Troubleshoot Web Access Control

Applies To: WatchGuard Advanced EPDR, WatchGuard EPDR, WatchGuard EDR, WatchGuard EPP

In the Web Access Control settings of a workstations and servers settings profile, you can limit access to specific web content categories and configure a list of URLs to allow and deny access to. However, Web Access Control might not always block access or allow access to web pages as you expect. This help topic provides information on possible causes and solutions.

Browsers and the QUIC Protocol

HTTP/3 (QUIC) is a transport layer network protocol. Web Access Control in older versions of Endpoint Security is not compatible with the QUIC protocol. Web Access Control in Endpoint Security versions 8.00.25.0001 and higher is compatible with the QUIC protocol.

To get the most recent updates and make sure that your network has the best protection, migrate all the endpoints on your network to the latest version of the protection software. This should include your servers, environments with gold images, and virtual systems.

You can add a firewall connection rule to make sure that you can use Web Access Control. For information about how to add a rule in older versions of Endpoint Security, go to the Add a Connection Rule to Block Traffic on Port 80, Port 8080, and Port 443 section of the Disable the HTTP/3 (QUIC) Protocol topic.

Browsers and DNS Over HTTPS

Known issues exist with Web Access Control and DNS over HTTPS. If Web Access Control does not block or categorize an URL as expected, and you notice that Web Access Control blocks IP addresses but not domains, verify whether DNS over HTTPS is enabled in the browser. If enabled, disable it. For information about how to disable this functionality in various browsers, go to Disable DNS over HTTPS on enterprise browsers (external link).

Browsers and DNS Over TCP

Known issues exist with Web Access Control and DNS over TCP. If Web Access Control does not block or categorize an URL as expected, and you notice that Web Access Control blocks IP addresses but not domains, you can block DNS over TCP traffic with a connection rule.

If the affected computer serves as a domain controller with DNS server functionality, do not create this rule.

To add a connection rule to block DNS over TCP traffic on port 53 (DNS):

  1. In WatchGuard Cloud, select Configure > Endpoints.
  2. Select Settings.
  3. Select Workstations and Servers.
  4. Select an existing security settings profile to edit, copy an existing profile, or in the upper-right corner of the window, click Add to create a new profile.
    The Add Settings or Edit Settings page opens.
  5. Enter a Name and Description for the profile, if required.
  6. Select Firewall (Windows computers).
  7. Enable the firewall.
  8. In Connection Rules section, enable WatchGuard rules.
  9. To add a new connection rule, click The Add icon..
  10. In the Name text box, type a name for the rule.
  11. In the Description text box, type a description of the traffic filtered by the rule.
  12. From the Action list, select Deny.
  13. From the Direction list, select Outbound.
  14. From the Zone list, select the network type for the block rules you want to apply to the user computer.
    • Public Network: Networks in public places such as airports, Internet cafés, and universities. Computers are not visible to other users on the network and some programs have limited access to the network. Protected computers require limitations around use and access, including resource and directory sharing. Endpoint Security rules are enabled or disabled according to the administrator’s criteria.
    • Trusted Network: Home or office networks when you know and trust the other users and devices on the network. Computers are visible to other computers and devices on the network. Endpoint Security rules are not applied, so there are no restrictions on sharing files, resources, or directories.
    • Detect Automatically: The network type (public or trusted) is selected automatically based on the rules specified. Click Configure rules to determine when a computer is connected to a trusted network.
  15. From the Protocol list, select TCP.
  16. From the Remote Ports list, select Custom.
  17. In the Custom text box, add port 53.
  18. Click OK.
  19. Click Save.
  20. Select the profile and assign recipients, if required.
    For more information, see Assign a Settings Profile.

Collect Information

Before you collect the information in this section for Support, you must first clear the cache of your browser and then close the browser. This makes sure that there is no cached information that could affect the Support case analysis. When you reproduce the issue, collect the information simultaneously.

If you contact Support:

To use the Urlviewer tool:

  1. Download the Urlviewer tool.
    • If your WatchGuard Endpoint Security software is 8.00.17 or earlier, download urlviewer_cyren.zip (external link).
    • If your WatchGuard Endpoint Security software is 8.00.18 or later, download urlviewer_forcepoint.zip (external link).
  1. Unpack the .EXE file to a location of your choice.
    When prompted, the password is 'panda'.
  2. Open a command window with administrator privileges.
  3. From the command prompt, browse to the location of your install.
  4. Type this command:
    WebAccessControlViewer.exe -d:1 -o:C:\urls.csv
  5. Wait for the tool to complete.
    When done, the tool generates a .CSV file at the specified path.

Screeenshot of command prompt

  1. Send the .CSV file to Support.

To use the NNSDiag tool:

You can use the NNSDiag tool to generate a diagnostic file when Web Access Control unexpectedly blocks one or more URLs. You can also use the tool to diagnose compatibility issues when you use an application other than Web Access Control to block URLs.

If Web Access Control unexpectedly cannot block one or more URLs, you can generate a diagnostic file with the NNSDiag tool and simultaneously generate a capture file with the third-party Wireshark application. For more information, go to the Wireshark section.

  1. Download the NNSDiag tool:
    • For WatchGuard Endpoint Security version 8.00.22.00xx, download this NNSDiag install package (external link).
      Use the password 'panda' to open the archive.
    • For WatchGuard Endpoint Security version 8.00.23.00xx and higher, download this NNSDiag install package (external link).
      Use the password 'panda' to open the archive.

    For information about how to determine the WatchGuard Endpoint Security version, go to Determine the Software Version.

  1. In the C:\ drive of your system, create a NNSDiag folder.
  2. Unpack the NNSDiag.exe file, then place it in the NNSDiag folder.
    When prompted, the password is 'panda'.
  3. Open a Command Prompt window with administrator privileges.
  4. From the command prompt, browse to C:\NNSDiag.
  5. Type and run this command:
    NNSDiag.exe c:\NNSDiag 5
  6. Open a web browser, then recreate the issue.
  7. Wait for the tool to complete.
    When done, the tool generates a NNSDiagResults.zip file at the specified path.
  8. Send the .ZIP file to Support.

To use the Wireshark and NNSDiag tools:

  1. If you have not already done so, download and install the NNSDiag tool.
  2. Download and install the Wireshark application from https://www.wireshark.org/download.html (external link).
  3. Start the Wireshark application.
  4. Open a Command Prompt window with administrator privileges.
  5. From the command prompt, browse to C:\NNSDiag.
  6. To start and run the NNSDiag tool for 5 minutes, type this command:
    NNSDiag.exe c:\NNSDiag 5
  7. From Wireshark, right-click the network interface and select Start Capture.

Screenshot of Wireshark application UI

  1. Open a web browser and recreate the issue. You must recreate the issue within 5 minutes of when you ran the NNSDiag command in Step 6.
  2. Wait for the NNSDiag tool to complete.
    When complete, the tool generates a NNSDiagResults.zip archive at the path you specify.
  3. From the Wireshark application, to stop the capture, click the red square icon.

Screenshot of Wireshark application UI and stop button

  1. From the Wireshark application, select File > Save As, and save the Wireshark capture as WireShark_KO.pcap.
  2. Send the NNSDiagResults.zip and WireShark_KO.pcap files to Support. Make sure to include any URLs that were used to reproduce the issue.