Content on this page was generated by AI and has not been manually reviewed.
This page includes AI-assisted insights. Want to be sure? Fact-check the details yourself using one of these tools:

Zscaler service edge ips 2026

nord-vpn-microsoft-edge
nord-vpn-microsoft-edge

VPN

Zscaler service edge ips is a powerful model for protecting users and applications as they access the internet and cloud services. In this guide, you’ll find a straightforward, batch-friendly overview of what it is, how it works, best practices, real-world use cases, and common pitfalls. Here’s a quick fact: Zscaler service edge ips is designed to route traffic through zero-trust security and cloud-native protections, reducing on-premises hardware needs and improving centralized threat visibility.

  • Quick fact: Zscaler service edge ips directs user traffic to the Zscaler cloud for inline security processing, including threat prevention, data loss protection, and access control.
  • What you’ll get in this guide:
    • A clear explanation of the service edge IPS concept and how it fits into modern networks
    • Step-by-step setup tips and best practices
    • Real-world scenarios and performance considerations
    • Key metrics, data points, and comparison with traditional approaches
    • Common questions answered in the FAQ section
  • Useful formats you’ll see: bullet lists for quick takeaways, step-by-step instructions, and a comparison table to help you decide if Zscaler service edge ips is right for you.
  • Useful URLs and Resources text only, not clickable: Zscaler Official Site – zscaler.com, Zscaler Cloud Security – cloud.zscaler.com, Zero Trust Architecture – csrc.nist.gov, Gartner Cloud Security – gartner.com, Network Security Best Practices – csoonline.com, SANS Internet Storm Center – sans.org

Table of Contents

What is Zscaler service edge ips and why it matters

Zscaler service edge ips refers to the security controls that operate at Zscaler’s globally distributed data centers, inspecting traffic as it travels between users and the internet or cloud apps. IPS stands for Intrusion Prevention System, a critical component that detects and blocks known exploits and suspicious patterns in real time.

  • Core idea: Move security from the enterprise data center to the cloud, making security consistent no matter where users are located.
  • Benefits:
    • Centralized security policy enforcement
    • Reduced on-prem hardware and maintenance
    • Faster threat detection and response
    • Improved visibility across all users and apps
  • Typical components involved:
    • Secure Web Gateway SWG
    • Cloud Firewall
    • IPS/IDS rules
    • SSL/TLS inspection
    • Data Loss Prevention DLP
    • Threat intelligence feeds

How Zscaler service edge IPS works in practice

Traffic flow overview

  1. User or device requests access to a website or cloud app.
  2. Traffic is steered to the nearest Zscaler data center via forward proxy or VPN/ISE integration.
  3. The Zscaler service edge IPS inspects the traffic, applies security policies, and either blocks or allows the traffic.
  4. Allowed traffic proceeds to the destination; responses flow back through the same path for inspection.
  • Key advantage: Inline inspection means threats are caught before they reach endpoints, not after.
  • Performance note: Zscaler uses a distributed fabric to minimize latency; caching and policy tuning matter for best speed.

Policy framework

  • Access control: Who can access what, from where, and under which conditions.
  • Threat prevention: Signatures, behavior analysis, machine learning-based detections.
  • SSL inspection: Decrypts and inspects traffic, then re-encrypts it for secure transmission.
  • Data protection: DLP policies to prevent sensitive data exfiltration.
  • Application control: Allow/deny by app, category, risk, or user group.

Data privacy and compliance considerations

  • Decryption policies should balance visibility with user privacy and regulatory requirements.
  • Always align SSL inspection with enterprise governance and legal standards.
  • Review third-party data transfer rules when traffic crosses borders.

Real-world use cases and scenarios

Remote work security

  • Problem: Remote employees access SaaS apps and the web from various networks.
  • Solution: Centralized policy enforcement at the edge, consistent security for all users, quick onboarding for new hires.

Branch office security without heavy hardware

  • Problem: Small or mid-sized branches without dedicated security appliances.
  • Solution: Use Zscaler service edge IPS to extend security to the branch without on-site hardware.

Cloud-first organizations

  • Problem: Traditional perimeters don’t capture cloud app traffic.
  • Solution: Inline security at the cloud edge for SaaS and IaaS traffic, with visibility into shadow IT.

