VMware AirWatch Tunnel Guide Linux v8 - 4
VMware AirWatch Tunnel Guide Linux v8 - 4
AirWatch v8.4
Have documentation feedback?Submit a Documentation Feedback support ticket using the Support Wizard on
support.air-watch.com.
Copyright 2016 VMware, Inc. All rights reserved. This product is protected by copyright and intellectual property laws in the United States and other countries as well as by
international treaties. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents.
VMware is a registered trademark or trademark of VMware, Inc. in the United States and other jurisdictions. All other marks and names mentioned herein may be trademarks of their
respective companies.
1
Revision Table
The following table displays revisions to this guide since the release of AirWatch v8.4.
Date Reason
June 2016 Initial upload.
2
Table of Contents
AirWatch Tunnel Quick Start 5
Chapter 1: Overview 6
What's New 7
Introduction to AirWatch Tunnel 7
AirWatch Tunnel Technologies and Features 9
Terminology 9
3
Upgrade the AirWatch Tunnel Virtual Appliance 46
Create Network Traffic Rules 46
Access Logs and Syslog Integration 48
SSLOffloading 49
Kerberos KDC Proxy Support 50
Outbound Proxy Overview 52
RSAAdaptive Authentication 56
4
AirWatch Tunnel Quick Start
4. (Optional)Configure various AirWatch Tunnel functionality within the AirWatch Admin Console, depending on your
use cases.
See Configure AirWatch Browser for AirWatch Tunnel on page 31 and Per App Tunneling Overview on page 31.
5
Chapter 1:
Overview
What's New 7
Introduction to AirWatch Tunnel 7
AirWatch Tunnel Technologies and Features 9
Terminology 9
6
Chapter 1: Overview
What's New
This guide has been updated with the latest features and functionality from the most recent release of AirWatch v8.4. The
list below includes these new features and the sections in which they appear.
l Quickly deploy your AirWatch Tunnel configurations using the AirWatch Tunnel virtual appliance. AirWatch now
supports deploying the AirWatch Tunnel as a virtual appliance using VMware vSphere. For more information, see
Virtual Appliance Installation Overview on page 38.
l Configure how network traffic for Android devices routes through the AirWatch Tunnel. AirWatch now supports
configuring network traffic rules to control how traffic for specified domains is routed through the AirWatch Tunnel.
For more information, see Create Network Traffic Rules on page 46.
l Send communication from the AirWatch Tunnel to the AirWatch API server or AWCM using an outbound proxy when
AirWatch Tunnel is configured for Per-App Tunnel. For more information, see Configure Advanced Settings on page
28.
l Other internal resources to gather Business Intelligence (BI)data, provide secure transactions, or fetch the most
recent corporate updates from mobile applications.
Information Technology (IT) departments are faced with the challenges of providing widespread levels of access to their
users. They must also address the many security concerns that arise by providing this level of access to a fleet of devices.
In addition, many of the most common solutions such as SSL-VPN technology do not let you selectively provide access
between different applications on mobile devices. Key concerns are the loss of corporate data into personal apps and the
possibility of malware infecting your corporate network. To ensure that data-loss protection and infrastructure health are
maintained, IT requires a solution to provide mobile access in a way that can:
l Provide access-control so that only approved and compliant devices may access the corporate network.
l Provide access to only business applications to prevent data-leakage as a result of unauthorized personal
applications accessing corporate resources.
l View real-time updates of when and where mobile devices are accessing enterprise resources.
7
Chapter 1: Overview
l Any other enterprise system accessible over HTTP(S) from your business applications through AirWatch App
Wrapping.
l In addition, with the Per-App Tunneling component of AirWatch Tunnel (Linux only)you can allow iOS and Android
devices to use both internal and public applications to access corporate resources in your internal network. The
AirWatch Tunnel mobile app supports both TCPtraffic and HTTP(S)traffic for per app tunneling.
