Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 9 additions & 7 deletions docs/endpointprotector/admin/agent.md
Original file line number Diff line number Diff line change
Expand Up @@ -179,7 +179,7 @@ the macOS Endpoint Protector Agent.

**Step 3 –** Decompress the downloaded file.

![Installation on macOS with Deep Packet Inspection and VPN Traffic Intercept Active](clientinstallationios.webp)
![Installation on macOS with Deep Packet Inspection and VPN Traffic Intercept Active](./systemconfiguration/ClientSoftwarePage.png)

**Step 4 –** Open the **.pkg** file and follow the installation steps and give the requested
permissions.
Expand All @@ -194,7 +194,11 @@ checkbox, and then **save** the changes.
**Device Control** > **Users/Computer/Group/Global Settings** > **Manage Settings** > **Endpoint
Protector Client** > **Deep Packet Inspection**.

![Activating Deep Packet Inspection](dpion.webp)
![Activating Deep Packet Inspection](./systemconfiguration/dpion.webp)

:::note
For more information about Deep Packet Inspection and configurable options, please visit the dedicated [documentation section for DPI](/docs/endpointprotector/admin/cap_module/deeppacket.md).
:::

**Step 7 –** Go to the **System Configuration** section, then **System Settings** > **Deep Packet
Inspection Certificate**, and download the **CA Certificate**.
Expand Down Expand Up @@ -227,7 +231,7 @@ Inspection Certificate**, and download the **CA Certificate**.
- Block Internet Access – this option will end the Internet connection until the end-user approves
the Endpoint Protector Proxy Configuration once the computer is rebooted.

![Activate Intercept VPN Traffic](interceptvpntraffic.webp)
![Activate Intercept VPN Traffic](./systemconfiguration/interceptvpntraffic.webp)

**Step 15 –** **Save** the changes.

Expand Down Expand Up @@ -255,8 +259,6 @@ macOS, you may still see EPPNotifier in the Notification settings. To remove i
right-click and select "Reset notifications."
:::

For more information about Deep Packet Inspection and configurable options, please visit the dedicated [documentation section for DPI](/docs/endpointprotector/admin/cap_module/deeppacket.md).

### Debian Based Distributions

While the installation process is similar, each distribution and version have their own
Expand Down Expand Up @@ -301,7 +303,7 @@ The following are several examples of supported distributions:

![RedHat based distributions](redhatbaseddistributionstwo.webp)

### Setting the Server IP
#### Setting the Server IP

For all RedHat-based distributions, you need to follow an additional step after executing the above
commands in order to set the Endpoint Protector Server IP.
Expand All @@ -312,7 +314,7 @@ Based on each distribution, follow the corresponding method:

![Setting the Endpoint Protector Server IP](setserveriptwo.webp)

### The Windows Subsystem for Linux
## The Windows Subsystem for Linux

The Windows Subsystem for Linux (WSL) allows you to run native Linux distributions directly within
your Windows environment. However, due to its nature, the Endpoint Protector Client cannot be
Expand Down
16 changes: 9 additions & 7 deletions docs/endpointprotector/admin/cap_module/deeppacket.md
Original file line number Diff line number Diff line change
Expand Up @@ -93,10 +93,7 @@ generated.

**Step 4 –** Reboot the endpoint to enforce a new Certificate.

:::note
Issuing the Deep Packet Inspection Certificate on Windows is handled automatically and
transparently by the Endpoint Protector Client. No additional steps are required.
:::

![Configuring the Deep Packet Inspection - Auto-refresh Certificate feature](autorefreshcert.webp)

EPP DPI module generates a certificate only at the first time a user visits a website and caches that certificate for subsequent visits to the same website. The certificate cache deletion interval can be configured in EPP Server versions 5.8.0.0 and above (please refer to this UM section [System Settings - DPI certificate](/docs/endpointprotector/admin/systemconfiguration/systemsettings) . Alternatively, the certificate cache is cleared either upon computer reboot or when the DPI feature is disabled.
Expand All @@ -105,8 +102,14 @@ Endpoint Protector employs the same criteria as the Chromium open-source web bro

If needed, this feature can be configured through the DPI Bypass option described here [Global Settings - DPI configuration](/docs/endpointprotector/admin/dc_module/globalsettings#dpi-configuration).

### DPI on Windows

## Deep Packet Inspection Certificate on macOS
:::note
Issuing the Deep Packet Inspection Certificate on Windows is handled automatically and
transparently by the Endpoint Protector Client. No additional steps are required.
:::

### DPI Certificate on macOS

Due to the latest changes in the macOS 11.0 that affect Deep Packet Inspection, a new Root
Certificate is needed in order for the Deep Packet Inspection feature to work on the mentioned macOS
Expand Down Expand Up @@ -153,8 +156,7 @@ Linux users to manually add the new certificate into the keychain. On Windows, t
be updated automatically.
:::


## Deep Packet Inspection Certificate on Linux
### DPI Certificate on Linux

Due to system-level requirements in Linux, adding the Deep Packet Inspection certificate involves
specific steps to ensure compatibility. The certificate enables Endpoint Protector to perform secure
Expand Down
Binary file modified docs/endpointprotector/admin/systemconfiguration/dpion.webp
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading