Cisco

How search works in the Security Help Center:

  • The most relevant topics (based on weighting and matching to search terms) are listed first in the search results by default
  • Common Boolean operations are supported
  • Use double quotes to find a phrase (“specific phrase”)
  • Apply facets on the Search Results page to further scope search results by category
Login

Log In to the Cisco Security Documentation Portal

Search

Universal Zero Trust Network Access Solution Guide

  • Overview of Universal Zero Trust Network Access
    • Universal Zero Trust Network Access
      • Components of Universal ZTNA Solution
      • Benefits of Universal ZTNA
      • Prerequisites for Universal ZTNA
  • Overview of Universal ZTNA Configuration
    • Configuration Workflow for Universal ZTNA Solution
  • Deployment of Universal ZTNA Solution
    • Outcome 1: Optimal Path for User Traffic
      • Data Flow for an On-Premises User
      • Data Flow for a Remote User
      • Data Flow for a Branch User
      • Configuration Workflow for Outcome 1
    • Outcome 2: Private Inspection for Sensitive Applications
      • Data Flow to a Sensitive Application from a Remote User
      • Configuration Workflow for Outcome 2
    • Monitoring Events
  • Troubleshooting Universal ZTNA
    • Issue: Private Resource not Reachable
    • Issue: universal ZTNA-Enabled Threat Defense not Visible in Secure Access
    • Issue: Configuration Deployment to Device Fails
  • Related Documentation
    • Related Documentation

Deployment of Universal ZTNA Solution Outcome 2: Private Inspection for Sensitive Applications Data Flow to a Sensitive Application from a Remote User

Last updated: Aug 18, 2025

Previous topic Outcome 2: Private Inspection for Sensitive Applications Next topic Configuration Workflow for Outcome 2
© 2025 Cisco System, Inc.
Privacy policyTerms of Service