Hello Raghav,
Since a publicly hosted website is already available through a web browser, what would you be trying to achieve by sending this traffic through ZPA? Since you do not own the public DNS for “xyz.technociate[.]in”, it will not work through the public internet anyways.
At most you would be able to do so only on endpoints where you control the DNS records, but again what would be the purpose?
With Zscaler Client Connector you can send the request through ZIA and use Source IP Anchoring to forward through ZPA to give you the unique Source IP. Or you can use Zscaler Client Connector and advertise the application directly through ZPA.
However - I’d question what you’re looking to achieve. If the website is source IP anchored, why not simply enable authentication on the website for any IP which isn’t defined. That way you get what you’re looking for.
You could use ZPA Browser Based Acces - however you would need to do some form of URL rewrite. i.e. Application xyz.technociate.in is public website. Create a ZPA application called abc.technociate.in as browser-based application, with public CNAME resolving to Zscaler BBA. You’d create a static Server definition for xyz.technociate.in and associate with servergroup, and appropriate connector group which provides the source IP anchor.
Flow would be-
Client to abc.technociate.in
ZPA BBA Authenticates user
abc.technociate.in forwarded through Connector A
Connector A resolves xyz.technociate.in.
Connector A forwards abc.technociate.in to xyz.technociate.in
xyz.technociate.in uses source IP of Connector A to allow access
Points to note
As far as the webbrowser is concerned, the user is accessing abc.technociate.in
Because of #1 the HOST header is abc.technociate.in and the SSL SNI is abc.technociate.in
ZPA is essentially performing a NAT of abc.technociate.in to xyz.technociate.in, after the authentication
The webserver will see the HOST header of abc.technociate.in and an SSL SNI of abc.technociate.in
ZPA would need to disable SSL verification for the website because of #4
The webserver, because of #4, would need to also accept HOST headers of abc.technociate.in, or simply serve xyz.technociate.in to a request of abc.technociate.in
Basically - ZPA is NOT a ReverseProxy for this content. It’s a NAT/Forwarder essentially for these websites.
“You’d create a static Server definition for xyz.technociate.in and associate with servergroup, and appropriate connector group which provides the source IP anchor”
Create a Server (which is a STATIC mapping, rather than allowing the Connector to perform the DYNAMIC server discover).
Map this server to the servergroup, which maps to the App Connector you’ll user for the source IP anchoring.