When SSL Interception is enabled on the Cloud Secure Web Gateway portal, the following occurs:
Certificate pinning dependencies with the Google Drive application
Add the Google Drive IP addresses and domains as SSL Interception exemptions (to bypass the Google Drive content from being SSL intercepted).
The following workaround in the Cloud SWG Portal enables the Google Drive application to pass through the Cloud SWG service without being SSL inspected.
You need to edit the TLS/SSL interception bypass list in the Cloud SWG portal:
Policy -> TLS/SSL Interception -> TLS/SSL Interception Policy -> Add Rule (button)
Select "Do Not Intercept" and add the following subnets in the destination list:
Also add these Google Drive IP's and domains to the SSL Interception exemption list:
If the above IP addresses and domains do not solve the problem, it might be necessary to expand the subnets to a /16.
If that subnet expansion still fails, it might be necessary to determine what additional IP addresses that Google Drive is resolving and connecting to.
Another document that provides similar information regarding Google Drive not working through a proxy is:
(ProxySG) Google Drive access breaks when SSL Interception is enabled in ProxySG
Note! Adding IP ranges to an SSL Interception exemption list does not allow unrestricted access to the sites in those IP ranges. This traffic is still passed through the Cloud SWG service and is logged by Cloud SWG. The IP addresses are rated (even though SSL interception is bypassed) and that rating is evaluated against policy.
If adding the above SSL exemptions fails to address the issue, there are a few additional options to identify other domains we may need to bypass:
After saving the SymDiag output, use the SymDiag Viewer (also available from the same SymDiag download link) to view the saved file.
From here, you can review the WssaInTunnelTrace.pcap shown below, which includes all the traffic going through your WSSA tunnel.
You can also verify what additional domains the Google Drive application is going to, and then add those domains to your SSL bypass list:
*** Note that by doing this, no data will be sent to the CloudSOC as well. ***