenticates users by requiring users to sign in to the Secure Access Module before forwarding internet traffic to the Internet Access Gateway.
    • Configure PAC files to use for traffic forwarding.
      Note
      Note
      Internet Access authenticates users by requiring users to sign in on a page that displays when they open a website in a browser.