<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bandwidth issues with Zscaler clients behind FTD1120 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369497#M1124450</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/79287"&gt;@Michael Bartholomæussen&lt;/a&gt;&amp;nbsp;hi, is there any OS version or rule difference between your LAB test and Production network? if you try to match with the same or latest OS in firewall in production.&lt;/P&gt;
&lt;P&gt;additionally, check the route path from your locations to zscaler. If your policy set to select auto Zscaler DC, depends your public IP you may redirect to different DC. which may give different results based on the routing path.&lt;/P&gt;</description>
    <pubDate>Thu, 12 Feb 2026 09:29:01 GMT</pubDate>
    <dc:creator>Kasun Bandara</dc:creator>
    <dc:date>2026-02-12T09:29:01Z</dc:date>
    <item>
      <title>Bandwidth issues with Zscaler clients behind FTD1120</title>
      <link>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369320#M1124435</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I'm having a bit of a oddity with our Zscaler clients and download speed from our local office.&lt;/P&gt;&lt;P&gt;Clients have Zscaler Client Connector enabled with ZPA and ZIA. Download from public sites are seeing horrible download speeds, when they sit behind our firewall. The DIA is 1Gig for the users.&lt;/P&gt;&lt;P&gt;Client download speeds vary from 1-5MB/s behind the firewall, and bypassing the firewall (a client gets an IP in the public range), download speed are a steady 20 - 25MB/s.&lt;/P&gt;&lt;P&gt;Clients on our local network are running tunnel v1, meaning that they'll use TCP for transport. They see the network as trusted due to DNS reachability.&lt;BR /&gt;If they are connected to our guest VLAN, they move to tunnel v2 as they are not able to reach their defined DNS record. (Similar to secure client) For v2 client, transport is DTLS, so UDP&lt;/P&gt;&lt;P&gt;v1 or v2 clients on the internal network experience the same download performance.&lt;/P&gt;&lt;P&gt;I've tried to configure fastpath for the internal clients and in the logs in the FMC, I see that traffic to Zscaler is Fastpath!&lt;/P&gt;&lt;P&gt;I would have guessed that the firewall could have discarded UDP traffic (it shouldn't) due to some hidden-secret setting, but with the TCP traffic, it's not the case. A capture on the firewall, between the client and zscaler, shows a steady TCP stream with minor TCP flags - at least not in a magnitude that would slice download speeds down by 4-5.&lt;/P&gt;&lt;P&gt;The firewall config is a pair of FTD1120 in HA, managed by FMC&lt;/P&gt;&lt;P&gt;Any thoughts or ideas....?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 12:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369320#M1124435</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2026-02-11T12:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: Bandwidth issues with Zscaler clients behind FTD1120</title>
      <link>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369327#M1124436</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/79287"&gt;@Michael Bartholomæussen&lt;/a&gt;&amp;nbsp;hi, are you getting same speed issue for zscaler tunnel v1 and v2 when it behind the FW?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 13:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369327#M1124436</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2026-02-11T13:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: Bandwidth issues with Zscaler clients behind FTD1120</title>
      <link>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369495#M1124449</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/182793"&gt;@Kasun Bandara&lt;/a&gt;&amp;nbsp;Yes, the speed is almost 1:1.&lt;/P&gt;&lt;P&gt;I did a test on our Lab firewalls, a pair of 1010 with our ISP. Here I don't see the issue.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 09:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369495#M1124449</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2026-02-12T09:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: Bandwidth issues with Zscaler clients behind FTD1120</title>
      <link>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369497#M1124450</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/79287"&gt;@Michael Bartholomæussen&lt;/a&gt;&amp;nbsp;hi, is there any OS version or rule difference between your LAB test and Production network? if you try to match with the same or latest OS in firewall in production.&lt;/P&gt;
&lt;P&gt;additionally, check the route path from your locations to zscaler. If your policy set to select auto Zscaler DC, depends your public IP you may redirect to different DC. which may give different results based on the routing path.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 09:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369497#M1124450</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2026-02-12T09:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Bandwidth issues with Zscaler clients behind FTD1120</title>
      <link>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369500#M1124452</link>
      <description>&lt;P&gt;Both in our Lab and Prod we connect to the same ZS DC, CPH02, route paths are the same. There are differences in rules, but it very generic ACEs as they were lifted from an ASA on the FTD a couple of years ago. No IDS/IPS on the prod firewall for egress traffic.&lt;/P&gt;&lt;P&gt;OS versions are the same.&lt;/P&gt;&lt;P&gt;I'm beginning to suspect packet defrag on the firewall or maybe the client. To my knowledge ZCC does PMTUD, but perhaps it's not working as expected?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 09:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5369500#M1124452</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2026-02-12T09:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: Bandwidth issues with Zscaler clients behind FTD1120</title>