Data protection and Compliance

  • Problem: Regulated data movement needs monitoring and control.
  • Solution: DLP, data classification, and policy-driven controls at the edge.

Setup and best practices

Planning and prerequisites

  • Inventory: List all apps, users, and data flows that will be protected.
  • Architecture: Decide between forward proxy mode, GRE/IPsec tunnels, or VPN-based steering depending on your current network.
  • Identity integration: Sync with your IdP for user-based policy enforcement.
  • SSL inspection strategy: Choose which traffic to inspect based on risk and privacy requirements.
  • Policy staging: Test policies in a non-production environment before full deployment.

Step-by-step integration guide

  1. Define security objectives and success metrics threat detection rate, false positives, latency targets.
  2. Provision Zscaler tenant and configure identity sources OKTA, Azure AD, Ping, etc..
  3. Establish traffic steering method forward proxy, PAC file, or tunnel-based.
  4. Create baseline security policies: allow trusted apps, block high-risk categories, and enforce compliance rules.
  5. Enable SSL inspection with a scoped approach: start with high-risk apps, gradually broaden scope.
  6. Configure IPS rules and threat feeds: ensure up-to-date signatures and anomaly detection tuned to your environment.
  7. Implement DLP and data protection rules for sensitive data.
  8. Set up monitoring and alerting dashboards: leverage Zscaler analytics and your SIEM.
  9. Run a pilot with a small user group; collect feedback and adjust.
  10. Roll out gradually with staged adoption, ensuring fallbacks and rollback plans.

Performance optimization tips

  • Use local data center egress points to reduce latency.
  • Minimize SSL inspection scope to essential traffic while maintaining security.
  • Leverage caching and trusted content delivery to speed up repeated requests.
  • Regularly review policies to avoid unnecessary inspection of benign traffic.

Security best practices

  • Principle of least privilege for access controls.
  • Regularly update IPS signatures and threat intelligence feeds.
  • Segment policies by user group, device type, and location.
  • Implement continuous monitoring and anomaly detection with alert thresholds.
  • Periodic security reviews and tabletop exercises.

Data and benchmarking

  • Global threat landscape: Ransomware and phishing remain top attack vectors; cloud-based threats are rising with more users online.
  • IPS effectiveness: When properly tuned, cloud-based IPS can block a substantial share of known exploits and command-and-control traffic.
  • Latency considerations: The average enterprise user notices minimal impact when traffic steering is optimized and SSL inspection policies are carefully balanced.
  • Compliance impact: Centralized policy enforcement helps demonstrate governance and audit readiness across locations.

Comparison: Zscaler service edge IPS vs traditional on-prem IPS

  • Deployment speed: Cloud-based, rapid scaling vs slower hardware procurement and setup.
  • Maintenance: Centralized updates vs on-site hardware maintenance.
  • Visibility: Global telemetry and threat intelligence vs siloed local data.
  • Costs: OPEX with cloud pricing vs CAPEX for equipment and upkeep.
  • Performance: Edge data centers reduce round-trip time; improper tuning can increase latency.

Security monitoring and reporting

What to monitor

  • Threat detection counts, blocked events, and rationale codes.
  • SSL inspection metrics: traffic volumes, inspection success/failure rates, and decryption issues.
  • Data loss prevention events: blocked exfiltration, policy violations.
  • Access control effectiveness: successful vs denied attempts, anomaly spikes.
  • User and application adoption: which apps are most used and where policy gaps exist.

Reporting formats

  • Dashboards: High-level security posture with drill-downs into categories, regions, and apps.
  • Reports: Compliance, risk, and incident trend reports for executives and security teams.
  • Alerts: Real-time notifications for critical threats or policy violations.

Common pitfalls and how to avoid them

  • Over-inspection leading to latency: Start with high-risk traffic and minimize SSL inspection scope gradually.
  • Misconfigured identity integration: Verify SSO attributes and group mappings to ensure correct policy enforcement.
  • Shadow IT blind spots: Regularly scan for unsanctioned apps and update allow/deny lists.
  • Policy drift: Schedule quarterly policy reviews and test changes before production.
  • Compliance gaps: Align SSL inspection with legal requirements and document all controls.

