Cloud SWG integrated with Secure Access Cloud, where segment applications hostnames are resolved by an internally configured SAC DNS server.
Host specified DNS server IP address, existing on a separate internal network segment, overlaps with intercepted SAC ranges.
Users accessing Secure Access Cloud segment applications using WSS Agent or SEP Web and Cloud Access Protection will always resolve hostnames correctly using SAC DNS server.
Users accessing internet sites will fail after a tunnel has been established and authenticated - as DNS resolution for public sites will fail.
WSS Agent version 9.1.1+ / SEP Agent Windows RU7+ / SEP Agent macOS RU6+
DNS server overlaps with intercepted SAC ranges and exists on a separate network segment from the device.
Cloud integration with ZTNA.
WSS Agent will automatically not route traffic on a local network segment to Secure Access Cloud (SAC) even if it has been selected for interception. This works for most environments where internal (RFC-1918) addresses are used for a device’s DNS server.
However, some environments will host the DNS server in a separate network segment from the device. In these scenarios, if SAC is configured to intercept the address the DNS server exists on, DNS traffic will be sent through the WSSA tunnel to a (usually non-existent) DNS server on the customer network, leading to DNS errors while the tunnel is connected.
Consider the following example:
In this configuration, traffic destined to 10.2.138.0/24 will NOT be intercepted or sent through the tunnel. This is due to WSS Agent giving preference to the local network segment over SAC traffic.
However, the DNS requests destined for 10.1.12.5 WOULD be intercepted and sent through the tunnel to the customer network. Likely, the customer network will not have a DNS server at this address responding to queries. It is possible that another server exists at this address performing a different function. As such, the DNS request will fail.
There are four workarounds to this scenario: