Home Troubleshooting

Troubleshooting

By KyberGate
8 articles

Certificate Installation Issues

Certificate Installation Issues KyberGate uses a CA (Certificate Authority) certificate to inspect HTTPS traffic for content filtering. This certificate must be installed and trusted on every managed device. If the certificate is missing or not trusted, students will see browser security warnings instead of the KyberGate block page. How KyberGate Uses Certificates KyberGate operates as a proxy-based MITM (Man-in-the-Middle) filter. When a device connects through the KyberGate proxy: 1. The proxy intercepts HTTPS requests 2. It presents a certificate signed by the KyberGate CA 3. If the device trusts the KyberGate CA, the connection proceeds seamlessly 4. If the CA is not trusted, the browser shows a certificate error (NET::ERR_CERT_AUTHORITY_INVALID) Verifying Certificate Installation On iPad / iPhone 1. Go to Settings → General → About → Certificate Trust Settings 2. Look for KyberGate CA in the list 3. Ensure the toggle next to it is enabled (green) 4. Also check Settings → General → VPN & Device Management for the MDM profile containing the certificate On macOS 1. Open Keychain Access (Applications → Utilities → Keychain Access) 2. Select the System keychain 3. Search for KyberGate 4. Double-click the KyberGate CA certificate 5. Expand Trust and verify it shows Always Trust for SSL On Windows 1. Press Win + R, type certmgr.msc, and press Enter 2. Navigate to Trusted Root Certification Authorities → Certificates 3. Look for KyberGate CA in the list 4. If present, double-click to verify it's valid and not expired On Chromebook 1. Go to Settings → Security and Privacy → Manage Certificates 2. Click the Authorities tab 3. Look for KyberGate CA in the list 4. Verify it shows trust for "identifying websites" Installing the Certificate Via MDM (Recommended) Apple devices (iPad, iPhone, Mac) — .mobileconfig profile: 1. In your MDM (Jamf, Mosyle, Kandji, etc.), create a Certificate payload 2. Upload the KyberGate CA certificate (.cer or .pem file) 3. Set trust level to Full Trust for SSL 4. Deploy the profile to your device groups 5. For iPads: The MDM automatically enables certificate trust — no user action needed Windows devices — GPO: 1. Open Group Policy Management on your domain controller 2. Create or edit a GPO linked to your device OU 3. Navigate to Computer Configuration → Policies → Windows Settings → Security Settings → Public Key Policies → Trusted Root Certification Authorities 4. Right-click → Import → Select the KyberGate CA certificate 5. Run gpupdate /force on target machines or wait for the next policy refresh Chromebooks — Google Admin Console: 1. Go to Google Admin Console → Devices → Chrome → Settings → Device Settings 2. Under Network → Certificates, click Upload Certificate 3. Upload the KyberGate CA .pem file 4. Select Use this certificate as an HTTPS certificate authority 5. Apply to the relevant OUs Manual Installation (Testing Only) 1. Download the certificate from your KyberGate dashboard: Settings → Certificates → Download CA Cert 2. On the device, open the downloaded file 3. Follow the OS-specific prompts to install and trust the certificate 4. Note: Manual installation is not recommended for production — use MDM for consistent deployment Tips - Always use MDM — Manual certificate installation doesn't scale and is easily removed by users - Check expiration dates — KyberGate CA certificates are valid for 10 years, but verify if you generated a custom CA - Test after deployment — Visit https://check.kybergate.com on a managed device to confirm the certificate is working - Re-enroll problem devices — If a single device has cert issues, remove the MDM profile and re-deploy it - Supervised mode (iPad) — Supervised iPads accept MDM certificates silently; unsupervised iPads may require user approval Troubleshooting | Issue | Solution | |-------|----------| | NET::ERR_CERT_AUTHORITY_INVALID in Chrome | Certificate is not installed or not trusted — follow installation steps above | | "Profile Installation Failed" on iPad | Ensure the device is supervised and enrolled in MDM | | Certificate installed but still showing errors | Restart the browser after installation; on Mac, restart the device | | Certificate not appearing in Keychain Access | Check it was imported to the System keychain, not Login | | GPO not applying on Windows | Run gpresult /r to verify the GPO is linked; check OU membership | | Certificate shows "expired" | Download a fresh certificate from the KyberGate dashboard and redeploy | Related Articles - Device Enrollment and PAC Configuration - Block Page Customization - Chrome Extension Troubleshooting

Last updated on Apr 17, 2026

Activity Logs Not Showing Data

Activity Logs Not Showing Data KyberGate's activity logs show real-time browsing activity, blocked requests, and filtering events for all managed devices. If your activity logs appear empty or incomplete, this guide will help you identify and resolve the issue. How Activity Logging Works When a managed device browses the web: 1. Traffic routes through the KyberGate proxy (via the PAC file) 2. The proxy evaluates the request against your filtering policies 3. The request is logged to Google Cloud Firestore in real-time 4. The admin dashboard queries Firestore to display activity logs If any step in this pipeline is disrupted, logs will not appear. Common Causes and Solutions 1. PAC File Not Applied to the Device The PAC (Proxy Auto-Configuration) file tells the device to route traffic through KyberGate. Without it, traffic bypasses the proxy entirely and nothing is logged. How to check: 1. On the device, go to Settings → Wi-Fi → [Network Name] → Configure Proxy 2. Verify it's set to Automatic with the KyberGate PAC URL 3. The PAC URL should look like: https://proxy.kybergate.com/pac/YOUR-ORG-ID How to fix: - Redeploy the PAC profile via MDM - For iPads: Check Settings → VPN & Device Management for the KyberGate profile - For Chromebooks: Verify the PAC URL in Google Admin Console under Network Settings 2. Device Not Registered in KyberGate Devices must be registered (enrolled) in your KyberGate dashboard to appear in logs. How to check: 1. Go to Devices → All Devices in the admin dashboard 2. Search for the device by name, serial number, or user 3. If the device is missing, it hasn't been enrolled How to fix: - Ensure the MDM profile containing the KyberGate configuration is deployed to the device - For manual enrollment, go to Devices → Add Device and follow the steps - Verify the device's serial number matches what's in your MDM 3. Firestore Timeouts or Quota Issues KyberGate stores logs in Google Cloud Firestore. Under heavy load or if quotas are exceeded, log writes may fail silently. How to check: 1. Go to Settings → System Status in the dashboard 2. Look for any Firestore connection warnings (yellow or red indicators) 3. Check if logs appear intermittently (some entries missing, but not all) How to fix: - Wait 15-30 minutes — transient Firestore issues usually resolve automatically - If persistent, contact KyberGate support to check your Firestore quota - Large districts (5,000+ devices) may need Firestore capacity upgrades 4. Bypass Domains Excluding Traffic Certain domains are configured to bypass the proxy entirely (e.g., video conferencing, speed tests). Traffic to bypass domains is not logged. How to check: 1. Go to Settings → Proxy → Bypass Domains 2. Review the list of domains that skip the proxy 3. Common bypass entries: *.zoom.us, *.teams.microsoft.com, *.speedtest.net How to fix: - If you need logging for a bypassed domain, remove it from the bypass list - Be cautious: removing video conferencing bypasses may cause performance issues - Consider using the Chrome extension for visibility into bypassed HTTPS traffic 5. Time Range or Filter Mismatch The dashboard may be showing the wrong time range or filtered to specific users/devices. How to check: 1. In Activity Logs, check the date range selector in the top right 2. Verify no user, device, or category filters are active 3. Click Clear All Filters to reset the view How to fix: - Set the date range to Today or Last 24 Hours - Remove any active filters - Check your timezone setting in Settings → General matches your local timezone 6. Chrome Extension Not Active If you rely on the KyberGate Chrome extension for logging on Chromebooks, ensure it's installed and active. How to check: 1. On the Chromebook, go to chrome://extensions 2. Look for KyberGate (v2.7.1) 3. Verify it's enabled and not showing errors How to fix: - Force-install the extension via Google Admin Console - See "Chrome Extension Troubleshooting" for detailed steps Tips - Test with a single device — When debugging, focus on one device and verify logs appear for it before checking others - Use real-time view — The Activity Logs Live tab shows events as they happen, making it easy to test immediately - Check proxy connectivity — On the device, visit http://proxy.kybergate.com/health — a successful response confirms proxy connectivity - Export logs — If logs exist but seem incomplete, export to CSV and check for gaps in timestamps - Browser matters — Only traffic routed through the proxy is logged; apps that don't respect the system proxy (some native apps) may not appear Troubleshooting Quick Reference | Symptom | Likely Cause | Solution | |---------|-------------|----------| | No logs at all | PAC not applied | Redeploy MDM proxy profile | | Logs for some devices but not others | Specific devices not enrolled | Check device enrollment status | | Intermittent missing logs | Firestore timeouts | Wait or contact support for quota check | | Specific sites not logged | Bypass domains | Review bypass list in Settings | | Logs suddenly stopped | Proxy service issue | Check System Status page | Related Articles - Device Enrollment and PAC Configuration - Chrome Extension Troubleshooting - Managing Content Filtering Policies

Last updated on Apr 17, 2026

Chrome Extension Troubleshooting

Chrome Extension Troubleshooting The KyberGate Chrome extension (v2.7.1) provides additional filtering and visibility on Chromebooks and Chrome browsers. It works alongside the proxy-based filtering to enforce policies, log activity, and display the KyberGate block page. This guide covers common issues and how to resolve them. How the Chrome Extension Works The KyberGate Chrome extension: 1. Monitors web requests within the Chrome browser 2. Enforces filtering policies even when traffic bypasses the proxy 3. Reports browsing activity back to the KyberGate dashboard 4. Displays the branded KyberGate block page for restricted sites 5. Identifies the logged-in user for per-student reporting Verifying the Extension is Installed On the Chromebook 1. Open Chrome and navigate to chrome://extensions 2. Look for KyberGate in the list 3. Verify the following: - Version: 2.7.1 (or latest) - Enabled: Toggle is ON (blue) - No errors: No "Errors" button or red warning badges 4. If the extension is present and enabled, click Details to see permissions and site access In Google Admin Console 1. Go to Google Admin Console → Devices → Chrome → Apps & Extensions 2. Select the relevant OU (Organizational Unit) 3. Search for KyberGate in the installed apps list 4. Verify the installation policy is set to Force installed Common Issues and Solutions Extension Not Installed Symptoms: Extension does not appear in chrome://extensions Solutions: 1. In Google Admin Console, verify the extension is added to the correct OU 2. Set the installation policy to Force installed (not "Available" or "Allowed") 3. Enter the correct extension ID and update URL 4. Wait 10-15 minutes for the policy to propagate, then restart Chrome on the device 5. Force a policy refresh: On the Chromebook, go to chrome://policy and click Reload policies Extension Installed but Not Filtering Symptoms: Extension shows as enabled, but blocked sites are still accessible Solutions: 1. Click the KyberGate extension icon in the Chrome toolbar 2. Check the popup status — it should show "Active — Filtering Enabled" 3. If it shows "Disconnected" or "Not Configured": - Verify the device is enrolled in the KyberGate dashboard - Check that the extension's configuration policy includes your organization's API endpoint 4. Open chrome://extensions → KyberGate → Details → Site Access - Ensure it's set to On all sites 5. Restart Chrome completely (close all windows and reopen) Extension Showing Errors Symptoms: Red "Errors" badge on the extension in chrome://extensions Solutions: 1. Go to chrome://extensions and click Errors on the KyberGate card 2. Common errors and fixes: - "Network request failed" — The device cannot reach the KyberGate API; check internet connectivity and proxy settings - "Permission denied" — The extension needs updated permissions; re-deploy via Admin Console - "Storage quota exceeded" — Clear extension data: click Details → Clear Data (logs are synced, so no data is lost) 3. Disable and re-enable the extension to reset its state 4. If errors persist, remove and re-install via Admin Console Conflicts with Other Extensions Symptoms: Filtering works intermittently, or other extensions stop working when KyberGate is active Solutions: 1. Check for conflicting extensions that also modify web requests: - Ad blockers (uBlock Origin, AdBlock Plus) - Other web filtering extensions (GoGuardian, Securly) - VPN or proxy extensions 2. Go to chrome://extensions and temporarily disable suspected conflicting extensions 3. Test if KyberGate filtering works with other extensions disabled 4. If a conflict is confirmed: - Remove the conflicting extension if it's not needed - If both are required, contact KyberGate support for compatibility guidance - In Admin Console, adjust extension load order if possible 5. Note: Running two web filtering extensions simultaneously is not recommended and can cause unpredictable behavior Extension Not Reporting Activity Symptoms: Extension is active and filtering, but no activity appears in the dashboard Solutions: 1. Check the extension popup for the sync status indicator 2. Verify the device is registered in Devices → All Devices in the dashboard 3. Ensure the Chromebook's clock is accurate — time skew can cause log sync failures 4. Check chrome://extensions → KyberGate → Details for the Permissions section - It must have permission to access browsing activity 5. Test by visiting a known-blocked site — the block event should appear in Activity Logs within 60 seconds Force-Reinstalling the Extension If all else fails, perform a clean reinstall: 1. In Google Admin Console, remove KyberGate from the OU's app list 2. Wait 5 minutes for the removal policy to propagate 3. On the Chromebook, go to chrome://extensions and verify it's gone 4. Re-add KyberGate in Admin Console with Force installed policy 5. Restart Chrome on the device 6. Verify the extension appears and shows Active status Tips - Use force-install only — "Available" or "Allowed" policies let students remove the extension - Pin to toolbar — Instruct staff to pin the KyberGate icon for quick status checks - Version mismatches — If devices are on an older version, the Admin Console auto-updates force-installed extensions; just wait for the rollout - Incognito mode — Ensure the extension is set to Allow in incognito via Admin Console policy to prevent students from bypassing filters - Guest mode — Disable guest mode on managed Chromebooks in Admin Console to prevent unfiltered browsing Troubleshooting Quick Reference | Issue | Quick Fix | |-------|-----------| | Not installed | Set to Force installed in Admin Console; reload policies | | Installed but not filtering | Check status popup; verify site access is "On all sites" | | Showing errors | Read error details; clear data or reinstall | | Conflicts with other extensions | Disable conflicting extensions; avoid running two filters | | Not reporting activity | Check device enrollment and clock accuracy | Related Articles - Activity Logs Not Showing Data - Certificate Installation Issues - Device Enrollment and PAC Configuration

