Hi All,
Have already had a TAC case open for a while on this one but figured I would ask here in case anyone had come across anything similar.
Within the Endpoint Security server I have defined a compliance policy to put clients into restricted state if certain conditions aren't met. If non-compliant state is triggered, a restricted firewall policy is enforced which blocks access to internal networks over the VPN whilst allowing access to certain internal resources for remediation purposes (AV Updates, patch servers etc).
These firewall rules seem to work perfectly on Windows hosts and when the non-compliant state is triggered, the EPS firewall blocks connections as defined by the policy.
On Mac OS however, the locaally enforced firewall policy seems to completely ignore any encrypted (remote access) traffic and allows it all through to the internal networks. I have tried with both E84.30 and E84.70 clients but neither seem to work as intended.
Has anyone else had a similar issue and found a solution/workaround for this? I can't imagine this is intended behaviour and it's causing quite a headache as we can't really roll anything out unless it works the same for both Windows and Mac OS as we have quite a mixture of clients within the business.
Any help would be greatly appreciated, thanks.