Determine whether to use an installed module or proxy file to direct end user internet traffic to the Internet Access Gateway.
Zero Trust Secure Access Internet Access provides you the option of using an installed module on end-user devices or proxy forwarding to transfer internet traffic to your Internet Access Gateway, which takes actions based on your Internet Access rules.
Access Type |
Description |
Benefits |
---|---|---|
Client access (Recommended) |
Installed on end-user devices and integrated with your IAM solution, the module transfers connection attempts to the Internet Access Gateway that enforces Internet Access Control rules |
|
Traffic forwarding |
Using PAC files, proxy chaining, or port forwarding forwards your end-user traffic to the Internet Access Gateway that enforces Internet Access Control rules |
|