Endpoint Compatibility Guidelines
This topic provides guidelines when you use Infoblox Endpoint in conjunction with third-party software. When using certain VPN software, you might need to take extra steps or considerations to ensure compatibility with Infoblox Endpoint.
The provided information is for reference only. This information represents the results of lab testing in a controlled environment focused on individual protocol services. Enabling additional protocols, services, cache hit ratio for recursive DNS, and customer environment variables will affect performance. This information does not serve as an official list of supported or unsupported software for Infoblox Endpoint. To design and size a solution for a production environment, please contact your Infoblox Solution Architect.
Note
The following table contains a list of commonly-used third-party VPN software and the compatibility information with Infoblox Endpoint.
Third-Party Software | Compatibility Description | Known Issues |
---|---|---|
Akamai Enterprise Applications Access (EAA) VPN | Infoblox Endpoint is compatible with Akamai EAA VPN in the split-tunnel mode. Note: Support for Akamai EAA VPN was verified only for Windows. | N/A |
Appgate VPN | Infoblox Endpoint is compatible with Appgate VPN in the split-tunnel mode. Note: Infoblox Endpoint supports Appgate SDP v5.3.2 or higher. | N/A |
AWS Client VPN Endpoint | Infoblox Endpoint is not compatible with AWS Client VPN Endpoint because when your VPN configuration is set up to modify the DNS server on the network interface, Infoblox Endpoint cannot provide proper protection to your network. | Issue: When AWS Client VPN Endpoint with DNS server IP address is configured, it modifies the DNS server IP configured on the network interface of the Client machine. As a consequence, Infoblox Endpoint will not be able to provide proper protection as designed. |
Azure Client VPN Endpoint | Per Microsoft support, Azure VPN is not supported to use loop back as DNS server for P2S VPN connection. This is a by-design limitation and currently there is no official workaround for this scenario. | N/A |
Check Point VPN | Infoblox Endpoint is compatible with Check Point VPN in the split-tunnel mode. Infoblox Endpoint is not compatible with Check Point VPN in the full-tunnel mode. | N/A |
Cisco AnyConnect VPN | Infoblox Endpoint is compatible only with the Internet portion of AnyConnect VPN in the split-tunnel mode. Infoblox Endpoint is not compatible with AnyConnect in the full-tunnel mode. | N/A |
F5 VPN | Infoblox Endpoint is not compatible with F5 VPN in the split-tunnel mode. | N/A |
Fortinet FortiClient VPN | Infoblox Endpoint is compatible with Fortinet Forticlient VPN for windows devices. Tested versions of Forticlient: 7.0.8.0308 Windows. | Infoblox recommends the following:
|
McAfee Web Gateway Proxy | Infoblox Endpoint is partially compatible with the McAfee Web Gateway Proxy. Some of the features, such as block redirect or bypass redirect, might not function properly. | Issue: When the McAfee Web Gateway proxy is enabled, all traffic goes through the proxy. Some of the features, such as block redirect and bypass redirect, might not function properly Workaround: Add the redirect IPs to the McAfee proxy bypass list. That way, the proxy is allowed to get the contents from the redirect IP during the HTTP(S) GET requests for block domains. |
Netskope | Infoblox Endpoint is officially certified to run with Netskope client 93.0.1 and later, provided that you disable "Bypass Loopback DNS feature flag" on Netskope. As any other VPNs Netskope must be set to run as a split tunnel and also specifically in CASB mode, meaning that Netskope is only securing specified 80/443 Traffic rather than all 80/443, otherwise the redirect feature will not work. | Issue: The Redirect Page is not being displayed with the IPv6 address due to the proxy. Workaround:
|
OpenVPN | Infoblox Endpoint is compatible with OpenVPN clients with the following configuration:
| N/A |
Palo Alto Networks GlobalProtect VPN | Infoblox Endpoint is compatible on windows with Palo Alto Networks GlobalProtect VPN using the below configuration:
Notes:
| Issue: Sometimes in an office network, the endpoint device must be restarted after the Infoblox Endpoint agent installation to work properly with the Palo Alto Networks GlobalProtect client. Issue: When Palo Alto Networks GlobalProtect VPN with DNS server IP address is configured , it modifies the DNS server ip configured on the network interface of the MAC Client machine. So, Infoblox Endpoint will not be able to provide proper protection as designed on MAC OS. |
Pulse Connect Secure VPN | Pulse Secure VPN has two operation modes:
In order to get Pulse Secure VPN and Infoblox Endpoint to work on the same machine, FQDN-based split-tunneling must be disabled in the Pulse Secure VPN gateway. | Issue: Both modes can be enabled; however, an issue occurs when using FQDN-based split-tunneling. FQDN-based split-tunneling is required for the Pulse Secure to receive all DNS traffic when operating in this mode. When operating in this mode, it completely replaces DNS addresses of the physical NIC adapter with its own address. When it gets disconnected, it restores the previous DNS addresses. FQDN-based split-tunneling handles the DNS table of the physical NIC adapter in the same way as Infoblox Endpoint resulting in incompatibility of Pulse Secure with Infoblox Endpoint. Workaround: To get Pulse Secure VPN and Infoblox Endpoint to work together on the same machine, FQDN-based split-tunneling must be disabled in the Pulse Secure VPN gateway. Also, if there are any domains configured in the FQDN split tunnel at pulse secure, these domains must be added to the Infoblox Portal as internal domains. For additional information, see |
SonicWall VPN | Infoblox Endpoint is not compatible with SonicWall VPN. | N/A |
Symantec WSS Agent | Infoblox Endpoint is compatible with Symantec WSS Agent when you exclude the following domains and IP addresses on the agent: TCP 443:
TCP/UDP 53 and 443:
| N/A |
Tunnelblick VPN | Infoblox Endpoint is compatible with Tunnelblick VPN if you make the following changes in Tunnelblick:
In the Connecting and Disconnecting tab of the Tunnelblick advanced configuration, ensure that the following two settings are enabled:
In the While Connected tab, change the following to Ignore:
| With some Tunnelblick versions, Infoblox Endpoint is unable to properly identify the correct internal DNS servers following a VPN disconnect. To avoid this issue, change the “Set DNS/WINS” option in Tunnelblick to "set nameserver (3.1)":
|
Zscaler Private Access (ZPA) | Infoblox Endpoint is compatible with Zscaler Private Access (ZPA). ZPA works correctly with Windows and Mac versions. Tested versions of Zscaler client: 3.7.0.172 for MAC OS, 3.9.0.183 for Windows. | N/A |
Zscaler Internet Access (ZIA) | Infoblox Endpoint is compatible with Zscaler Internet Access (ZIA). ZIA works correctly with Windows and Mac versions. ZIA is supported by using Proxy Auto-Configuration (PAC) files to determine whether web browser requests (HTTP, HTTPS, and FTP) go directly to the destination or are forwarded to a web proxy server. For information on how to configure PAC files, see the BloxOne Threat Defense Integration in ZScaler deployment guide. | N/A |