Internet Access - Client Access vs Traffic Forwarding

Determine whether to use an installed module or proxy file to direct end user internet traffic to the Internet Access Gateway.

Zero Trust Secure Access Internet Access provides you the option of using an installed module on end-user devices or proxy forwarding to transfer internet traffic to your Internet Access Gateway, which takes actions based on your Internet Access rules.

Access Type

Description

Benefits

Client access

(Recommended)

Installed on end-user devices and integrated with your IAM solution, the module transfers connection attempts to the Internet Access Gateway that enforces Internet Access Control rules

  • Also manages Private Access connections to internal corporate resources

  • Integrates completely with your IAM allowing seamless SSO with minimal user interaction

  • Provides device-based access rules ensuring authorization on both the user and device levels

  • Does not require specific browser usage

Traffic forwarding

Using PAC files, proxy chaining, or port forwarding forwards your end-user traffic to the Internet Access Gateway that enforces Internet Access Control rules

  • Agent-less solution

  • Supported by most major browsers