Skip to main content

Netskope products serve the purpose of security AND as tools to troubleshoot with.  Tools that are often overlooked by everyone, including us!

In this article, we are going to cover one of our newest products acquired through the purchase and partnership of Infiot’s Borderless WAN (BWAN).  BWAN is the technology commonly known as Software Defined Wide Area Networking (SD-WAN).  We will answer the questions of:

  1. How does the Netskope Endpoint SD-WAN Client become a tool to be used?
  2. How am I able to use the Netskope Endpoint SD-WAN Client for displaying bypasses in the Netskope Endpoint SD-WAN console?

As a little background information, “Netskope BWAN extends the concept of network segmentation beyond traditional network perimeters, catering to the needs of a modern workforce that operates from varying locations and uses a multitude of devices. Netskope BWAN ensures network segmentation for any device by encapsulating each session in a secure and encrypted tunnel. This segmentation extends to all applications and data, whether hosted in the cloud or on-premises, effectively isolating critical resources from unauthorized access.”  from https://www.netskope.com/blog/empowering-secure-cloud-adoption-a-response-to-the-nsa-and-cisa-cybersecurity-guidelines 

 

How does Netskope Endpoint SD-WAN become a tool to be used?

There are three (3) steps to send traffic to the Netskope SD-WAN console.

  1. Bypass the Netskope Endpoint SD-WAN process/applications in the steering configuration.
  2. Bypass traffic at the Netskope NG-SWG Client level.
  3. Define interesting traffic for the Netskope Endpoint SD-WAN Client.

 

Netskope NG-SWG Client Steering Configuration

In order for the endpoint to process bypasses, bypass exceptions should be handled at the client will need to process them, see pic.

 

Bypassing the Netskope Endpoint SD-WAN AD_4nXc1BCwRWEkPWV72Yy6oOqS0G6PVajF_7lYrfEkOSIaqeiEJpjhfqY_f9bjMBaXUVTrgE5cuiCax7WrKH7Q6Az5H6ByV9KIvZZpwP74Y64htcQn5lGvh4KMpJNh2PQnh5yRH3P2BYg?key=bMx-uU1QRn_AK8SJ-Mu1757z

 

Processes/Applications

Since the Netskope Endpoint SD-WAN Processes/Applications are predefined it is a matter of selecting it from a list of applications and adding it to the steering configuration. The bypass here is needed to send traffic through to the SD-WAN console.  Consider it similar to VPN processes which need to be bypassed for co-existence with the Netskope NG-SWG Client.

 

AD_4nXdNl4ig7wp2ua1x5gHT6vUHvkcstRvKANp0CGyN4WZGFGixtZrTHdYgMosqg8MvoexLSr1b5ipHDhtCMAT5tWu3fvyC7zgdxE5kVT0zFRUS-fSAZKQPkWB9-W97zJBU9S8JQRFomw?key=bMx-uU1QRn_AK8SJ-Mu1757z


 

Bypassing Netskope NG-SWG Client Traffic

In order for traffic to traverse or use the Netskope Endpoint SD-WAN Client it must be bypassed at the Netskope NG-SWG Client level and have the Netskope Endpoint SD-WAN Client installed which tunnels all the bypassed traffic to the SD-WAN console.  The Netskope Endpoint SD-WAN operates similarly to that of a VPN, in effect it is a VPN replacement meant for SD-WAN features, see above.   To bypass traffic, we advise using the following recommendations for:

(When you want to send traffic to the SD-WAN console for traffic features, including it being used as a tool, you must NOT bypass traffic but steer to the Netskope console.  When you bypass and steer traffic, this sends traffic through to the Netskope Client proxies not to the SD-WAN console.  Traffic can be steered to the Netskope Client proxies after it arrives at the SD-WAN console, another use case for another time.)

Let’s define Microsoft Edge as an SSL Certificate Pinned Application which is to be bypassed at the Netskope NG-SWG Client.  We are then going to send all traffic from Microsoft Edge to any and all destinations, as an example.  This often happens with custom SSL Certificate Pinned applications.

