Endpoint Protector Knowledge Base

Below you can explore FAQs related to Endpoint Protector and find the information you need. For any other additional questions, suggestions, and improvements please contact the support team.

How to set Intercept VPN Traffic on macOS Big Sur?

Information

This only applies starting with 5.3.0.5 server version and 2.2.1.5 client version.


After the Endpoint Protector Client is installed and the desired Content Aware Policy is created, follow the next steps:

1. Reach Endpoint Protector Server and activate Deep Packet Inspection from the desired Device Control subsection: User/Computer/Group/Global Settings -> Manage Settings -> Endpoint Protector Client -> Deep Packet Inspection.



2. Go to System Configuration -> System Settings -> Deep Packet Inspection Certificate and download the CA Certificate.



3. Open Keychain Access application from your macOS and make sure System is selected.



4. Decompress the downloaded ClientCerts file.

5. Select cacert.pem file and drag and drop it on Keychain Access - > System



6. The newly added certificate will have an ‘x’ on it. Double click on it and at Trust -> When using this certificate select ‘Always Trust’.



7. Save the changes.

8. Activate Intercept VPN Traffic from the Endpoint Protector Interface.

9. Choose one option for EPP behaviour when network extension is disabled.

Note

Temporary Disable Deep Packet Inspection: Deep Packet Inspection will be temporary disabled.

Block Internet Access: will cut the Internet connection until the end user will approve Endpoint Protector Proxy Configuration. The user will have the chance to allow it after a PC restart.



10. Save the changes.

11. The following pop-up will be displayed informing the end user that a System Extension is blocked and needs to be allowed.



12. Go to System Preferences -> Security and Privacy -> General and allow the Endpoint Protector Client Extension.



13. The following screen is displayed and give Endpoint Protector Proxy Configuration Allow.



14. Intercept VPN Traffic is now successfully set.

15. It is recommended to disconnect and reconnect to the VPN after all these settings are taking effect in the Endpoint Protector Client.
Request Demo
check mark

Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.

* Your privacy is important to us. Check out our Privacy Policy for more information.