Cloud Security Services
Cloud Security Service (CSS) is a cloud-hosted security that protects an Enterprise branch and/or data center. The security services include firewalls, URL filtering, and other such services.
In CSS, you can define and configure a cloud security service instance and establish a secure tunnel directly from the Edge to the CSS.
- Simplified configuration.
- Saves link bandwidth costs by offloading non-enterprise traffic to the internet.
- The branch sites are protected from malicious traffic by redirecting the Internet traffic to a cloud security service.
Configure a Cloud Security Service
The Cloud Security Service (CSS) establishes a secure tunnel from an Edge to the cloud security service sites. This ensures secured traffic flow to the cloud security services.
To configure a Cloud Security Service, perform the following steps:
Configure Automatic Tunnels from SD-WAN Edge to Zscaler

Configure Manual Tunnels from SD-WAN Edge to Zscaler

Configure Cloud Security Services for Profiles
- Ensure that you have access permission to configure network services.
- Ensure that your Orchestrator has version 3.3.x or above.
- You should have Cloud security service gateway endpoint IPs and FQDN credentials configured in the third party Cloud security service.
Enable Cloud Security Service (CSS) to establish a secured tunnel from an Edge to cloud security service sites. This enables the secured traffic being redirected to third-party cloud security sites. At the Profile level, VeloCloud SD-WAN and Zscaler integration supports automation of IPsec and GRE tunnels.
When you enable Cloud Security Service and configure the settings in a Profile, the setting is automatically applied to the Edges that are associated with the profile. If required, you can override the configuration for a specific Edge. See Configure Cloud Security Services for Edges.
- Redirect only web traffic to Cloud Security Service
- Redirect all Internet bound traffic to Cloud Security Service
- Redirect traffic based on Business Policy Settings – This option is available only from release 3.3.1. If you choose this option, then the other two options are no longer available.
Configure Cloud Security Services for Edges
When you have assigned a Profile to an Edge, the Edge automatically inherits the Cloud Security Service (CSS) and attributes configured in the Profile. You can override the settings to select a different cloud security provider or modify the attributes for each Edge.
To override the CSS configuration for a specific Edge, perform the following steps:
Manual Zscaler CSS Provider Configuration for Edges
At the Edge level, for a selected manual Zscaler CSS provider, you can override the settings inherited from the profile and can configure additional parameters manually based on the tunneling protocol selected for tunnel establishment.
If you choose to configure an IPsec tunnel manually, apart from the inherited attributes, you must configure a Fully Qualified Domain Name (FQDN) and Pre-Shared Key (PSK) for the IPsec session.

If you choose to configure a GRE tunnel manually, then you must configure GRE tunnel parameters manually for the selected WAN interface to be used as source by the GRE tunnel, by following the steps below.
Automated Zscaler CSS Provider Configuration for Edges
- IPsec/GRE Tunnel Automation
- Zscaler Location/Sub-Location Configuration
Configure Zscaler Gateway Options and Bandwidth Control
To configure Gateway options and Bandwidth controls for the Location and Sub-location, select the Edit button under Gateway Options, in the respective table.