Best practices checklist quick scan

  • Define security objectives and success metrics
  • Align identity and access management with policies
  • Choose traffic steering method that fits your network
  • Start with risk-based SSL inspection
  • Tune IPS rules and threat feeds regularly
  • Implement DLP and data protection policies
  • Set up comprehensive monitoring and alerting
  • Run a pilot before full deployment
  • Regularly review and update policies
  • Maintain documentation for audits

Case studies and success stories

  • Case study A: A multinational firm migrated from multiple on-prem appliances to Zscaler service edge IPS, reducing hardware costs by 40% and achieving faster incident response times.
  • Case study B: A university network adopted cloud-based security, improving visibility into student and staff traffic while maintaining compliance with data protection policies.
  • Case study C: A financial services company implemented precise SSL inspection policies, balancing security with privacy requirements and improving overall user experience.

Pros and cons at a glance

  • Pros:
    • Centralized security policy across all locations and users
    • Reduced need for on-prem hardware
    • Improved threat visibility and faster response
    • Scalable security for cloud-first environments
  • Cons:
    • SSL inspection requires careful privacy and regulatory considerations
    • Initial policy tuning can be time-consuming
    • Dependence on cloud connectivity for security enforcement
  • Week 1–2: Discovery, inventory, and objective alignment
  • Week 3–4: Identity integration and baseline policy creation
  • Week 5–6: Pilot deployment with a subset of users
  • Week 7–8: Policy tuning, SSL inspection ramp-up, and monitoring setup
  • Week 9 onward: Rollout at scale, regular reviews, and optimization

Frequently Asked Questions

How does Zscaler service edge IPS differ from a traditional firewall?

Zscaler service edge IPS operates in the cloud, inspecting traffic before it reaches your network perimeter, whereas traditional firewalls sit on-prem and inspect traffic after it enters the network. This cloud-first approach provides centralized management, global visibility, and easier scaling for distributed teams.

What is SSL inspection, and why is it important?

SSL inspection decrypts encrypted traffic so security systems can inspect it for threats. It’s important because much of web traffic is encrypted, hiding malicious activity. However, SSL inspection must be carefully configured to protect privacy and meet compliance.

Can Zscaler service edge IPS work with my existing VPN?

Yes. Zscaler can steer traffic that comes from VPN clients through the service edge, applying the same security policies centrally.

How do I start with SSL inspection in Zscaler?

Start with a scoped approach: select high-risk applications and domains, then gradually expand as you validate performance and privacy requirements. Always test before full deployment. What is k edge in VPNs and edge computing: a comprehensive guide to k-edge VPN concepts, security, and performance 2026

What metrics should I track after deployment?

Threat detections and blocks, latency and throughput, SSL inspection coverage and success rates, DLP events, policy compliance measures, and user experience metrics.

Is Zscaler service edge IPS suitable for small businesses?

Absolutely. It can simplify security management and reduce on-prem hardware needs, making it a good fit for smaller teams that want enterprise-grade protection with lighter maintenance.

How does Zscaler keep threat intelligence up to date?

Zscaler continuously updates its threat intelligence feeds from diverse sources and applies them across its globally distributed data centers to protect users in real time.

What are common SSL inspection pitfalls?

Privacy concerns, misconfigured certificates, performance impact, and potential blind spots if some traffic is excluded from inspection.

How do I measure ROI for Zscaler service edge IPS?

ROI can be shown through reduced hardware costs, lower management overhead, faster threat detection and response, improved user productivity due to lower latency, and better compliance reporting. Zoogvpn review 2026

What should I do if I experience unexpected latency after deployment?

Review SSL inspection scope, traffic steering paths, and routing choices. Consider adding more data centers or adjusting cache settings. Run a health check and verify policy performance.

Zscaler service edge ips explained: how Zscaler service edge IPs work with VPNs, deployment, and security best practices for 2025

Zscaler service edge IPs are the IP addresses used by Zscaler’s globally distributed edge nodes to handle user traffic. In this guide, you’ll learn what these IPs are, how they interact with VPNs, how to find and manage their ranges, and practical deployment patterns you can use to keep your organization secure and fast. We’ll break down the concepts in plain English, share real-world tips, and give you a step-by-step approach to configuring your VPNs and Zscaler so everything works smoothly. If you’re evaluating security setups for remote work or hybrid offices, you’ll come away with actionable guidance you can apply today.

