Define your corporate networks to identify your internal users and apply more granular Secure Access Rules.
The Internet Access Gateway uses your corporate network locations to help identify your internal users' internet traffic. You can use these locations to create specific HTTPS inspection and Secure Access Rules for branch offices or departments, and define schedules based on location.
Customers using a proxy-based solution instead of the Secure Access Module are strongly recommended to configure corporate network locations to ensure that Zero Trust Secure Access Internet Access Gateway can properly identify your users' internet traffic.
Private IP addresses are not supported.
Zero Trust Secure Access Internet Access verifies each location added to the list. If the location is not verified within 7 days, Internet Access automatically removes the location from the list.