Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?
A.
The Cloud Firewall includes Deep Packet Inspection, which detects protocol evasions and sends the traffic to the respective engines for inspection and handling.
B.
Zscaler Client Connector will prevent evasion on the endpoint in conjunction with the endpoint operating system’s firewall.
C.
As traffic usually is forwarded from an on-premise firewall, this firewall will handle any evasion and will make sure that the protocols are corrected.
D.
The Cloud Firewall includes an IPS engine, which will detect the evasion techniques and will just block the transactions as it is invalid.
The Cloud Firewall includes Deep Packet Inspection (DPI) capabilities that detect protocol evasion techniques where applications try to communicate over non-standard ports to bypass firewall controls. Once detected, the traffic is sent to the appropriate inspection engines for further handling and mitigation. This ensures that evasive traffic does not bypass security controls.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit