Skip to main content

Netskope Help

General Troubleshooting Methods

General troubleshooting involves checking the Client, policies, Publishers, and Private Apps:

Is the Netskope Client connected to NPA?
  1. Right-click on the Netskope Client icon in the system tray and select Configuration. Private Access should show as Connected.

    ClientStatus.png
  2. If the Configuration shows Private Access as Disabled, make sure the Steer all Private Apps option is enabled in the Steering Configuration settings for your tenant. Go to Settings > Security Cloud Platform > Steering Configuration.

    If you have multiple Steering Configurations, click on the name of the Steering Configuration you are using for NPA to open the details page.

    NPAsteeringConfig.png

    Tip

    If using only the Default tenant configuration, click Edit in the upper right corner.

  3. The details page for each steering configuration has a link that names what's being steered to NPA.

    image2.png

    Click the text to edit the configuration, and then enable Steer all Private Apps.

    image3.png
Has the Netskope Client never connected to NPA?

If the Client never enables, it could be that the Netskope Client is trying to register/enroll to the closest Netskope POP to enable NPA before the device’s network connection is active. Currently, the Netskope Client does not check again for network status.

Workaround: If you are displaying the Netskope Client icon in the system task bar (Windows) or menu bar (Mac), disable and enable the Netskope client to ensure it's connected.

Do you employ SSL/TLS inspection on your network?

If Yes, factor that NPA uses its own domain names for connecting to the Netskope Gateway and Stitcher. You will need to bypass the following URLs in order for the Client to connect successfully:

Component

URL

Port

Notes

Client

  • gateway.npa.goskope.com

  • addon-<tenantURL>

    (Example: addon-acme123.goskope.com)

  • nsauth<tenantURL>

    (Example: nsauth-acme123.goskope.com)

  • dns.google

TCP 443 (HTTPS)

UDP 53 (DNS)

  • Requires outbound access only.

  • The addon URL is typically required for retrieving feature flags and IDP enrollment.

  • The nsauth URL is required for the Periodic Re-authentication feature.

  • For identifying the closest Netskope Data Center, the Client leverages EDNS as the preferred method, so TCP 443 to dns.google needs to be allowed. (Corresponding IPs are 8.8.8.8, 8.8.4.4).

  • The fallback to EDNS is Local DNS (LDNS), so DNS (UDP 53) will need to be allowed to the DNS resolver.

Publisher

  • stitcher.npa.goskope.com

  • addon-<tenantURL>

    (Example: addon-acme123.goskope.com)

  • dns.google

  • *.docker.com

  • *.docker.io

  • *.ubuntu.com

TCP 443 (HTTPS)

UDP 53 (DNS)

TCP 80 (HTTP) for *.ubuntu.com

  • Requires outbound access only.

  • The addon URL is typically required for retrieving feature flags.

  • For identifying the closest Netskope Data Center, the Client leverages EDNS as the preferred method, so TCP 443 to dns.google needs to be allowed. (Corresponding IPs are 8.8.8.8, 8.8.4.4).

  • The fallback to EDNS is Local DNS (LDNS), so DNS (UDP 53) will need to be allowed to the DNS resolver.

    Note

    For administration, please allow TCP 22 (SSH) from admin subnets to the Publisher.

  • For Publisher updates, allow outbound access to:

    *.docker.com and *.docker.io for TCP 443 outbound

    *.ubuntu.com for TCP 80 and TCP 443 outbound

Client and Publisher

ns-<tenantid>.<mp-name>.npa.goskope.com

Contact your Netskope SE, TSM, or Support for your tenantid and mp-name and if IP subnets are needed instead of FQDNs.

TCP 443 (HTTPS)

Requires outbound access during enrollment/re-enrollment of NPA for the Client and for registration of the Publisher.

Example URL: ns-1234.us-sv5.npa.goskope.com

MP-Name Variables:

  • us-sv5 (SV5)

  • us-sjc1 (SJC1)

  • us-sjc2 (SJC2)

  • de-fr4 (FR4)

  • nl-am2 (AM2)

  • au-mel2 (MEL2)

  • ch-zur2 (ZUR2)

  • uk-lon3 (LON3)

  • sg-sin2 (SIN2)

  • de-fra2 (FRA2)

  • us-dfw3 (DFW3)

Note

Requires allowing inbound access only if using a CRL server that is maintained internally within your infrastructure for Prelogon enrollment, or enabling Browser Access. This is not needed for the dataplane traffic.

For allowlisting ns-<tenantid>.<mp-name>.npa.goskope.com based on IP addresses, refer to the Netskope Private Access List for Allowlisting section here.

