Network Helpdesk

Forwarding Control Rule

Overview

Zscaler Internet Access (ZIA) control rules apply uniformly to traffic regardless of how it is forwarded—whether through the Zscaler Client Connector (ZCC) or via GRE/IPsec tunnels from known locations.


Scope of Control Rules

Control rules are evaluated after traffic reaches ZIA. This means:

  • They do not influence the initial forwarding method (ZCC vs GRE/IPsec).

  • They apply equally to all traffic that matches the defined rule conditions.

  • They determine how traffic is handled and egressed from the ZIA cloud.


Traffic Flow Clarification

  1. Traffic is forwarded to ZIA via:

    • ZCC (endpoint-based forwarding), or

    • GRE/IPsec tunnel (site-based forwarding)

  2. Once inside ZIA:

    • Control rules are evaluated

    • Matching traffic is processed based on configured actions (e.g., GeoIP, Dedicated IP, or Direct)


GeoIP Example

If a control rule is configured with a GeoIP setting for a destination such as www.cnn.com:

  • Any request matching this rule—regardless of whether it originates from ZCC or GRE/IPsec—will:

    • Be routed through ZIA

    • Egress using the specified GeoIP location (country-specific IP address)


Key Takeaways

  • Control rules are agnostic to traffic forwarding method

  • They operate post-ingress within ZIA

  • Their primary function is to control egress behavior, not ingress path selection


Conclusion

Forwarding control rules in ZIA provide consistent policy enforcement across both user-based and location-based traffic. This ensures predictable and centralized control of outbound traffic behavior, regardless of how traffic enters the Zscaler cloud.