openssl pkcs12 -in certs/user1.p12 -noout -info
openssl pkcs12 -in certs/user1.p12 -noout -info
Client to Client communication in Zscaler Private Access
Validating a client hostname allows you to enable client-based remote assistance. To enable remote assistance, a regular expression of allowed hostnames is configured per tenant. This regular expression controls the targets to which the Zscaler Client Connector allows the client-to-client remote access traffic to be sent.
If an application configured for Privileged Remote Access (PRA) matches a valid client hostname configured for client-based remote assistance, and the user’s device is also configured for client-based remote assistance, then PRA is not supported.
Prior to enabling remote assistance, the following prerequisites must be met:
•Devices must be domain-joined Windows devices.
•Devices must be running Client Connector version 3.7 or above.
Enable Client hostname validation
1.Go to Administration
2.Select Application segments –
3.Click
4.Choose client hostname validation
5.Type the regular expression “ .*\.itzecurity\.com” or “ .*.itzecurity.com”
6.Click save
Once client hostname enabled , ZCC PA client will changed from IP address to hostname.
Note : Machine tunnel has to enable if the remote desktop access with another account.
Internal Error Please contact Administrator (3005)
This error used to see when deploy ZCC con user machines. In most cases this issue was not solved with retry, connect from another internet, and restart the machine.
This seems a WMI Error.
Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems. WMI provides users with information about the status of local or remote computer systems.
Put below script into a *.bat file and run it as Administrator. OR check with local IT and do the WMI cleanup.
-------------------------------------------------------------------------
@echo off
sc config winmgmt start= disabled
net stop winmgmt /y
%systemdrive%
cd %windir%\system32\wbem
for /f %%s in ('dir /b *.dll') do regsvr32 /s %%s
wmiprvse /regserver
winmgmt /regserver
sc config winmgmt start= auto
net start winmgmt
for /f %%s in ('dir /s /b *.mof *.mfl') do mofcomp %%s
----------------------------------------------------------------------------------------------------
After executing the WMI cleanup script user were able to connect successfully.