Connection Settings
The connection settings enable you to configure ports for redirecting web traffic to the upstream Skyhigh Secure Web Gateway.
NOTE: The rules in the policy are applied to the redirection ports only.
To configure connection settings:
- Navigate to Policy > Skyhigh Client > Configuration.
- From the Settings list, select Client Profile.
- Select a profile from the list of profiles.
The Connection Settings tab displays by default.

Traffic Interception
- To add an interception port:
- From the Add Ports drop-down, select Add Inline:
- Port. Specify the port to redirect traffic to a proxy server.
- Comments. Enter applicable information.

- From the Add Ports drop-down, select Add Inline:
- To import port numbers from the CSV file:
- From the Add Ports drop-down, select Import CSV.

- Navigate to the folder containing the port list, select the file, and click Open.
The ports are added to the list.
- From the Add Ports drop-down, select Import CSV.
- To export configured port numbers to the CSV file:
- From the Add Port drop-down, select Export CSV.

The configured domain list is downloaded in the CSV file format.
- From the Add Port drop-down, select Export CSV.
For traffic on non-redirected ports
- To channelize traffic on a non-redirected port, select one of the following options:
- Allow all traffic except for processes in the list
- Block all traffic except for processes in the list

- Click the selected option and select one of the following from the Add Process drop-down:
- Add Inline. Add a process to the list
- Import CSV. Import a process list
- Export CSV. Export the process list


Local Proxy Settings
For handling the intercepted web traffic from local applications, Skyhigh Client Proxy used to internally expose a listener port on the loopback interface, which was dynamic in nature. With the new Skyhigh Client, this local proxy port is made static and can be configured through a Client Profile.
- Local Proxy Port. 8080 is set by default.
NOTE: Skyhigh Client will use this TCP Port by default for internally handling intercepted web traffic. A service restart is required if the port number is changed.
- Enable local proxy. Select this checkbox to use the local proxy.
When enabled, the Enable Local Proxy option allows other applications running on the endpoint to configure the local proxy to be an explicit proxy as part of the respective application-specific proxy configuration settings. For example: browsers

On-Premise Bypass
- To add an On-Premise IP address:
- In the On-Premise IP Addresses section:
- From the Add Address drop-down, select Add Inline:
- Hostname/IP Address. Enter the hostname or IP address of an endpoint.
- Port. Enter the port number.
- From the Add Address drop-down, select Import CSV.
The CSV file is imported. - From the Add Address drop-down, select Export CSV
The CSV file is exported.

- From the Add Address drop-down, select Add Inline:
- In the On-Premise IP Addresses section:
- To add a Corporate VPN Address Space:
- In the Corporate VPN Address Space section:
- From the Add Address drop-down, select Add Inline:
- Hostname/IP Address. Enter the hostname or IP address of an endpoint.
- Port. Enter the port number.
- From the Add Address drop-down, select Import CSV.
The CSV file is imported. - From the Add Address drop-down, select Export CSV.
The CSV file is exported.

- From the Add Address drop-down, select Add Inline:
- In the Corporate VPN Address Space section:
Security Settings
- Allow connection to proxy if mutual authentication fails. Select this checkbox to allow connection to the proxy when mutual authentication fails.
NOTE:
When mutual authentication fails, traffic is not forwarded to a remote gateway. The mutual authentication option allows the Client and Skyhigh gateway to verify each other's identity, ensuring the Client connects only to a legitimate gateway.
- Enable Secure Channel. Select this checkbox to establish a secure connection between the Skyhigh Client and the Skyhigh Security WGCS. When selected, the software validates the cloud proxy certificate against the device certificate store and establishes a secure connection.
- Select Port. Select one of the following ports for establishing secure connection
- 8081
- 443
- If user cannot connect to the selected secure channel port
- Allow Connection without Secure Channel. Select this checkbox to allow the connection through the configured proxy port without establishing a secure connection between the Skyhigh Client and the Skyhigh Security WGCS.
- Certificate Validation Settings
- Validate using the certificate list on the device. By default, this checkbox is selected. This ensures device certificate validation occurs continuously.
- Allow connection to secure channel if certificate verification fails. Select this checkbox to allow traffic to the cloud proxy server when the certificate verification fails.
- Select Port. Select one of the following ports for establishing secure connection

Cloud Firewall Settings
When the Cloud Firewall setting is enabled in the Client profile, it enforces the relevant Cloud Firewall rules under the Network section of the mapped policy.
NOTE: When you enable Cloud Firewall, the Client sends all IP traffic to the Cloud gateway by default. However, sending system traffic to the Cloud gateway is not advised because it may produce undesirable effects like network connectivity failures. Therefore, Skyhigh recommends that you bypass such traffic based on your network configuration needs.
Examples:
- Traffic from windows processes
- system.exe, alg.exe, dns.exe, lsass.exe, services.exe, spoolsv.exe, svchost.exe, userinit.exe, winlogon.exe
- ICMP (protocol number 0) Traffic
- UDP Traffic on Port
- 53 (DNS)
- 123 (Network Time Protocol (NTP))
- 67 (Dynamic Host Configuration Protocol (DHCP) servers)
- 500 (Internet Key Exchange (IKE))
- 389, 636, 3268-3269 (Lightweight Directory Access Protocol (LDAP))
- 445 (SMB)
- TCP Traffic on Port
- 389, 636, 3268-3269 (Lightweight Directory Access Protocol (LDAP))
- 445 (SMB)
- IPSEC ESP (protocol number 50) Traffic
- GRE (protocol number 47) Traffic
On the SSE UI:
- Use HTTP proxy to authenticate with Cloud Firewall. Select this checkbox to enable the Skyhigh Client to authenticate with Cloud Firewall over TLS when using a corporate web proxy. But, when a user is connected outside the corporate network, a direct connection to the Internet is used to authenticate with Cloud Firewall:
- Hostname or IPv4. Enter the hostname of the corporate web proxy.
- Port. Enter the port number.
- Enable SOCKS proxy. Select this checkbox to ensure that your on-premise SWG acts as a SOCKS proxy and relays the tunneled traffic to the Cloud Firewall:
- Hostname or IPv4. Enter the hostname of the on-premise SWG.
- Port. Enter the port number.

Check for Policy Update Frequency (5 to 1440 mins)
Enter a value that ranges from 5 minutes to 1440 minutes to direct Skyhigh Client to check the policy update according to the specified interval.

- Click Save.