      <link>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5370551#M1124481</link>
      <description>&lt;P&gt;With the latest testing on the firewall, I've configured our ISP used for backup traffic as an additional outside zone. With PBR via the secondary ISP, I've tested ZS from a single client. The download speed via the secondary ISP is performing just as well as in our lab and test firewall. To test throughput via the secondary ISP, a new NAT and ACE was configured, together with the routing and PBR.&lt;/P&gt;&lt;P&gt;With this it leads me to believe that some programming in hardware have gone wrong.&lt;/P&gt;&lt;P&gt;For a client on the "bad" ISP, i did a trace (system support trace), and captured the logon to ZS and a download. No errors in the trace. It does identify traffic as Office, Teams, Azure Auth, Microsoft, Zscaler, for the same src - dst. We're not using application inspection on ingress/egress public traffic, so i don't think this matters.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 07:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5370551#M1124481</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2026-02-17T07:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: Bandwidth issues with Zscaler clients behind FTD1120</title>
      <link>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5370562#M1124482</link>
      <description>&lt;P&gt;Looks for me -&amp;nbsp;Path MTU (Maximum Transmission Unit) Discovery (PMTUD) failure&amp;nbsp;or fragmentation issues on the Cisco FTD&lt;/P&gt;
&lt;P&gt;, as far as I know -&amp;nbsp;&lt;SPAN&gt;Zscaler Client Connector (ZCC) wraps traffic in its own tunnel (Tunnel v1 uses HTTP CONNECT/TCP, Tunnel v2 uses DTLS/UDP), it adds overhead.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;try adjusting the&amp;nbsp;&amp;nbsp;MTU&amp;nbsp;to a lower value, such as&amp;nbsp;1370&amp;nbsp;or&amp;nbsp;1400&amp;nbsp;(default is often 1500)&lt;/P&gt;
&lt;P&gt;Try TLS, only see if that helps here.&lt;/P&gt;
&lt;P&gt;Even though the fast path enables you to make changes for ICMP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/770/management-center-device-config-77/advanced-access-prefilter.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/770/management-center-device-config-77/advanced-access-prefilter.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;also refer zscaler path optimisation :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://help.zscaler.com/zia/determining-the-optimal-mtu-for-gre-or-ipsec-tunnels" target="_blank"&gt;https://help.zscaler.com/zia/determining-the-optimal-mtu-for-gre-or-ipsec-tunnels&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;if possible bypass the firewall and test is this speed are ok ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 08:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5370562#M1124482</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2026-02-17T08:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: Bandwidth issues with Zscaler clients behind FTD1120</title>
      <link>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5370569#M1124483</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/79287"&gt;@Michael Bartholomæussen&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;If you suspect the FW drops the packets, capture the packets before and after the FW.&lt;/P&gt;
&lt;P&gt;Choose a file to download, not to big, not to small.&lt;BR /&gt;Check what is the Zscaler IP.&lt;BR /&gt;Capture the traffic between the PC and the ZS - on FTD inside and primary ISP (here FTD outside IP -&amp;gt; ZS IP).&lt;BR /&gt;Switch PBR.&lt;BR /&gt;Capture the traffic between the PC and the ZS - on FTD inside and backup ISP(here FTD outside backup IP -&amp;gt; ZS IP).&lt;BR /&gt;&lt;BR /&gt;If there is a difference in throughput, there must be a difference seen in the captures.&lt;BR /&gt;You need sync the inside to outside captures, to make sure you are looking at the same TCP flow. You can use timestamps to find the relevant tcp source ports. You can also find the source ports numbers from the commands taken during the transfer:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;show conn long detail address &amp;lt;PC IP&amp;gt; address &amp;lt;ZS IP&amp;gt;&lt;BR /&gt;show xlate local &amp;lt;PC IP&amp;gt;&lt;/PRE&gt;
&lt;P&gt;- Filter the captures for the relevant TCP ports.&lt;BR /&gt;- Compare inside and outside captures for number of packets. The number of captured packets should be the same.&lt;BR /&gt;- Compare the TCP handshake for primary and backup - MSS advertised, round trip time.&lt;BR /&gt;- Compare the TCP statistics in Wireshark - throughput, TCP receive window size.&lt;/P&gt;
&lt;P&gt;Cisco FW TAC can help you with the analysis of the TCP packets flow through the FW - from a through the box TCP flow perspective.&lt;BR /&gt;If you are not able to find anything from the FW perspective, then ask ZS support for help with tshooting from client perspective.&lt;BR /&gt;&lt;BR /&gt;I don't like troubleshooting throughput, but I hope it helps!&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 08:34:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bandwidth-issues-with-zscaler-clients-behind-ftd1120/m-p/5370569#M1124483</guid>
      <dc:creator>mgrzesia</dc:creator>
      <dc:date>2026-02-17T08:34:09Z</dc:date>
    </item>
  </channel>
</rss>