Configure the Gateway options and Bandwidth controls for the Location and Sub-location, as needed, and select Save Changes.
| Option | Description |
|---|---|
| Gateway Options for Location/Sub-Location | |
| Use XFF from Client Request | Enable this option if the location uses proxy chaining to forward traffic to the Zscaler service, and you want the service to discover the client IP address from the X-Forwarded-For (XFF) headers that your on premises proxy server inserts in outbound HTTP requests. The XFF header identifies the client IP address, which can be leveraged by the service to identify the client’s sub location. Using the XFF headers, the service can apply the appropriate sub location policy to the transaction, and if Enable IP Surrogate is turned on for the location or sub-location, the appropriate user policy is applied to the transaction. When the service forwards the traffic to its destination, it will remove the original XFF header and replace it with an XFF header that contains the IP address of the client gateway (the organization’s public IP address), ensuring that an organization's internal IP addresses are never exposed to externally.
Note: This Gateway option is only configurable for Parent location.
|
| Enable Caution | If you have not enabled Authentication, you can enable this feature to display a caution notification to unauthenticated users. |
| Enable AUP | If you have not enabled Authentication, you can enable this feature to display an Acceptable Use Policy (AUP) for unauthenticated traffic and require users to accept it. If you enable this feature:
|
| Enforce Firewall Control | Select to enable the service's firewall control.
Note: Before enabling this option, user must ensure if its Zscaler account has subscription for "Firewall Basic".
|
| Enable IPS Control | If you have enabled Enforce Firewall Control, select this to enable the service's IPS controls.
Note: Before enabling this option, user must ensure if its Zscaler account has subscription for "Firewall Basic" and "Firewall Cloud IPS".
|
| Authentication | Enable to require users from the Location or Sub-location to authenticate to the service. |
| IP Surrogate | If you enabled Authentication, select this option if you want to map users to device IP addresses. |
| Idle Time for Dissociation | If you enabled IP Surrogate, specify how long after a completed transaction, the service retains the IP address-to-user mapping. You can specify the Idle Time for Dissociation in Mins (default), or Hours, or Days.
|
| Surrogate IP for Known Browsers | Enable to use the existing IP address-to-user mapping (acquired from the surrogate IP) to authenticate users sending traffic from known browsers. |
| Refresh Time for re-validation of Surrogacy | If you enabled Surrogate IP for Known Browsers, specify the length of time that the Zscaler service can use IP address-to-user mapping for authenticating users sending traffic from known browsers. After the defined period of time elapses, the service will refresh and revalidate the existing IP-to-user mapping so that it can continue to use the mapping for authenticating users on browsers. You can specify the Refresh Time for re validation of Surrogacy in minutes (default), or hours, or days.
|
| Bandwidth Control Options for Location | |
| Bandwidth Control | Enable to enforce bandwidth controls for the location. If enabled, specify the maximum bandwidth limits for Download (Mbps) and Upload (Mbps). All sub locations will share the bandwidth limits assigned to this location. |
| Download | If you enabled Bandwidth Control, specify the maximum bandwidth limits for Download in Mbps. The allowable range is from 0.1 through 99999. |
| Upload | If you enabled Bandwidth Control, specify the maximum bandwidth limits for Upload in Mbps. The allowable range is from 0.1 through 99999. |
Bandwidth Control Options for Sub-Location (if Bandwidth Control is enabled on Parent Location)
![]() Note: The following bandwidth control options are configurable for sub-location only if you have bandwidth control enabled on the parent location. If the bandwidth control is not enabled on the parent location, then the bandwidth control options for sub-location are the same as location (Bandwidth Control, Download, Upload).
|
|
| Use Location Bandwidth | If you have bandwidth control enabled on the parent location, select this option to enable bandwidth control on the sub-location and use the download and upload maximum bandwidth limits as specified for the parent location. |
| Override | Select this option to enable bandwidth control on the sub-location and then specify the maximum bandwidth limits for Download (Mbps) and Upload (Mbps). This bandwidth is dedicated to the sub-location and not shared with others. |
| Disabled | Select this option to exempt the traffic from any Bandwidth Management policies. Sub-location with this option can only use up to a maximum of available shared bandwidth at any given time. |
- In 4.5.0 release, when a Sub-location is created, Orchestrator automatically saves the "Other" Sub location. In earlier version of Orchestrator, the Zscaler "Other" Sub-location was not saved in Orchestrator. After upgrading Orchestrator to 4.5.0 release, the "Other" Sub-location will be imported automatically only after a new normal (non-Other) Sub-location is created using automation.
- Zscaler Sub-locations cannot have overlapping IP addresses (subnet IP ranges). Attempting to edit (add, update, or delete) multiple Sub-locations with conflicting IP addresses may cause the automation to fail.
- Users cannot update the bandwidth of Location and Sub-location at the same time.
- Sub-locations support Use Location Bandwidth option for bandwidth control when its Parent Location bandwidth control is enabled. When user turns off the Location bandwidth control on a Parent Location, the Orchestrator does not check or update the Sub-location bandwidth control option proactively.
Configure Business Policies with Cloud Security Services
You can create business policies to redirect the traffic to a Cloud Security Service.
For additional information on business policies, see Create Business Policy Rule.
The business policies that you create for a Profile are automatically applied to all the Edges associated with the profile. If required, you can create additional business policies specific to the Edges.
- Navigate to , select an Edge, and select the Business Policy tab.
- Under , select +ADD. The Add Rule dialog box appears.
- Define the rule with Cloud Security Service associated with the Edge.
The Business Policy tab of the Edge displays the policies from the associated Profile along with the policies specific to the Edge.
Monitor Cloud Security Services
You can view the details of Cloud Security Services (CSS) configured for the Enterprise from the MonitorNetwork Services page.
To monitor the Cloud Security Service sites:
You can view the Layer 7 (L7) health check statistics for Cloud Security Service from the menu.
Monitor Cloud Security Services Events
You can view the events related to cloud security services from the Monitor > Events page.
In the SD-WAN service of the Enterprise portal, select .
To view the events related to cloud security service sites, you can use the Search and Filter options. Select the Filter icon and choose to filter either by the Event or by the Message column.

The following table includes the Enterprise events which help track various Edge actions related to CSS deployment, Location and Sub-location automation.
| Events | Description |
|---|---|
| Call made to external API | An API call to some external service has been made. |
| CLOUD_SECURITY_PROVIDER_ADDED | A new CSS provider has been added. |
| CLOUD_SECURITY_PROVIDER_UPDATED | A new CSS provider has been updated. |
| CLOUD_SECURITY_PROVIDER_REMOVED | A CSS provider has been removed. |
| Cloud Security Service site creation enqueued | A CSS site creation task has been enqueued. |
| Cloud Security Service site update enqueued | A CSS site update task has been enqueued. |
| Cloud Security Service site deletion enqueued | A CSS site deletion task has been enqueued. |
| Network Service created | A CSS site has been created. |
| Network Service updated | A CSS site has been updated. |
| Network Service deleted | A CSS site has been deleted. |
| CSS tunnels are up | The CSS paths are UP. The traffic will be routed through CSS based on the Business policy rules configured. |
| All CSS tunnels are down | The CSS paths are DOWN. |
| Edge Non SD-WAN Destination tunnel up | The tunnel is UP for the Edge. |
| Edge Non SD-WAN Destination tunnel down | The tunnel is DOWN for the Edge. |
| Zscaler Location creation enqueued | An Edge action has been enqueued to create a location. |
| Zscaler Location update enqueued | An Edge action has been enqueued to update a location. |
| Zscaler Location deletion enqueued | An Edge action has been enqueued to delete a location. |
| Zscaler Location object created | A Zscaler location object is created. |
| Zscaler Location object updated | A Zscaler location object is updated. |
| Zscaler Location object deleted | A Zscaler location object is deleted. |
| Zscaler Sub Location creation enqueued | An Edge action has been enqueued to create a sub-location. |
| Zscaler Sub Location update enqueued | An Edge action has been enqueued to update a sub-location. |
| Zscaler Sub Location deletion enqueued | An Edge action has been enqueued to delete a sub-location. |
| Zscaler Sub Location object created | A Zscaler Sub-location object is created. |
| Zscaler Sub Location object updated | A Zscaler Sub-location object is updated. |
| Zscaler Sub Location object deleted | A Zscaler Sub-location object is deleted. |













