Known Issues In Release 118.0.0

Known Issues In Release 118.0.0

Here is the list of known issues in this release.

Issue NumberCategoryDescription
470558CASB Real-time ProtectionGoogle Meet is using Google Custom Protocol QUIC, RTCP, STUN over UDP instead of TCP and it is using HTTPv3 over QUIC for communication. Hence, Post activity on Google meet app connector will have detection issues.
132227CASB Real-time ProtectionIn Google Calendar, the downloaded bigger files are not getting the file size policies.
472680Cloud Firewall (CFW)If firewall service does not identify the application name and discards the session before IPS matches signatures, IPS will have application name as “Unknown” in IPS event. In these cases, where IPS event may not have an app name, but Firewall can have an app name, it can be found with session details.
423457Netskope Secure Web Gateway (NG SWG)Rules with filefilter conditions might not be considered when they followed a content inspection rule with a traffic action.
322097Netskope Private Access (NPA)When the CASB traffic steering mode is set to None, the macOS users are unable to disable NPA tunnel since the option to disable Client gets disabled.
322094Netskope Private Access (NPA)NPA Block notification will not be displayed to end user when Client is configured as NPA only mode or CASB traffic steering mode set to ‘None’.
488897Netskope Private Access (NPA)SRPV2 is not supported by a local broker.
17170Remote Browser Isolation (RBI) RBI was not showing the Read Only pop-up message again after a redirection to a new webpage in isolation.
470467Traffic SteeringSince version 114.0.5, the Docker pulls failed as the Docker proxy process is unable to handle a force reset in a closing connection.
466448Traffic SteeringWith self protection enabled, when the tokens change in a tenant, the MSIEXEC command (for example, msiexec /I NSClient.msi mode=peruserconfig host= <tenant-name>.goskope.com token=<token ID> enrollauthtoken=<new authentication ID> enrollencryptiontoken=<new encryption ID>) failed to update the tokens while repeating the Client installation using the new tokens. As a workaround, use nsdiag to update the secure enrollment tokens.
438566Traffic SteeringNetskope does not support TCP/DNS response handling when DNS responses are received through the tunnel when the DNS Security is enabled.
225028Traffic SteeringTo enable DNS security in web mode, Netskope client tunnel should be re-established. Netskope client detects the DNS traffic enable flag from web UI and then checks for the CFW availability on tunnel establishment. If CFW is available then the Netskope client starts the DNS security. Netskope Client also re-established the tunnel upon machine restart, shutdown, network change and enable/disable of Netskope client.
301400Traffic SteeringNetskope Client status is not updated because of the incorrect format.
Share this Doc

Known Issues In Release 118.0.0

Or copy link

In this topic ...