Faisal Piliang Posted 29 May 2023 10:57
  

Hi,

Zero Trust Network Access (ZTNA), covering the followingsolutions:


ZTNA access proxy

HTTPS and TCP access proxy solution and architecture

Applies to both remote access and internal access to the internal network

No persistent connection (such as VPN) is necessary


ZTNA secure access

Remote users continue to access the internal network by using VPN, with additional layers of ZTNA deviceidentity and ZTNA posture checking provided by rules and tagging

Local users access the internal network through local access policies and ZTNA posture checks


Using a similar scenario and topology example from the ZTNA Architecture Guide, we will walk through deploying thecore components by providing configuration examples to help you migrate from dial-up VPN to ZTNA access proxy forremote users and ZTNA secure access for local users and those that still require VPN.The goal is to reduce the reliance on dial-up VPN by adding device authentication with role-based application access.We will focus on the services located at head quarters (HQ) along with remote users currently using dial-up VPN.Concepts from this deployment guide can be applied to regional offices and even cloud datacenters.

Thanks

I Can Help:

Change

Moderator on This Board

1
131
3

Started Topics

Followers

Follow

18
8
0

Started Topics

Followers

Follow

Board Leaders