 

Define the SSL Certificate Pinned Application 

AD_4nXfpwZoZguEq-tNuVT-FLzZtAhBKTFWXqoFGFR-2zHmb7KaRlRYLEuTzAr9JQVSZZBADzWqzqxq9rk5ntqHZGd6-rtDCZUq2sM0PUpcy_7pw-WZaIpmzkKzj2giIdbL08AbbHuHEmQ?key=bMx-uU1QRn_AK8SJ-Mu1757z
 

Bypassing in Steering

AD_4nXeaot1drhgwcwy9HyQPMixkdQ-6iU3bbfmZCz8XX7JfKQNPXrUD0ZNXkbLO8hZ_HZgXh8Undy-F91sOVT49yeHVD3DePLi8dmuMKXIBFIfgKUtnSBGIYSO8Xc3-h5ZsZOzJyXAlEw?key=bMx-uU1QRn_AK8SJ-Mu1757z

 

Defining Interesting Traffic for the Netskope Endpoint SD-WAN Client

Since the Netskope Endpoint SD-WAN Client is a VPN replacement, any traffic that is deemed “interesting” should be defined in an AppX policy.  “Interesting” in this case is traffic that is defined as that which is to be sent to a Netskope Endpoint SD-WAN console, i.e. networks, remote hosts, and so on.  In other words, if you don’t steer it, the traffic cannot be seen and thus make use of Netskope Endpoint SD-WAN Client advanced features.  Bypassing traffic at the Netskope NG-SWG Client and not defining it as interesting traffic with the Netskope Endpoint SD-WAN Client in effect bypasses traffic altogether and goes directly to the destination.  In other words, we need to have a destination defined for the Internet for the Netskope Endpoint SD-WAN to see it.

A sample AppX policy that is meant for the use case of “seeing” traffic destined for Microsoft Edge Browser on Windows is simply a matter of steering anything destined to the Internet in the AppX policy.  In the AppX policy below, we are prioritizing Zoom traffic as High and the rest automatically.

 

AD_4nXeOce29S8z45KiqX2YHzwJIeLfB5HoqKMSgXUv51lUdmFhsEDxNZM-umWncB8fAMyKOv3sNysmRcO0fe5aEW9Dwa7hovTPG6DFBFDcIxq61njSRYD--MCyT6VDFqnzOAXpXTs9nzg?key=bMx-uU1QRn_AK8SJ-Mu1757z

 

Since we are steering all Internet traffic bypassed at the Netskope NG-SWG Client level, we will  see any traffic that was bypassed at the Netskope NG-SWG Client.

 

How am I able to use the Netskope Endpoint SD-WAN Client for displaying bypasses in the Netskope Endpoint SD-WAN console?

After traffic is bypassed in the Netskope NG-SWG Client and sent to the Netskope Endpoint SD-WAN console, it may be viewed in Clients within the Manage section.  After clicking on a client, choosing the processes tab, then specifying the length of time for review, the page will refresh to display relevant data.

AD_4nXdantsT4jRnsGG0nATvZMNemrOPTKtjzzVrR4c9JNG9SKBOLmDXNUTGqsF-56cbFES0kE0TpGZ5dSlan51tdQlPk_RbqbQ6HcoeWa8CeorE8bR43pP8ID0LR1Lb-BCwFmDOOctbVA?key=bMx-uU1QRn_AK8SJ-Mu1757z

 

Scroll down and a list of processes will be displayed; the default number of displayed processes is 5 and may be expanded up to 50.

AD_4nXf_OQRZ_L4_7dgciwypsthmwglRGg7lnF6xrzc88jQSjodGtFhDLiueZUXhn1OBVZz9XWbKXlNlOy7St2zkl4hgV6yMBE-sG4aEQi2CZ8zKmScRrJXiEqMfHpT-8tuv_bpTUVaZPw?key=bMx-uU1QRn_AK8SJ-Mu1757z 

 

On the right hand side of the page is a column called Flows #.  Each of these numbers is a hyperlink to a list of flows for that specific processes listed.  Using the example of MS Edge being bypassed, if I click on that process then the page will refresh below the table to display flow information or traffic statistics if you will.

AD_4nXe_CbjYmMIbmVwgtWsZKxkKrQ8JkakfKp69eNCv6vMmefFCQw4q7P4BCKwVGsSJQkNzjPlyq8aMV2JPMMqibuziGgdw7AgNE3zk2S-9TEaMwIBVYBaM-socofu1gFgKbHYg4PagrQ?key=bMx-uU1QRn_AK8SJ-Mu1757z

 

The same may be done for applications seen by the Netskope Endpoint SD-WAN client.  In this case, applications are those which are defined in the Netskope Endpoint SD-WAN which may correspond to SaaS applications.  There are times where custom applications may be defined and which also may be found here.