Did the Real-time Policy you just applied go into effect?

Open the npadebuglog.log file in a text editor. Search for the name of your Private App as defined in the Private App in the Netskope tenant.

For windows: C:\Users\Public\netSkope\npadebuglog.log

For MacOS: /Library/Logs/Netskope/npadebuglog.log

If you can’t find any mention of your Private App name in this file, then you will not be able to connect to the Private App. This may be a result of the user not being authorized for this Private App (check the Real-time Protection policy).

How do I know the User/OU is authorized for Private Access?

Open up the nsdebuglog.log file and search for the word enroll. You may see more details on why the enrollment process is not working for the user.

Is there a Real-time Protection Policy for the user to access the Private Application?

In the Netskope UI, go to Policies > Real-time Protection and verify that the User/OU authorizes the user for the private application.

Does the Publisher health check in the Netskope UI show that it is able to connect to the application?

If the Private App is defined with a list of TCP/UDP ports, then only the first port is checked for connectivity. The status is not dependent upon all defined ports being accessible. This may lead to a false sense that the Publisher can successfully connect to all defined ports successfully.

image4.png
Can the Publisher reach the defined Private Application from a routing/policy perspective?
  1. SSH to the Publisher (username is ubuntu.)

  2. Choose Option #3 to exit out of menu.

  3. Enter su. This will enter you into root.

  4. Enter apt-get install traceroute -y.

  5. Try to traceroute to the local IP address/domain name of the private application.

Can the Publisher reach the defined Private Application on ALL defined ports?
  1. SSH to Publisher.

  2. Enter su. This will enter you into root.

  3. Enter apt-get install telnet -y.

  4. Try to telnet to the local IP address/domain name of the private application: telnet <hostname><port>.

If it connects, everything is good. If it doesn’t then there is a network or host security policy that is blocking the publisher from communicating to the server for the defined port.

Does the OSX Open File Descriptor Limits Need to be Increased?

OSX has a low file descriptor (default) limit of 256, which is problematic if you have heavy network access traffic. First check your current limits, and then create a custom limit to alleviate this limitation.

Find the Default/Current Limits of your System

Run the following Commands to find the soft and hard limit of your system.

  1. To find the soft limit, run:

    ulimit -Sn

    Sample output:

    % ulimit -Sn
    256
  2. To find the hard limit, run:

    ulimit -Hn

    Sample output:

    % ulimit -Hn
    unlimited

Set Custom Limits

  1. Run:

    sudo touch /Library/LaunchDaemons/limit.maxfiles.plist
  2. Open the file in your favorite file editor and paste the following data as contents of the file.

    <?xml version="1.0" encoding="UTF-8"?>
      <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN"
              "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
      <plist version="1.0">
        <dict>
          <key>Label</key>
          <string>limit.maxfiles</string>
          <key>ProgramArguments</key>
          <array>
            <string>launchctl</string>
            <string>limit</string>
            <string>maxfiles</string>
            <string>25600</string>
            <string>100000</string>
          </array>
          <key>RunAtLoad</key>
          <true/>
          <key>ServiceIPC</key>
          <false/>
        </dict>
      </plist>
  3. You can replace the limits with your desired values. The hard limit should be lesser than what your system supports, which is the output of ulimit -Hn. When setting a custom value, OSX currently won’t allow setting the hard limit as unlimited, so you need to set it to some high value. In the example above, the soft limit is 25600 and the hard limit is 100000.

  4. Save the file and reboot the system.

  5. After the system is rebooted, verify the current limits by running the following commands.

    To check the soft limit, run:

     ulimit -Sn

    Sample output:

    % ulimit -Sn
    256

    To check the hard limit, run:

    ulimit -Hn

    Sample output:

    % ulimit -Hn
    100000
Does the Private Application have a security group/ACL that is blocking the IP address of the Publisher from accessing it?

This happens when the Publisher is deployed inside of an IaaS environment like AWS. Check the Security Group of the host. All traffic to the defined private application will be seen on the local network as having originated from the Client IP address.

Are cross-signed root certificates supported while configuring Private App certificates for custom URLs with NPA Browser Access?

Netskope supports self-signed root certificates. Cross-signed root certificates are not supported in the certificate chain file. If cross-signed root certificates are used, you will see the error No root certificate was found.

NPA-New-Cert.png

By default Let’s Encrypt CA will create a certificate chain using the ISRG Root X1 cross-signed by DST Root CA X3. This is what causes the error.

Workaround

Remove the ISRG Root X1 cross-signed certificate from the certificate chain, which should be at the bottom. Then add the ISRG Root X1 self-signed certificate, which can be downloaded from here.