This portion of the guide helps identify whether connectivity issues are caused by basic network problems, DNS resolution failures, or HYAS Protect configuration/policies. It applies to both agent-based and resolver-based deployments of HYAS Protect, although certain sections are specific to each.
Client-Side Configurations (Baseline Checks)
Before troubleshooting internet or DNS issues, confirm that the endpoint’s basic configuration is healthy. These checks do not determine how HYAS Protect is deployed — they simply verify that, regardless of deployment mode, the system is using the expected DNS settings and can communicate over required ports.
These baseline checks confirm:
If the HYAS Protect Agent is running (when used in your environment)
That DNS settings are correctly configured (127.0.0.1 or corporate/HYAS resolvers)
That outbound DNS traffic (UDP/TCP 53) is not blocked by local firewalls
Seeing 127.0.0.1 as the DNS server is only expected if the HYAS Protect Agent is used. In resolver-based deployments, DNS may point directly to HYAS Protect resolvers or corporate DNS.
Why this matters: If these checks fail, later DNS resolution tests will not give meaningful results until configuration issues are corrected.
Step 1: Check if HYAS Protect Agent is Installed/Running (If Used)
Windows (Command Prompt or PowerShell):
CODE
sc query "HYAS Protect"
STATE: RUNNING → Agent is installed and active.
The specified service does not exist → No agent installed (DNS may still be configured to HYAS Protect via network settings).
macOS (Terminal):
CODE
launchctl list | grep application.com.hyas
Output shows process ID if installed and running.
No output means agent not installed.
Step 2: Verify DNS Configuration
Windows:
CODE
ipconfig /all
Check DNS Servers:
If 127.0.0.1 → Agent in use.
If other addresses (corporate DNS or HYAS Protect resolvers) → HYAS Protect may still be active via network configuration.
macOS:
CODE
scutil --dns | grep 'nameserver'
127.0.0.1 → Agent in use.
Other IPs → Network-level DNS configuration.
If DNS servers show neither 127.0.0.1 nor HYAS resolvers, check for misconfiguration or VPN overrides.
Step 3: Check Firewall Configuration
HYAS Protect requires outbound UDP and TCP port 53 to:
127.0.0.1 (loopback)
HYAS Protect upstream resolvers
Blocking either loopback (127.0.0.1) or HYAS Protect resolvers will cause DNS lookups to time out.
Verify Basic Network Connectivity
Before testing DNS, confirm that the device can reach the internet at a basic level. This test bypasses DNS and isolates general connectivity issues such as Wi‑Fi problems, firewall blocks, or routing failures.
Step 1: Ping Test
Open the command line tool and run:
CODE
ping 8.8.8.8
This uses Google’s public IP to bypass DNS and confirm raw internet reachability.
Windows: Stops after 4 replies
macOS: Press Control + C to stop
Successful replies = Internet is reachable (proceed to DNS tests).
Timeouts = General network issue (not DNS-related).
Verify DNS Resolution via HYAS Protect
Step 1: Run DNS Lookup
Run:
CODE
nslookup google.com
Valid IP returned = DNS functional.
NXDOMAIN = May indicate intentional block (policy).
Timeout/Server not found = Connectivity or DNS misconfiguration..
Note: If using the agent, Server: 127.0.0.1 is expected. Without the agent, DNS may point to HYAS Protect resolvers or corporate DNS servers.
Results:
Valid IP = DNS Functional
NXDomain = Domain intentionally blocked by HYAS
Timeout / Server not found = Misconfiguration or firewall issue
Step 2: Compare with Public DNS (Bypass HYAS Protect)
If DNS resolution fails, you can test whether the issue is specific to HYAS Protect by querying a public resolver (e.g., Google DNS at 8.8.8.8):
CODE
nslookup google.com 8.8.8.8
Check the Results
If public DNS resolves but HYAS Protect does not: HYAS Protect is likely blocking the domain per policy or there’s an issue with the agent’s upstream configuration.
If neither HYAS Protect nor public DNS resolves: The domain itself may be offline or misconfigured.