Last updated on Apr 17, 2026

Device Not Appearing in Dashboard

Device Not Appearing in Dashboard When a device doesn't show up in your KyberGate dashboard after enrollment, it's usually a configuration or connectivity issue. This guide walks through systematic troubleshooting steps to get the device visible and managed. Before You Begin - Confirm the device was enrolled through your MDM (Jamf, Mosyle, Google Admin) or has the KyberGate agent installed - Have access to the physical device or remote MDM management - Know which device group the device should appear in Common Causes 1. Proxy not configured — The PAC file or proxy settings haven't been pushed to the device 2. Certificate not installed — The KyberGate root certificate is missing, preventing HTTPS inspection 3. Network issue — The device can't reach KyberGate proxy servers 4. Wrong organization — The device enrolled under a different org or PAC file URL 5. MDM profile not applied — The configuration profile is assigned but hasn't installed on the device Troubleshooting Steps Step 1: Verify Proxy Configuration For iPads: 1. On the device, go to Settings → Wi-Fi → [network name] → Configure Proxy 2. Verify it's set to Automatic with your organization's PAC file URL 3. If missing, push the proxy profile from your MDM For Chromebooks: 1. In Google Admin Console, verify the proxy setting is applied to the device's OU 2. On the Chromebook, go to chrome://policy and search for "proxy" 3. Verify the PAC file URL appears in the policy list For Windows/macOS: 1. Check that the KyberGate agent is installed and running 2. Open the agent's status icon in the system tray/menu bar 3. Verify it shows "Connected" status Step 2: Check Certificate Installation 1. Visit https://proxy.kybergate.com/health from the device 2. If you see a certificate warning, the KyberGate root cert is not installed 3. Deploy the certificate via your MDM (see Certificate Installation guide) Step 3: Test Connectivity 1. From the device, visit a website that should be blocked (e.g., a known gaming site) 2. If you see the KyberGate block page, the device IS connected — it may just take a few minutes to appear in the dashboard 3. If the site loads normally, the proxy is not active Step 4: Force a Check-in - iPads: Toggle Wi-Fi off and back on, then open Safari and visit any website - Chromebooks: Open a new Chrome tab and visit any website - Windows/macOS: Restart the KyberGate agent from the system tray/menu bar Tips - New devices typically appear in the dashboard within 2-5 minutes of their first web request through the proxy - Check Devices → All Devices (not a filtered group view) to ensure you're not missing the device due to group filters - Use the Search bar on the Devices page to search by device name, serial number, or IP address Related Articles - Network and Proxy Settings - Enrolling iPads via Jamf Pro - Enrolling Chromebooks via Google Admin - System Requirements and Supported Devices