The AirWatch Tunnel allows individual applications to authenticate and securely communicate with back-end resources
over HTTP(S) for proxy and HTTP(S)or TCPfor per app tunneling.
The AirWatch Tunnel also helps to enable BYOD in your organization. By separating access between personal and
business applications and data on your device, a device can be thought of as having two owners: an employee with
business needs and an ordinary user with personal needs. The AirWatch Tunnel allows business applications to access
your enterprise systems over HTTP(S) but keep end-user personal applications segregated by preventing enterprise
access. Further still, per app tunneling enables you to deploy managed public apps so end users can access internal
resources on third-party apps while ensuring all traffic remains secure.
Because the AirWatch Tunnel is architected as part of AirWatch Enterprise Mobility Management (EMM), administrators
can view an intuitive and action-oriented display of mobile access information directly from the AirWatch Admin Console.
System administrators are put in the position of managing proactively instead of reactively by easily identifying at-risk
devices and managing exceptions.
8
Chapter 1: Overview
Terminology
AirWatch Tunnel consists of two major components that are referenced frequently throughout this document.
Understanding the functionality that these components reference will aid your comprehension of this guide.
9
Chapter 1: Overview
l Virtual Appliance A virtual appliance is a preconfigured virtual machine that is ready to run on a hypervisor such as
VMware vSphere. Deploy AirWatch Tunnel as a virtual appliance through either the vSphere Web client or using a
PowerShell script. Virtual appliances do not require specific hardware or software as they are self-contained and
configure the proper hardware requirements upon deployment.
l Content A component that was previously a feature of the Mobile Access Gateway that is called the AirWatch
Content Gateway. For more information, see the VMware AirWatch Content Gateway Admin and Installation
guides, available on AirWatch Resources.
l App tunnel / app tunneling A generic term used to describe the act of creating a secure "tunnel"through which
traffic can pass between an end-user device and a secure internal resource, such as a Web site or file server.
l SaaS refers to AirWatch deployments where AirWatch hosts certain AirWatch components, such as the Console and
APIservers, in the cloud.
10
Chapter 2:
Architecture and Security
Architecture and Security Overview 12
Deployment Models 12
Proxy (SDK/Browser)Architecture and Security 14
Per App Tunnel Architecture and Security 15
Security and Certificates 15
11
Chapter 2: Architecture and Security
Deployment Models
Both SaaS and on-premises AirWatch environments support the basic and relay-endpoint deployment models. The
AirWatch Tunnel must have a publicly accessible endpoint for devices to connect to when making a request. Basic
deployment models have a single instance of AirWatch Tunnel configured with a public DNS. Alternatively, for the relay-
endpoint deployment model, the public DNS is mapped to the relay server in the DMZ. This server communicates with
your API and AWCM servers. For SaaS deployments, AirWatch hosts the API and AWCM components in the cloud. For an
on-premises environment, the AWCM component is typically installed in the DMZ with the API.
Basic Endpoint
The basic endpoint deployment model of AirWatch Tunnel is a single instance of the product installed on a server with a
publicly available DNS. Basic AirWatch Tunnel is typically installed in the internal network behind a load balancer in the
DMZ that forwards traffic on the configured ports to the AirWatch Tunnel, which then connects directly to your internal
Web applications. All deployment configurations support load balancing and reverse proxy.
The basic endpoint Tunnel server communicates with API and AWCM to receive a whitelist of clients allowed to access
AirWatch Tunnel. Both proxy and per app tunnel components support using an outbound proxy to communicate with
API/AWCM in this deployment model. When a device connects to AirWatch Tunnel, it is authenticated based on unique
X.509 certificates issued by AirWatch. Once a device is authenticated, the AirWatch Tunnel (basic endpoint) forwards the
request to the internal network.
If the basic endpoint is installed in the DMZ, the proper network changes must be made to allow the AirWatch Tunnel to
access various internal resources over the necessary ports. Installing this component behind a load balancer in the DMZ
minimizes the number of network changes to implement the AirWatch Tunnel and provides a layer of security because
the public DNS is not pointed directly to the server that hosts the AirWatch Tunnel.
