Solved

SNI Checking at the Client Configuration level

  • 7 February 2024
  • 2 replies
  • 262 views

Badge +9

I am looking for thoughts on if people have enabled the setting in the Client Configuration for Perform SNI (Server Name Indication) check ?    We are migrating VPN technologies and have noticed some traffic occurring outside of the Netskope tunnel when we do not expect it.  We believe this setting to be the reason as it indicates that the initial three-way handshake for traffic occurs outside the tunnel to retrieve the hostname.   Additionally we have several third-party applications that we use Source IP allowlisting with and believe that this may be causing issues with some of those as well.   This was enabled (I believe) during our initial configuration and now want to gather pros and cons of having it enabled/disabled?

icon

Best answer by Fatehd 9 February 2024, 21:41

View original

2 replies

Badge +1

Hi Twoods, 

if the perform SNI is checked So, the SNI check is performed outside of the NS Tunnel.

It does a handshake directly with the remote server and sends the TLS Client Hello waiting for Server Hello with SNI, then sends RST.

That all happens outside of NS Tunnel. Then once it knows the SNI, it looks up what it should do with that traffic (tunnel/bypass etc) based on config and takes the action for the full flow.

In short answer here is - do NOT use this option unless you have a scenario that requires it(which should not be the case in vast majority of deployments).

Userlevel 3
Badge +12

Hi Twoods,

 

This option is explicitly covered in our “Best Practices for Client Configuration: SME Webinar” available on the academy here 

 

 

Addition free SME workshops can be reviewed here

Reply