Last updated on Apr 17, 2026

HTTPS Sites Not Being Filtered

HTTPS Sites Not Being Filtered If HTTPS websites are loading without filtering (no blocks, no logging), the issue is typically related to the SSL/HTTPS inspection certificate. KyberGate uses SSL inspection to analyze encrypted traffic, which requires a trusted root certificate on each device. Before You Begin - Confirm the issue affects HTTPS sites specifically (HTTP sites may still be filtered) - Have access to the affected device or your MDM console - Know your MDM platform and how to deploy certificates Understanding the Problem KyberGate filters web traffic by inspecting it through a cloud proxy. For HTTPS sites, the proxy must decrypt and re-encrypt traffic using a root certificate installed on the device. Without this certificate: - HTTPS sites may bypass filtering entirely - The device may show certificate warnings - Activity from HTTPS sites won't appear in logs Troubleshooting Steps Step 1: Check Certificate Installation 1. On the affected device, visit https://proxy.kybergate.com/health 2. If the page loads without warnings: The certificate is properly installed — skip to Step 3 3. If you see a certificate error: The KyberGate root cert needs to be installed or trusted Step 2: Install/Trust the Certificate For iPads (via MDM): 1. In your MDM, create a Certificate configuration profile 2. Upload the KyberGate root certificate (download from Settings → Network → Download Certificate in your dashboard) 3. Deploy the profile to your devices 4. The certificate is automatically trusted when deployed via MDM For Chromebooks: 1. In Google Admin Console, go to Devices → Chrome → Settings → Certificates 2. Upload the KyberGate root certificate 3. Check Use this certificate as an HTTPS certificate authority 4. Apply to the appropriate OUs For Windows: 1. The KyberGate Windows agent installs the certificate automatically 2. If missing, run the agent installer again or manually import the cert to Trusted Root Certification Authorities For macOS: 1. The KyberGate macOS agent installs the certificate automatically 2. If missing, download the cert and add it to Keychain Access → System → Certificates, then set trust to Always Trust Step 3: Verify Proxy Is Active 1. Check that the PAC file is properly configured (see Network and Proxy Settings guide) 2. Visit a site that should be blocked — you should see the KyberGate block page 3. If the site loads normally, the proxy configuration may be missing or overridden Step 4: Check for Conflicts - VPN apps can bypass the proxy — check if any VPN is active on the device - Other proxy settings may conflict — ensure no manual proxy is configured alongside the PAC file - Network-level SSL inspection on your school firewall may interfere — add *.kybergate.com to your firewall's SSL bypass list Tips - Always deploy certificates through MDM for automatic trust — manual installation requires additional trust steps on most platforms - After deploying a new certificate, have users close and reopen their browser - Use the Network Health Score in your dashboard to monitor SSL inspection status across your fleet Related Articles - Network and Proxy Settings - How Web Filtering Works in KyberGate - Certificate Installation Issues

