Correct, the additional functions that Netskope performs are part of the reason, another is a unified policy management point for all clients as our endpoints are using Netskope when off net.
The need for sending only select hosts through the tunnel is for initial testing, eventually we will look to forward all clients that do not have a Netskope client installed (think servers, IOT) through this tunnel to the Netskope SWG. I was trying to use VTI and PBR, to select the traffic. I have the VPN community created and the Tunnel are up, but I can't get the traffic to pass. I have a Rule at the top of the policy to match the source IP of the test clients destined to a Negated RFC1918 network group with a Directional match on the VPN and service of 80/443. There is also a rule in the application policy for the same.
Looking at the logs, it shows the traffic being encrypted and moved to the appropriate Tunnel interface, but matched on a lower rule for all other Internet bound traffic, not the Directional match rule at the top. Then there is an accept that is not encrypted, with the message: Connection terminated before detection: Insufficient data passed. See SK113479. What am I missing?