Network Controls
Network Architecture
┌──────────────────────────────────────────────────────────────────┐
│ INTERNET │
└──────────────────────────────────────────────────────────────────┘
▲ ▲
│ │
┌───────┴───────┐ ┌───────┴───────┐
│ Egress Proxy │ │ Ingress Proxy │
│ (Outbound) │ │ (Inbound) │
└───────┬───────┘ └───────┬───────┘
│ │
┌───────┴───────────────────────────┴───────┐
│ ZYBER Network │
│ (Private, Isolated) │
└───────────────────┬───────────────────────┘
│
┌───────────────────────┼───────────────────────┐
│ │ │
┌────┴────┐ ┌────┴────┐ ┌────┴────┐
│Workspace│ │Workspace│ │Workspace│
│ VM │ │ VM │ │ VM │
└─────────┘ └─────────┘ └─────────┘
(Isolated) (Isolated) (Isolated)Egress (Outbound) Controls
Default Allowed
Destination
Port
Purpose
Default Blocked
Traffic Type
Reason
IP Masking
Ingress (Inbound) Controls
Temporary Port Exposure
Feature
Behavior
No Persistent Ingress
Inter-Workspace Isolation
Attempt
Result
DNS Security
Resolution Path
DNS Features
Feature
Implementation
Traffic Inspection
What ZYBER Can See
Data
Visible to ZYBER
What ZYBER Cannot See
Rate Limiting
Limit
Value
Firewall Rules
Last updated