Last updated on Apr 17, 2026

Students Bypassing the Filter

Students Bypassing the Filter Determined students may attempt to circumvent web filtering using various techniques. KyberGate includes multiple layers of bypass protection, but proper configuration is key to maximizing effectiveness. Before You Begin - Review your current filtering policies in Policies → Active Policies - Check if the bypass is affecting specific devices, users, or your entire fleet - Note the specific method students are using (if known) Common Bypass Methods and Solutions 1. VPN and Proxy Apps The problem: Students install VPN apps or use web-based proxies to tunnel traffic around the filter. KyberGate protection: - VPN/Proxy category is blocked by default in standard filtering policies - 130+ known VPN and proxy domains are in KyberGate's database - App Store restrictions via MDM prevent VPN app installation on managed devices Action items: 1. Verify the VPN/Proxy category is set to Block in your active policy 2. In your MDM, restrict App Store downloads to approved apps only 3. Check Activity Logs for domains containing "vpn", "proxy", or "tunnel" 2. Browser Extensions The problem: Chrome extensions can act as proxies or modify network settings. KyberGate protection: - Chrome extension monitoring via the KyberGate Chrome extension - Extension blacklisting through Google Admin Console Action items: 1. In Google Admin Console, restrict Chrome extensions to approved-only 2. Block the Browser Extensions category in your KyberGate policy 3. Review installed extensions via Devices → [device] → Extensions 3. Alternate DNS The problem: Students change DNS settings to bypass DNS-based filtering. KyberGate protection: - KyberGate uses proxy-based filtering (not just DNS), so changing DNS alone doesn't bypass the filter - MDM-locked network settings prevent DNS changes on managed devices Action items: 1. Ensure network settings are locked via MDM configuration profile 2. On school networks, block outbound DNS (port 53) to external servers at the firewall level 4. Mobile Hotspots The problem: Students connect to personal phone hotspots instead of the school network. KyberGate protection: - PAC file deployed via MDM applies on ANY network, not just school Wi-Fi - The KyberGate agent (Windows/macOS) enforces proxy settings system-wide Action items: 1. Verify PAC file is deployed via MDM (not manually configured on the school network) 2. In your MDM, restrict Wi-Fi connections to approved networks only (if supported) 5. Google Translate / Cached Pages The problem: Students use Google Translate or cached page services to view blocked content. KyberGate protection: - Known translation proxy domains are included in the filtering database - AI content analysis inspects the actual page content, not just the domain Action items: 1. Block or restrict access to translate.google.com if abuse is detected 2. Enable AI Content Analysis in your policy for real-time page scanning Monitoring for Bypass Attempts 1. Check Activity Logs regularly — filter by Blocked status to see what students are trying to access 2. Review Student Risk Scores — high-risk students may be actively attempting bypasses 3. Enable KyberPulse alerts for VPN/proxy usage patterns 4. Use Incident Timeline to see a student's complete browsing history and identify suspicious patterns Tips - The most effective anti-bypass strategy combines proxy-based filtering (KyberGate) with MDM restrictions (locked settings, app restrictions) - Review bypass attempts weekly and update your policies accordingly - Educate students about acceptable use policies — many bypass attempts decrease when students understand monitoring is active Related Articles - Creating and Managing Filtering Policies - How Web Filtering Works in KyberGate - Student Risk Scoring - KyberPulse: Real-Time Safety Alerts

Last updated on Apr 17, 2026

Slow Browsing or Connection Issues

Slow Browsing or Connection Issues If devices are experiencing slow page loads or connectivity problems while using KyberGate, the issue could be related to network configuration, proxy routing, or local network conditions. This guide helps identify and resolve common performance issues. Before You Begin - Note whether the issue affects all devices or specific ones - Check if the slowness is on all websites or specific sites - Verify your school's internet connection is working normally (test on an unfiltered device) Diagnostic Steps Step 1: Check the Network Health Score 1. In your KyberGate dashboard, go to the main Dashboard page 2. Look at the Network Health Score widget 3. A score below 80 indicates potential proxy connectivity issues 4. Click the score for details on which proxy regions may be experiencing latency Step 2: Test Without the Proxy 1. On one test device, temporarily disable the proxy (remove the PAC file or disconnect from the MDM profile) 2. Test browsing speed on the same websites 3. If browsing is fast without the proxy: The issue is proxy-related — continue to Step 3 4. If browsing is still slow: The issue is your local network or ISP — contact your network team Step 3: Check Proxy Region KyberGate automatically routes traffic to the nearest proxy region. If routing is incorrect: 1. Go to Settings → Network in your dashboard 2. Check which proxy region your devices are connecting to 3. If devices are routing to a distant region, this could cause latency 4. Contact KyberGate support to adjust geo-routing if needed Step 4: Review SSL Inspection Impact SSL inspection adds a small amount of latency to HTTPS connections. If performance is noticeably affected: 1. Check if your school firewall is ALSO performing SSL inspection — double inspection significantly impacts speed 2. Add *.kybergate.com to your firewall's SSL bypass list to prevent double-inspection 3. Consider adding high-bandwidth, low-risk domains (e.g., *.googleapis.com, *.gstatic.com) to your KyberGate bypass list Step 5: Check Device-Specific Issues If only certain devices are slow: 1. Verify the device meets minimum requirements (see System Requirements guide) 2. Check available storage — low storage can slow browsers 3. Clear browser cache and cookies 4. Restart the device 5. For Chromebooks: check chrome://system for memory and CPU usage Common Solutions | Issue | Solution | |-------|----------| | All devices slow | Check school internet connection and firewall rules | | Specific sites slow | Add to bypass list if low-risk, or check if the site itself is slow | | Intermittent slowness | Check for network congestion during peak hours (class changes, morning login) | | Slow after recent change | Review recent policy changes — complex keyword rules can add processing time | | One device slow | Clear cache, restart, check device health | Tips - Add trusted, high-bandwidth domains to your Bypass List to reduce proxy load (e.g., Google Drive, Microsoft 365) - Schedule bandwidth-intensive activities (software updates, video streaming) outside peak hours - KyberGate's 8-region proxy network is designed for low latency — if you're experiencing consistent slowness, contact support for routing optimization Related Articles - Network and Proxy Settings - Managing Bypass Domains - System Requirements and Supported Devices