 

Relevance and Use Cases

Custom SSL Certificate Pinned Applications

During the course of deploying Netskope NG-SWG Clients, sometimes bypasses are implemented to resolve production issues.  This often happens when there are applications which need to be made into SSL Certificate Pinned applications as the labor needed to import our SSL certificates into the appropriate stores is too resource intensive, time is of the essence, or a combination thereof.  Combine this with destinations used by the applications not being fully documented due to changes with the application, OS, and a myriad of other reasons to create a complex and ever changing environment.  Examples of how or what we need to do for CLI tools and Netskope SSL Certificates as well as documentation on avoiding AWS CLI issues may be found below.

https://docs.netskope.com/en/configuring-cli-based-tools-and-development-frameworks-to-work-with-netskope-ssl-interception/   

 

https://docs.netskope.com/en/addressing-ssl-error-while-accessing-aws-services-via-the-aws-cli-with-the-netskope-client-enabled/ 

We can now safely bypass the SSL Certificate Pinned applications and analyze the traffic seen coming from this application.  In turn, we are able to take the list of destinations and then statically define the destinations in the certificate pinned application.

 

Predefined SSL Certificate Pinned Applications

When a new Netskope Client Steering Profile is created, we have a laundry list of predefined list of SSL Certification Pinned applications which get added to the profile.  These predefined SSL Certificate Pinned applications may be denoted by their colorful icons, see below.

AD_4nXfQy-wTONwrUzGYRt5Jn5wLTWNeMXTXuYnz_bujnMSoPPNoMJNoBccYSjjXl9RHFY5rfnx6xS8_1tvlyZDh4WlJYCW4yibPpeXdvBNXa51EHa096aFAgNHX4YHElhbp6IQXzBp4GA?key=bMx-uU1QRn_AK8SJ-Mu1757z

Custom SSL Certificate Pinned applications only have a four gray square icon.

AD_4nXd868GahnVBHijxqlh7DiNIglgOWo7n8ocjBBz3FufJdqJ0Q3QHBVzWstSYyujQe0nlAuxWZDvkCp-SD9tDLfYc9Yq9qX7A9hr1mwBH9IXlgSLmQnzHpoOH1gqP73WEihPvziFahA?key=bMx-uU1QRn_AK8SJ-Mu1757z

Mentioning the predefined SSL Certificate Pinned applications is relevant because they have been known to require adding additional destinations as well as creating new SSL Certificate Pinned applications to add new services or processes that need to reach out.  For example, Apple has been known to add new processes in the Mac OS which reach out for updates.  Therefore we need to add new destinations or an entirely new certificate pinned application.

 

With the Netskope Endpoint SD-WAN Client listening to the traffic bypassed at the Netskope NG-SWG Client, we are now able to see the new destinations and/or services/processes, in effect the overall communication streams on the endpoint.

 

Other Netskope NG-SWG Exceptions

This same procedure may be used to determine what services on the local machine might be sending traffic to category destinations.  Subsequently, AppX rules may be created to give priority for various services or categories that are bypassed at the Netskope NG-SWG Client.

 

Resource Savings

Since we are able to determine what applications (SSL Certificate Pinned or otherwise), destinations, or categories are being bypassed and their destinations, we can apply restrictions in the Netskope NG-SWG or Netskope Endpoint SD-WAN Clients.  These restrictions can be the manual assignment of bandwidth usage, steering to Netskope Proxies for analysis and potentially DLP, or a multitude of other functions related to security or the manipulation of traffic. 

 

“Shadow IT”

“Shadow IT” has been bane of the existence for administrators, auditors, management, or anyone else concerned about it.  We have a wealth of products that help bring it out of the shadows and into the light.  One of those products is Cloud Exchange which has been well discussed at Netskope Risk Exchange Ecosystem: Combating Shadow IT 

Netskope Endpoint SD-WAN can be added to the arsenal in effect bringing “Shadow IT” into the light, resulting in visibility of the applications or a variety of other bypasses.

 

In Summary

The Netskope Endpoint SD-WAN Client is much more than a VPN replacement.  It becomes a tool that is capable of documenting the bypasses which are performed by the Netskope NG-SWG Client.  It is capable of providing a graphical representation of traffic to aid administrators in taking control of endpoints and troubleshooting issues as they occur.​​​​​​​

Be the first to reply!

Reply