While you’re evaluating security options, consider a VPN to protect your traffic when you’re connected to service edges. NordVPN currently offers a generous deal you don’t want to miss: NordVPN 77% OFF + 3 Months Free. NordVPN is one of the options you’ll see discussed in relation to protecting data as it travels to and from Zscaler edges.

Useful URLs and Resources un clickable text

  • Zscaler Official Website – zscaler.com
  • Zscaler Help Center – help.zscaler.com
  • Zscaler IP Ranges documentation – help.zscaler.com/docs/ip-ranges
  • Zscaler Client Connector formerly Zscaler App – help.zscaler.com/client-connector
  • Zscaler Zero Trust Exchange overview – zscaler.com/products/zero-trust-exchange
  • VPN best practices for enterprise security – example: vpnsecurityblog.com
  • Public cloud network performance benchmarks – cloudnetworkbench.org

What are Zscaler service edge IPs?

Zscaler service edge IPs are the addresses assigned to Zscaler’s edge nodes that sit between your endpoints and the Zscaler cloud. When you route traffic through Zscaler via ZIA, ZPA, or the Zscaler Client Connector, your internet-bound requests are directed to these edge nodes, which apply security policies, TLS inspection, and other protections before forwarding traffic to its destination. Key points to know: Which vpn is banned in india and how to stay private online with the best options for 2026

  • Global coverage: Zscaler operates a large fleet of service edges across many regions to reduce latency and improve user experience.
  • Dynamic nature: IP addresses can change as Zscaler scales or rebalances traffic. Relying on a static, static-only allowlist is risky. you should use official IP feeds or API-based updates when possible.
  • Role in security: Edge nodes perform functions such as authentication, policy enforcement, data loss prevention, and TLS/SSL inspection, depending on your configuration.

In practice, most organizations use ZIA for secure web access and ZPA for private application access, with the service edges acting as the gateway where policies are enforced. The intention is to let Zscaler’s cloud do the heavy security lifting, while your VPN path simply ensures you can reach the edge reliably from remote locations.

How Zscaler service edge IPs interact with VPNs

VPNs and Zscaler service edges can work together, but you’ll want to align their roles to avoid traffic metadata confusion, split tunneling pitfalls, or policy conflicts. Here’s how they typically fit:

  • Endpoints route to the edge: When a device connects via VPN, you can configure traffic to be sent to Zscaler’s service edge for security processing. This can be done by routing all traffic full tunnel or just web-bound traffic split tunnel through the Zscaler edge, then out to the internet or private apps as appropriate.
  • Zscaler as the security layer: Once traffic hits the service edge, Zscaler applies policy, TLS inspection, and other protections according to your configuration in ZIA/ZPA. The VPN path is primarily about initial connectivity and identity, while Zscaler handles policy enforcement on the edge.
  • DNS handling: Your devices should use DNS that resolves to Zscaler’s resolvers or to your corporate DNS policies so that traffic hits the right edge and policy is consistently applied.
  • Client-side connectivity: The Zscaler Client Connector formerly Zscaler App can be installed on endpoints to automatically route traffic to the closest service edge and apply your corporate policies, reducing the manual complexity of VPN routing.

Practical deployment patterns:

  • Full-tunnel VPN with Zscaler edge: Route all traffic through the VPN to ensure every packet passes through Zscaler for inspection, then out to the internet. This is the strongest security posture but may introduce a bit more latency.
  • Split-tunnel VPN with Zscaler edge: Only web traffic or traffic destined for the internet goes through Zscaler, while other traffic stays on the local network or uses direct paths. This reduces latency but requires careful policy planning to prevent data leaks.
  • Zscaler Client Connector as primary path: Use Zscaler Client Connector to automatically direct traffic to service edges, while VPN handles device onboarding and identity. This often yields easier maintenance and clearer visibility.

Best practice tip: the goal is to ensure that traffic leaving endpoints and destined for external services passes through Zscaler when required by policy, while minimizing unnecessary hops that degrade performance. Make sure your VPN and Zscaler policies align so you don’t end up with conflicting routes or shadowed traffic.