12
Chapter 2: Architecture and Security
Relay-Endpoint
The relay-endpoint deployment model architecture includes two instances of the AirWatch Tunnel with separate roles.
The AirWatch Tunnel relay server resides in the DMZ and can be accessed from public DNS over the configured ports (by
default this port is 8443 for per app tunnel and 2020 for proxy). The AirWatch Tunnel endpoint server is installed in the
internal network hosting intranet sites and Web applications. This server must have an internal DNS record that can be
resolved by the relay server. This deployment model separates the publicly available server from the server that connects
directly to internal resources, providing an added layer of security.
The relay server role includes communicating with the API and AWCM components and authenticating devices when
requests are made to AirWatch Tunnel. In this deployment model, AirWatch Tunnel supports an outbound proxy for
communicating with API and AWCM from the relay. The per app tunnel service must communicate with API and AWCM
directly. When a device makes a request to the AirWatch Tunnel, the relay server determines if the device is authorized to
access the service. Once authenticated, the request is forwarded securely using HTTPS over a single port (the default port
is 2010) to the AirWatch Tunnel endpoint server.
The role of the endpoint server is to connect to the internal DNS or IP requested by the device. The endpoint server does
not communicate with the API or AWCM unless Enable API and AWCM outbound calls via proxy is set to Enabled in
the AirWatch Tunnel settings in the AirWatch Admin Console. The relay server performs health checks at a regular
interval to ensure that the endpoint is active and available.
These components can be installed on shared or dedicated servers. Install AirWatch Tunnel on dedicated Linux servers to
ensure that performance is not impacted by other applications running on the same server. For a relay-endpoint
deployment, the proxy and per app tunnel components are installed on the same relay server. Only the proxy
component is installed on the endpoint server. The per app tunnel relay component uses the proxy endpoint to connect
to internal applications, so the components share a relay-endpoint port and the same endpoint hostname.
13
Chapter 2: Architecture and Security
Load Balancing
The AirWatch Tunnel can be load balanced for improved performance and high availability. The per app tunnel
component requires authentication of each client after a connection is established. Once connected, a session is created
for the client and stored in memory. The same session is then used for each piece of client data so the data can be
encrypted and decrypted using the same key. When designing a load balancing solution, the load balancer must be
configured with IP/session based persistence enabled. The load balancer sends data from a client to the same server for
all its traffic during the connection. An alternative solution might be to on the client side use DNS round robin, which
means the client can select a different server for each connection.
The proxy component authenticates devices based on HTTP header information in the request. Ensure that the load
balancer is configured to Send Original HTTP Headers so that these headers are not removed when going through the
load balancer to AirWatch Tunnel.
14
Chapter 2: Architecture and Security
HTTPSTunneling is enabled by default. Enter your desired port for the Default HTTPSPort during AirWatch
Tunnelconfiguration, as described in AirWatch Tunnel Configuration.
The current authentication scheme requires the use of a chunk aggregator of fixed size. A low value puts restrictions on
the amount of data that is sent from the devices in a single HTTP request. By contrast, a high value causes extra memory
to be allocated for this operation. AirWatch uses a default optimum value of 1 MB, which you can configure based on
your maximum expected size of upload data. Configure this value in the mag.properties file on the AirWatch Tunnel
Proxyserver in the /conf directory.
l Setup authorization is restricted to admin accounts with a role enabled for an AirWatch Tunnel setup role (see
preliminary steps).
2. AirWatch generates a unique identity certificate pair for both the AirWatch and AirWatch Tunnel environments.
l The AirWatch certificate is unique to the group selected in the AirWatch Admin Console.
3. AirWatch sends the unique certificates and trust configuration back to the AirWatch Tunnel server over HTTPS.
The AirWatch Tunnel configuration trusts only messages signed from the AirWatch environment. This trust is unique
per group.
