Troubleshooting Guide
Block Page
Issue
A customized block page has been enabled. However, users are receiving an error upon traveling to blocked domains instead of the block page.
This is likely due to the use of an outdated Agent. Please update to the latest version of the Agent. If issues still persist, see below.
Solution
It’s likely that HYAS Protect is either blocking a malicious site, or blocking access to a site that is against your company’s policies. You’re seeing this warning because HYAS Protect is attempting to display a “block page” instead of the actual site. In order for the block page to be shown for sites served over HTTPS without generating browser errors, the HYAS Root Certificate Authority (CA) must be installed on your device. You can download and find instructions for installing the HYAS Root CA files on your device at http://ca.hyas.com .
Unable to Connect to the Internet
Issue
When using the HYAS Protect Agent, users are unable to connect to a public WiFi network.
Solution
Public WiFi’s often include a captive portal. This is where you can agree to the network’s Terms of Service before being granted access to the internet. All captive portals behave a bit differently and on occasion, it may be necessary to temporarily disable the HYAS Protect Agent to allow for connection to the public WiFi. Once connected, then you can reenable the Agent. Other methods to accomplish this will be available in Q2 2024, but until then please perform the following tasks to temporarily disable the Agent:
Mac OS
Windows
HYAS Protect Relay
DNS traffic not displaying in the UI
Issue
When deploying the HYAS Protect Relay on a Windows machine, DNS traffic is not showing in the HYAS Protect UI.
Solution
Port 53 on each IP address supports only one listening process, in accordance with standard IP network design.
On the external interface, the HYAS Protect Relay process must occupy this port to handle incoming DNS traffic. Depending on the configuration of local domains, it can subsequently forward requests to the Windows DNS service, if necessary. However, prior to this, the Windows DNS service must cease listening on port 53.
Instructions on how to configure the Relay to listen on port 53:
Checking which processes are listening on port 53
In PowerShell, run the following command to check for processes listening on port 53 and their associated IP addresses.
netstat -an | Select-String 53 | Select-String listen
This command retrieves TCP connections listening on port 53 and displays the local IP address and port.
When configured properly, the output will look similar to this:
PS C:\Users\Administrator> netstat -an | Select-String 53 | Select-String listen
TCP 0.0.0.0:5357 0.0.0.0:0 LISTENING
TCP 127.0.0.1:53 0.0.0.0:0 LISTENING
TCP [::]:5357 [::]:0 LISTENING
TCP [::1]:53 [::]:0 LISTENING
TCP [fe80::608c:dc7e:e701:f49f%14]:53 [::]:0 LISTENING
In this scenario, port 53 is currently utilized by the localhost IPv4 (127.0.0.1), localhost IPv6 (::1), and the fe80:xxx IPv6 address. However, the Windows DNS server is not configured to listen on the IP address of the domain controller (10.0.10.98), as observed.
If port 53 is not currently in use by the localhost, you can configure it to do so by following these steps:
Navigate to your Windows DNS Server and right-click and select “DNS Manager”
From here, you should see all of your DNS Servers. Next, right-click each one and select “Properties”
Now, select the “Interfaces” tab:
You may need to restart the DNS service for the changes to take effect
In this example, we’ll need the Windows DNS Server to stop listening on 10.0.10.98.
To do this, unselect the check box next to 10.0.10.98 and click “OK”
You may need to restart the DNS service for the changes to take effect
Although not explicitly displayed in the user interface, it's important to note that the Windows DNS server also listens on port 53 of the IPv4 localhost (127.0.0.1) and IPv6 localhost (::1).
For this example, the dnsproxy.yaml file looks like:
YAMLdns: bind_hosts: - 10.0.10.98 port: 53 upstream_dns: - https://a.b.c.d/dns-query (the default Protect resolvers) - '[/your-local-domain-here/]127.0.0.1'
The HYAS Protect Relay will be configured to bind to port 53 on the IP address 10.0.10.98 to accept DNS requests. Requests for local domains will be forwarded to 127.0.0.1, port 53, where the Windows DNS server is operational. DNS queries for non-local domains will be routed to the HYAS Protect Resolvers and thus shown in the HYAS Protect UI.
Last Modified by: