Known Issues In Release 105.0.0

Known Issues In Release 105.0.0

Here is the list of known issues in this release.

Issue NumberCategoryDescription
266406Netskope Secure Web Gateway (NG SWG)It is a known issue that Window does not disappear after entering correct OTP when webview2 is disabled for MFA. This issue will be fixed in R106.
190650Platform ServicesThe Source IPs added as part of GRE and IPSec tunnels by a tenant are cleaned when the tenant is deprovisioned. Due to this, when the same Source IP is added, tenant admin will get an error pop up indicating the source is already in use.

Currently, to fix the issue, customer has to raise a support case so that those IPs are cleaned up from the backend. The proper fix to cleanup any source IP associated to tenant during deprovisioning of a tenant will be done in Release 106.


This will generally occur for customer who had a POC tenant or tenants which are deprovisioned and re-provisioned. This is because the as part POC/old tenant the Source IPs added would not have been cleared up when the POC/old tenant was deprovisioned, so when they try to add the same Source IP (same GRE/IPSec tunnel configuration) for their paid/new tenant they will encounter this error.

257717Platform ServicesUnable to delete a group, when group doesn’t have displayname attribute.
212330Platform ServicesWhen a policy is moved from one group to another and reverted Pending Changes is empty as expected, but the icon is displayed.
210335Platform ServicesWhen an admin without permission to Real-time Protection Policy page edits the Policy Groupundefined policy group picker component is displayed.
201980Platform ServicesForward Proxy page should be set to View, for IPSec and GRE pages to work as expected with Manage privilege.
205384Platform ServicesThe request to load pending differences modal time out when there are large number of of policies with pending differences.
225028CFWTo enable DNS Security in web mode, the Netskope Client tunnel must be re-established. Netskope Client detects the DNS traffic enable flag from the web UI and then checks for CFW availability on the tunnel establishment. If CFW is available, then Netskope Client starts DNS Security. Netskope Client also re-establishes the tunnel upon machine restart, shutdown, network change, and enabling/disabling Netskope Client.
269112Traffic SteeringThis issue was fixed in the two Golden Client releases version 96.1.5 and 99.0.9 bundled in the Client software release version 104.0.18. However, the two Golden releases were not bundled in the version 105.0.0. The issue should only impact the new Firefox users. One work around is to upgrade to the golden release version 102.x or most recent Client version. Another workaround is to use different browsers.
Share this Doc

Known Issues In Release 105.0.0

Or copy link

In this topic ...