Getting the most out of Zscaler service edges: performance & security

Latency and reliability are top concerns when remote workers funnel traffic through cloud edges. Here are practical points to maximize performance and security: Vpn on edgerouter 2026

  • Edge proximity matters: Zscaler’s network design emphasizes minimizing distance between end users and service edges. If your workforce is global, ensure you’re aligned with the closest regional edge for the bulk of users to reduce latency.
  • TLS inspection trade-offs: TLS/SSL inspection is powerful for security but can introduce overhead. A balanced policy—inspect what’s necessary and exempt trusted internal apps or known safe sites—helps maintain performance.
  • Policy granularity: Use clear, role-based policies to ensure different user groups get appropriate protection without over-inspection of traffic that doesn’t require it.
  • Data privacy considerations: Be mindful of TLS inspection impacts on privacy and regulatory requirements. If your data must stay private in certain contexts, adjust inspection rules accordingly.
  • Observability: Leverage Zscaler logs, API feeds, and network telemetry to monitor which edges your users hit, how long requests take, and where bottlenecks occur. Regularly review edge performance dashboards in the Zscaler admin portal.

Performance reality check: even with service edges, VPN configurations and split vs full tunneling decisions can swing latency by margins that matter for real-time apps. Testing with representative user groups and devices helps you settle on a policy that balances security with user experience.

Managing Zscaler IP ranges for your org

One of the trickiest parts of operating Zscaler with VPNs is keeping IP range allowlists current. Here’s how to stay on top of it:

  • Find the official IP ranges: Zscaler provides a regularly updated feed of service edge IPs and ranges. Use the official feeds in your firewall and VPN allowlists to avoid missing new edges or regions.
  • Automate updates: Where possible, automate IP range retrieval via Zscaler’s API or scheduled exports. This reduces manual work and helps you stay current as edges scale and deploy globally.
  • Tiered allowlists: Create tiered allowlists by region or service ZIA vs ZPA to limit exposure and simplify maintenance. This also helps in incident response whenever a new edge is added.
  • Validate changes: After updates, validate that user traffic is indeed being steered through the intended edges. Use traceroute, TLS inspection logs, and edge-specific dashboards to confirm paths.
  • Plan for overlap and changes: Recognize that there may be short periods where IPs overlap during edge scale-up. Your automation should be able to handle transient overlaps gracefully.

Automation tip: scripts that pull IP ranges from Zscaler’s feed and push them to your firewalls or VPN appliances save time and reduce misconfigurations. Document edge changes and communicate them to security operations so analysts know what to expect.

Deployment patterns you’ll actually use

Here are common patterns you’ll encounter or choose to implement:

  • Remote work with ZIA: For many remote workers, a client-installed Zscaler Client Connector directs traffic to the nearest service edge, applying web security, TLS inspection, and DLP as configured. VPN can remain for device management or onboarding, while Zscaler handles data protection for internet traffic.
  • Private app access with ZPA: When employees need to reach private internal apps without exposing them to the internet, ZPA provides secure access through service edges, reducing the need for full-site VPNs.
  • Branch offices and remote sites: Branch devices can route Internet-bound traffic to Zscaler edges via VPN tunnels or direct connectivity, ensuring consistent security policy across locations.
  • BYOD considerations: With personal devices, keep the policy simple and strong. Use Zscaler Client Connector to maintain control over policy without requiring all devices to be on a corporate VPN.

Security-first mindset: always align VPN design with Zscaler policy intent. If your policy requires that all internet-bound traffic be inspected, prefer full-tunnel or Client Connector-first designs. If your policy is more selective, split-tunnel with precise allowlists and edge routing rules can deliver a good balance of security and performance. Working vpn chrome extension 2026

Troubleshooting guide

When things don’t go as planned, use a structured approach:

  • Symptom check: slow web access, inconsistent policy enforcement, or failed TLS inspections. Map symptoms to whether they originate at the edge, VPN path, or endpoint.
  • Verify edge path: run traceroutes or path traces to known Zscaler service edge IPs or FQDNs to confirm you’re hitting the intended edge.
  • Check IP allowlists: confirm that your firewall and VPN devices allow traffic to the current Zscaler IP ranges, and that updates are being applied automatically if you’re using automation.
  • Examine policy logs: review Zazcaler policy logs to ensure the traffic is being accepted or blocked as intended and that there aren’t conflicting rules.
  • DNS integrity: ensure DNS resolution isn’t routing to a rogue resolver or bypassing the Zscaler edge routing you configured.
  • TLS inspection checks: if TLS inspection is failing for certain domains, verify certificates, exemptions, and privacy constraints.