If you see timeouts, confirm firewall allows outbound UDP/TCP 53 as described in baseline checks.
NXDOMAIN vs Timeout
NXDOMAIN: Intentional block by HYAS Protect
Timeout: Connectivity issue, misconfiguration, or firewall blocking UDP/TCP 53
Advanced Device Troubleshooting
If DNS tests fail, perform these additional checks:
Toggle HYAS Protect Agent
Temporarily disable or stop the agent:
If internet works without agent → Likely HYAS Protect configuration/policy issue
If internet still fails → Issue unrelated to HYAS Protect
Test from Another Device
Run ping and nslookup from another device on the same network:
Works → Issue is local
Fails → Network-wide problem
Clear DNS Cache
Sometimes cached failures can cause persistent errors. To clear the cache, perform the following:
When a VPN is active, DNS behavior can change significantly. Many VPN clients modify system DNS settings, block traffic to the loopback interface (127.0.0.1), or tunnel all DNS queries through their own resolvers. Because the HYAS Protect Agent relies on 127.0.0.1 for DNS proxying, this can prevent HYAS Protect from functioning as expected.
Common VPN-related issues include:
HYAS Protect being bypassed (DNS no longer goes through 127.0.0.1).
DNS queries timing out when VPN is connected.
Policy blocks not applying while on VPN.
Internet connectivity working without VPN but failing when VPN is active.
Follow the steps below to diagnose and resolve these issues.
Step 1: Check VPN Status
Confirm whether the user is connected to a corporate or third-party VPN.
Temporarily disconnect the VPN and re-run the ping and nslookup tests:
If DNS works without VPN but fails with VPN → VPN configuration likely overrides HYAS Protect.
If DNS fails both with and without VPN → Issue is unrelated to VPN.
Step 2: Verify DNS Settings While VPN is Active
Windows:
CODE
ipconfig /all
macOS:
CODE
scutil --dns | grep 'nameserver'
Check if DNS is set to 127.0.0.1:
If not 127.0.0.1 → VPN is forcing DNS through its own resolvers (HYAS Protect bypassed).
If 127.0.0.1 but DNS queries fail → VPN may be blocking loopback traffic or outbound DNS.
Step 3: Determine Split vs Full Tunnel VPN
Full Tunnel VPN: Routes all traffic (including DNS) through VPN — HYAS Protect may not function unless explicitly allowed.
Split Tunnel VPN: Routes only corporate subnets through VPN — HYAS Protect can still operate normally.
Note: If your organization enforces full tunnel, ensure HYAS Protect is deployed on the VPN DNS path or exceptions are configured.
Step 4: Check Firewall or Policy Conflicts
Some VPN clients enforce strict firewall rules that block outbound DNS or loopback traffic.
Ensure UDP/TCP port 53 is allowed to 127.0.0.1 and HYAS Protect upstream resolvers.
Step 5: Test Resolution Using Public DNS (Bypass HYAS Protect)
While connected to VPN, test a public DNS resolver directly:
CODE
nslookup google.com 8.8.8.8
If public DNS resolves but HYAS Protect does not: VPN is likely interfering with HYAS Protect’s DNS proxy.
If neither resolves: Connectivity issue may be broader (check VPN connection health).
Select the device you wish to obtain troubleshooting logs for and select Actions>Run Diagnostics.
This will populate the troubleshooting logs in apprx 10 mins.
Important Note:
HYAS Protect requires DNS traffic to use 127.0.0.1; VPNs that override or block this will prevent proper operation.
Split-Horizon DNS Troubleshooting
These scenarios primarily affect internal corporate resources; skip this section if troubleshooting public websites.
Split-horizon DNS (also known as internal/external DNS) is when different DNS answers are returned for the same domain depending on whether the query is made from inside or outside the corporate network. This is common for internal applications (e.g., app.company.com) that resolve to private IP addresses on corporate networks but resolve differently — or not at all — on the public internet.
When HYAS Protect is deployed, DNS traffic is proxied through the local loopback (127.0.0.1) and forwarded to HYAS Protect resolvers. This can cause issues with split-horizon configurations if HYAS Protect is not aware of your internal DNS zones, resulting in failed or incorrect resolution for internal domains.