Last updated on Apr 17, 2026

Block Page Not Displaying Correctly

Block Page Not Displaying Correctly When KyberGate blocks a website, it shows a branded block page with the reason for blocking and a "Request Access" button. If this page isn't appearing correctly, this guide helps diagnose and fix the issue. Before You Begin - Note what you're seeing instead of the block page (blank page, browser error, timeout, generic error) - Check if the issue affects all blocked sites or specific ones - Test on multiple devices to determine if it's device-specific or fleet-wide Understanding the Block Page KyberGate's block page features: - Cream/coral branded design with your school's name - Block reason (category, keyword match, or policy rule) - Request Access button for students to submit unblock requests - Displayed during the CONNECT phase — before the TLS handshake, so no certificate is needed for the block page itself Common Issues and Solutions 1. Blank White Page Instead of Block Page Cause: The browser is failing to load the block page resources. Solution: 1. Verify the device can reach *.kybergate.com — this domain must be accessible for the block page to load 2. Check your school firewall isn't blocking KyberGate's own domains 3. Clear the browser cache and try again 2. Browser Certificate Error Instead of Block Page Cause: The browser is attempting to establish TLS directly with the blocked domain before the proxy can serve the block page. Solution: 1. Ensure the KyberGate root certificate is installed and trusted on the device 2. Deploy the certificate via MDM for automatic trust 3. For HSTS-pinned domains (some banking, Google services), this is expected behavior — the browser's security prevents any interception 3. Connection Timeout Instead of Block Page Cause: The proxy is dropping the connection instead of serving a block page. Solution: 1. Check your proxy configuration — verify the PAC file URL is correct 2. Test connectivity to the proxy: visit https://proxy.kybergate.com/health from the device 3. If the health check fails, check your network/firewall settings 4. Generic Browser Error (ERR_PROXY_CONNECTION_FAILED) Cause: The device cannot reach the KyberGate proxy servers. Solution: 1. Verify the device has internet connectivity 2. Check that outbound ports 443, 80, and 8080 are open in your firewall 3. Ensure proxy.kybergate.com and regional proxy domains are not blocked 4. Try switching the device to a different network to isolate the issue 5. Block Page Shows but Request Access Doesn't Work Cause: The Request Access button requires connectivity to KyberGate's API. Solution: 1. Ensure api.kybergate.com is accessible from the device 2. Check that the student is logged in / identified — anonymous devices may not have the Request Access option 3. Verify Request Access is enabled in Settings → Block Page → Request Access Customizing the Block Page You can customize the block page appearance in Settings → Block Page: - Upload your school logo - Edit the block message text - Enable/disable the Request Access button - Add custom instructions or contact information Tips - Test block page appearance after any network or certificate changes - The block page works without full SSL inspection — it's served during the initial connection phase - If students report they "can't access anything," it may be a proxy connectivity issue rather than over-blocking — check the Network Health Score first Related Articles - How Web Filtering Works in KyberGate - Network and Proxy Settings - HTTPS Sites Not Being Filtered - Creating and Managing Filtering Policies

Last updated on Apr 17, 2026