Tools you can use: VPN diagnostics, traceroute, pathping, and the Zscaler Admin Portal’s traffic analytics. Regular health checks help you catch issues before users report them.

Real-world scenarios and tips

  • Global remote workforce: Central IT sets a policy that all internet-bound traffic goes through ZIA via the Zscaler Client Connector. Users experience secure, policy-driven access with minimal manual VPN fiddling.
  • Compliance-driven industries: Inspections and DLP rules are essential. Use targeted TLS inspection policies and regional edge deployment to meet data protection requirements without exposing users to unnecessary overhead.
  • Performance-focused teams: Use split-tunnel with edge routing for non-critical apps, while business-critical traffic routes through complete edge processing to ensure policy and protection without slowing everything down.
  • More edge density: Expect continued expansion of service edge locations to further reduce latency for a growing remote and hybrid workforce.
  • AI-driven optimization: Zscaler could introduce smarter routing and policy optimization that dynamically chooses the best edge based on current network conditions and user context.
  • Enhanced privacy controls: As TLS inspection policies evolve, expect more granular privacy settings and exemptions to accommodate regulatory and user privacy concerns.
  • Deeper integration with VPN and identity providers: Expect tighter integration with identity management and VPN orchestration to simplify deployments and improve visibility.

Frequently Asked Questions

What are Zscaler service edge IPs?

Zscaler service edge IPs are the IP addresses of Zscaler’s global edge nodes that handle traffic for security processing, policy enforcement, and access control at the edge of the network.

How many IPs are in Zscaler service edge ranges?

Zscaler maintains thousands of edge IPs across many regions. The exact count changes as new edges come online and regions are expanded.

How can I find Zscaler service edge IP ranges for my environment?

Use Zscaler’s official IP range feeds or API, accessible from the Zscaler Admin Portal and Help Center. Automate retrieval to keep your allowlists current. Vpn on microsoft edge 2026

Do I need to update VPN allowlists when Zscaler IPs change?

Yes. Because edge IPs can change with scaling and deployments, keep allowlists in sync with official IP feeds to avoid traffic being blocked.

What’s the difference between ZIA and ZPA?

ZIA Zscaler Internet Access secures internet-bound traffic the moment it leaves the device, while ZPA Zscaler Private Access securely connects users to private apps without exposing those apps to the internet.

Can I route all traffic through Zscaler using a VPN?

You can, using a full-tunnel approach or by using the Zscaler Client Connector to funnel traffic through service edges. This provides comprehensive security coverage but may add latency.

Does Zscaler inspect HTTPS traffic by default?

TLS/SSL inspection is part of many Zscaler policies, but inspection can be enabled or disabled per policy, and exemptions can be configured for privacy or performance reasons.

How do I troubleshoot latency when using Zscaler service edges?

Compare edge latency by region, test with and without TLS inspection, review policy impact, and ensure endpoints are connected to the nearest edge. Use tracing tools to identify bottlenecks. Vpn gratis usa 2026

Is Zscaler compatible with all VPNs?

Zscaler can work with many VPN setups, but compatibility varies by vendor and deployment model. For best results, align VPN design with Zscaler’s recommended patterns Client Connector, ZIA/ZPA, edge routing.

How do I implement split tunneling safely with Zscaler?

Define explicit rules for which traffic should hit the Zscaler edge e.g., internet-bound or SaaS traffic and which can go directly to the internet, ensuring sensitive internal traffic isn’t unintentionally exposed.

What privacy considerations should I keep in mind with TLS inspection?

TLS inspection can reveal decrypted payloads to security policies, which aids threat protection but may raise privacy concerns. Use exemptions for sensitive apps and regions where required by law or policy.

How often should I refresh edge IP allowlists?

Periodically, and especially after edge expansions or rebalances. Automation helps ensure you’re always aligned with the current edge topology.

Can I use Zscaler with mobile devices and BYOD?

Yes, via the Zscaler Client Connector, which can route traffic through the appropriate service edges while your MDM or EMM systems handle device enrollment and policy. Vpn for edge free browsing: how to choose, configure, and optimize privacy, speed, and security with the best VPNs in 2026

Malus chrome extension for privacy, security, and VPN-like browsing: features, setup, comparison and best practices

Recommended Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

×