Common Split-Horizon Symptoms
Internal corporate domains fail to resolve (NXDOMAIN) when using HYAS Protect.
Internal domains resolve to public IPs instead of internal ones, breaking access to internal services.
Internal applications only work when bypassing HYAS Protect or switching networks (e.g., connecting to VPN).
Step 1: Identify the Problem Domains
Determine if the issue occurs only for internal corporate domains (e.g., intranet.company.com) or for public domains as well.
If only internal domains fail → Split-horizon DNS misalignment is likely.
Step 2: Compare DNS Resolution Inside and Outside HYAS Protect
Run the following tests:
Default (HYAS Protect active):
CODE
nslookup intranet.company.com
Public DNS (bypass HYAS Protect):
CODE
nslookup intranet.company.com 8.8.8.8
Expected Results:
Internal domains should resolve to internal/private IP addresses when on corporate network or VPN.
If HYAS Protect returns NXDOMAIN or wrong IP while public DNS gives a different result, split-horizon misalignment is confirmed.
Step 3: Test with and without VPN
Connect to the corporate VPN and re-run the same nslookup tests.
If the domain resolves correctly only when VPN is active: Internal DNS zones are only accessible via VPN and may not be configured in HYAS Protect.
If the domain fails both on and off VPN: Likely not a split-horizon issue — check general DNS troubleshooting steps.
Step 4: Verify Internal Zone Configuration
Check whether your organization has provided HYAS Protect with internal DNS zone information.
Internal zones may need to be configured or excluded within HYAS Protect policies to avoid public resolution attempts.
Step 5: Temporary Workarounds
Temporarily bypass HYAS Protect for internal domains by manually adding internal DNS server IPs to system settings (testing only, not a permanent solution).
Confirm if resolution works correctly through corporate DNS directly.
Select the device you wish to obtain troubleshooting logs for and select Actions>Run Diagnostics.
This will populate the troubleshooting logs in apprx 10 mins.
Important Notes
HYAS Protect does not automatically detect internal zones; these must be manually configured or exempted by your IT team.
Split-horizon DNS problems frequently overlap with VPN troubleshooting; check if VPN connection resolves the issue.
NXDOMAIN responses for internal domains usually indicate HYAS Protect forwarded the query to public DNS rather than an internal server.
Local Domain Troubleshooting
Local-only domains rely on internal name resolution (mDNS/NetBIOS) and are unrelated to public DNS — this section applies only to internal/local resources.
Local domains are custom DNS suffixes or hostnames that exist only within a local network (e.g., printer.local, nas.lan, or dev.company.local). These domains typically resolve through local DNS servers or mDNS/NetBIOS broadcasts, not public DNS. When HYAS Protect is deployed, all DNS queries are proxied through the local loopback (127.0.0.1) and forwarded to HYAS Protect resolvers.
Because HYAS Protect resolvers do not have knowledge of these local-only domains, they may return NXDOMAIN (non-existent domain) or fail to resolve, causing access problems for local resources.
Common Local Domain Symptoms
Devices like printers, file shares, or NAS servers become unreachable by hostname after HYAS Protect is installed.
Local development domains (*.local, *.lan) fail to resolve or return NXDOMAIN.
Internal-only services are accessible by IP address but not by hostname.
Step 1: Identify if the Domain is Local
Determine if the failing domain is local-only:
Check if it ends with .local, .lan, or another internal suffix.
Check if it resolves to a private IP range (e.g., 192.168.x.x, 10.x.x.x, 172.16.x.x).
If the domain does not exist publicly and only resolves internally → local domain issue is likely.
Step 2: Test DNS Resolution with HYAS Protect
Run the following command:
CODE
nslookup printer.local
Expected Result:
If HYAS Protect is unaware of the local domain, you may see:
CODE
** server can't find printer.local: NXDOMAIN
Step 3: Compare with Local DNS or IP
Try resolving using the device’s IP directly to confirm the service is reachable: (example IP only)
CODE
ping 192.168.1.50
If the IP works but hostname does not, the issue is strictly DNS-related (likely local domain resolution).
