Agent VPN bypass URL
How to configure Agent VPN bypass URL for Operata
Agent VPN Bypass URL
Overview
When agents operate behind a VPN, Operata cannot determine their true Internet Service Provider (ISP) because the VPN masks their actual network identity. This limitation prevents identifying ISP-specific patterns or connectivity issues that may affect agent performance.
The Problem
VPNs route all traffic through their own infrastructure and assign new IP addresses to connected devices. As a result:
- All agents appear to connect from the VPN provider (e.g., ZScaler)
- The agent's true ISP and network location remain hidden
- ISP-specific connectivity patterns and issues cannot be identified
- Network troubleshooting becomes more difficult
The Solution
Operata provides a dedicated endpoint at https://agent-service.operata.io/lookup that captures the true IP address of requesting devices.
How It Works
- IP Detection: When you visit the lookup URL, it returns your device's actual network IP address
- Extension Integration: The Operata Chrome extension automatically calls this endpoint at the start of each session
- Data Collection: The system captures both the true IP address and identifies the associated ISP
Data Visibility
The collected network information appears in:
- Canvas: Displays the true Agent IP address
- Playbook Network Details: Shows comprehensive network information including ISP name (AgentISP)
Implementation Requirements
To enable this feature, configure your VPN client to bypass the lookup URL:
- Configure Split Tunneling: Set up your VPN to route calls to
https://agent-service.operata.io/lookupthrough the local network instead of the VPN tunnel - No Data Transmission: The lookup endpoint only captures IP addresses - no sensitive data is transmitted
Security Note
The VPN bypass URL is designed for IP detection only. No business data or sensitive information passes through this endpoint.
Need assistance? Contact Operata support for additional configuration details.
Updated 6 months ago