Step 4: Check DNS Configuration
Local domains typically require resolution via internal/local DNS servers or mDNS:
Confirm whether your organization has configured search domains or conditional forwarding for local zones in HYAS Protect.
If not configured, HYAS Protect will forward these queries to public DNS and fail.
Step 5: Workarounds for Testing
Temporarily bypass HYAS Protect for local domains:
Add local DNS server IPs manually to system DNS configuration (testing only).
Alternatively, add the hostname and IP to the local hosts file (not recommended for permanent fix).
Select the device you wish to obtain troubleshooting logs for and select Actions>Run Diagnostics.
This will populate the troubleshooting logs in apprx 10 mins.
Important Notes
HYAS Protect resolvers do not handle .local or private DNS zones automatically; these must be configured or exempted by IT.
mDNS (multicast DNS) and NetBIOS-based name resolution are not forwarded by HYAS Protect and may require local network configuration.
This issue is distinct from split-horizon DNS: local domains are not public at all, while split-horizon domains are public but resolve differently internally.
Generate Troubleshooting Logs
If problems persist, generate logs for HYAS Support:
Select the device you wish to obtain troubleshooting logs for and select Actions>Run Diagnostics.
This will populate the troubleshooting logs in apprx 10 mins.
Step 1: Determine if the Issue is General or DNS-Specific
First, verify whether the connectivity problem affects all websites or only specific ones.
Open the Command Line Tool:
Windows: Press Windows + R, type cmd, and press Enter. (Alternatively, search for "Command Prompt" in the Start menu.)
macOS: Press Command + Space, type Terminal, and press Enter.
Run the Ping Command:
In the window that opens, type:
CODE
ping 8.8.8.8
On Windows, it will automatically stop after 4 replies.
On macOS, it will keep running until you stop it with Control + C.
Check the Results:
If you see replies like this, you have basic internet connectivity:
Windows:
CODE
Reply from 8.8.8.8: bytes=32 time=14ms TTL=117
macOS:
CODE
64 bytes from 8.8.8.8: icmp_seq=0 ttl=117 time=14.1 ms
If you see timeouts, your device may be offline or blocked from reaching the internet:
Windows:
CODE
Request timed out.
macOS:
CODE
Request timeout for icmp_seq 0
Step 2: Test DNS Resolution with HYAS Protect
If the ping test succeeds, test whether DNS resolution via HYAS Protect is working. The HYAS Protect Agent uses a local DNS proxy (127.0.0.1) to forward queries to HYAS resolvers.
Open the Command Line Tool:
Windows: Press Windows + R, type cmd, and press Enter. (Alternatively, search for “Command Prompt” in the Start menu.)
macOS: Press Command + Space, type Terminal, and press Enter.
Run the Nslookup Command:
In the window that opens, type:
CODE
nslookup google.com
On Windows or macOS, this queries your configured DNS server (should be HYAS Protect if properly configured).
Check the Results:
If you see a valid IP address, DNS resolution is working:
Note: Seeing 127.0.0.1 as the server is expected with the HYAS Protect Agent, because it proxies DNS through the local loopback address.
Important: HYAS Protect resolvers do not respond to ICMP (ping) requests. Use nslookup or dig to test DNS resolution — do not attempt to ping the HYAS resolvers directly.
If you see an NXDOMAIN or non-existent domain message, it may indicate blocking:
HYAS Protect may return NXDOMAIN (no such domain) if the site is blocked by policy.
Example:
CODE
** server can't find examplemalware.com: NXDOMAIN
If you see “Timed out” or “Server not found,” DNS is not responding:
Could be misconfiguration or inability to reach HYAS Protect resolvers.
Example:
CODE
DNS request timed out.
timeout was 2 seconds.
This indicates the HYAS Protect Agent cannot reach upstream DNS servers or is misconfigured. Check network connectivity or restart the agent.
Step 4 (Optional): Confirm DNS Settings
Verify that your system is correctly pointing to the HYAS Protect Agent (loopback):
Windows:
CODE
ipconfig /all
Look for 127.0.0.1 under DNS Servers.
macOS:
CODE
scutil --dns | grep 'nameserver'
Confirm the DNS server shows 127.0.0.1.
Step 5: Additional Troubleshooting
If DNS still fails after the above steps, perform deeper troubleshooting:
Enable/Disable the Agent
Temporarily disable the HYAS Protect Agent (or stop the service) and re-test connectivity.
If internet works without the agent: The issue is likely within HYAS Protect configuration or policy.
If internet still fails without the agent: Problem is unrelated to HYAS Protect (check network/firewall).
Test from Outside the Device
From another device on the same network, perform the same ping and DNS tests.
If other devices work: Issue is local to the original machine.
If other devices fail too: Check upstream network/firewall settings.
Firewall and Outbound DNS
Ensure your firewall allows outbound DNS queries (UDP/TCP port 53) to HYAS Protect resolvers.
Blocking outbound DNS will cause timeouts during nslookup.
Generate Troubleshooting Logs
HYAS Protect Agent Troubleshooting
For issues related to specific agents, please refer to the corresponding Agent Troubleshooting Guide below.
A customized block page has been enabled. However, users are receiving an SSL Cert error upon traveling to blocked domains instead of the block page.
HYAS Protect uses an SSL-intercepting proxy to display custom block pages for HTTPS sites. To do this, it generates SSL certificates on the fly. If the HYAS Root Certificate Authority (CA) is not installed on your device, this can result in browser SSL warnings or errors.
You're seeing this warning because HYAS Protect is blocking access to a site—either because it’s malicious or it violates your organization's policies—and is attempting to show a block page in its place. To properly view these block pages without SSL errors, the HYAS Root CA must be installed on your device.
You can download the HYAS Root CA and follow installation instructions at: http://ca.hyas.com
HYAS Protect Relay
When deploying the HYAS Protect Relay on a Windows machine, DNS traffic is not showing in the HYAS Protect UI.
Port 53 on each IP address supports only one listening process, in accordance with standard IP network design.
On the external interface, the HYAS Protect Relay process must occupy this port to handle incoming DNS traffic. Depending on the configuration of local domains, it can subsequently forward requests to the Windows DNS service, if necessary. However, prior to this, the Windows DNS service must cease listening on port 53.
Instructions on how to configure the Relay to listen on port 53:
Checking which processes are listening on port 53
In PowerShell, run the following command to check for processes listening on port 53 and their associated IP addresses.
In this scenario, port 53 is currently utilized by the localhost IPv4 (127.0.0.1), localhost IPv6 (::1), and the fe80:xxx IPv6 address. However, the Windows DNS server is not configured to listen on the IP address of the domain controller (10.0.10.98), as observed.
If port 53 is not currently in use by the localhost, you can configure it to do so by following these steps:
Navigate to your Windows DNS Server and right-click and select “DNS Manager”
From here, you should see all of your DNS Servers. Next, right-click each one and select “Properties”
Now, select the “Interfaces” tab:
You may need to restart the DNS service for the changes to take effect
In this example, we’ll need the Windows DNS Server to stop listening on 10.0.10.98.
To do this, unselect the check box next to 10.0.10.98 and click “OK”
You may need to restart the DNS service for the changes to take effect
Although not explicitly displayed in the user interface, it's important to note that the Windows DNS server also listens on port 53 of the IPv4 localhost (127.0.0.1) and IPv6 localhost (::1).
For this example, the dnsproxy.yaml file looks like:
The HYAS Protect Relay will be configured to bind to port 53 on the IP address 10.0.10.98 to accept DNS requests. Requests for local domains will be forwarded to 127.0.0.1, port 53, where the Windows DNS server is operational. DNS queries for non-local domains will be routed to the HYAS Protect Resolvers and thus shown in the HYAS Protect UI.
JavaScript errors detected
Please note, these errors can depend on your browser setup.
If this problem persists, please contact our support.