Any additional AirWatch Tunnel servers set up in the same AirWatch group as part of a highly available (HA)load-
balanced configuration are issued the same unique AirWatch Tunnel certificate. For more information about high
availability, refer to the VMware AirWatch On-Premises Configuration Guide, available on AirWatch Resources.
15
Chapter 2: Architecture and Security
5. For Proxy:The certificate an application uses to authenticate with the AirWatch Tunnel is only provided after the
application attempts to authenticate with the AirWatch enrollment credentials for the first time.
For Per App Tunnel:The certificate is generated at the time of profile delivery.
6. AirWatch Tunnel gets the chain during installation. The AirWatch Tunnel installer is dynamically packaged and picks
these certificates at the time of download.
7. Communication between the AirWatch Tunnel and device-side applications (includes AirWatch Browser and wrapped
applications using app tunneling) is secured by using the identity certificates generated during installation. These
identity certs are child certificates of the Secure Channel Root certificate.
8. AirWatch Tunnel makes an outbound call to the AWCM/API server to receive updated details on the device and
certificates. The following details are exchanged during this process: DeviceUid, CertThumbprint,
applicationBundleId, EnrollmentStatus, complianceStatus.
9. AirWatch Tunnel maintains a list of devices and certificates and only authenticates communication if it sees a
certificate it recognizes.
X.509 (version 3) digitally signed client certificates are used for authentication.
16
Chapter 3:
Installation Preparation
Installation Preparation Overview 18
Perform Preliminary Installation Steps in the Admin Console18
AirWatch Tunnel Virtual Appliance System Requirements 19
17
Chapter 3: Installation Preparation
Important:If you are an on-premises customer, do not configure AirWatch Tunnel at the Global organization group
level. Configure AirWatch Tunnel at the Company level or Customer type organization group. The RESTAPIkey can
only be generated at a Customer type organization group.
1. Navigate to Groups &Settings > All Settings > System > Advanced > Site URLs in the AirWatch Admin Console.
18
Chapter 3: Installation Preparation
3. Select Save.
4. Navigate to Groups &Settings > All Settings > System > Advanced > API > REST API and select the Override radio
button.
5. Ensure that the Enable APIAccess check box is selected and an APIKey is displayed in the text box.
6. Select Save.
19
Chapter 3: Installation Preparation
Are you migrating from a Linux server to the virtual appliance? Follow the AirWatch migration flow for migrating
to the virtual appliance. For more information, see https://support.air-watch.com/articles/100052167-AirWatch-
Tunnel-Linux-Virtual-Appliance-Migration-Plan.
Hypervisor Requirements
The AirWatch Tunnel virtual appliance requires VMware vSphere to deploy the virtual appliance.
Devices AirWatch Tunnel Per TCP 844 After installation, run the following command to
(from App Tunnel 3* validate:
Internet 1
and Wi-Fi) netstat -tlpn | grep [Port]
20
Chapter 3: Installation Preparation
21
Chapter 3: Installation Preparation
2. For the AirWatch Tunnel to query the AirWatch Admin Console for compliance and tracking purposes.
3. For AirWatch Tunnel Relay topologies to forward device requests to the internal AirWatch Tunnel endpoint only.
5. The AirWatch Tunnel must communicate with the API for initialization. Ensure that there is connectivity between the
RESTAPIand the AirWatch Tunnel server. Navigate to Groups & Settings > All Settings > System > Advanced > Site
URLS to set the REST API server URL.
22
Chapter 3: Installation Preparation
l With two network interfaces, external traffic is on one subnet, and internal and management traffic are on another
subnet.
l Using three network interfaces is the most secure option. With a third NIC, external, internal, and management
traffic all have their own subnets.
23
Chapter 4:
Tunnel Configuration
Configuration Overview 25
Configure AirWatch Tunnel 25
Configure Advanced Settings 28
Configure AirWatch Browser for AirWatch Tunnel 31
Per App Tunneling Overview 31
24
Chapter 4: Tunnel Configuration
Configuration Overview
After completing the steps in the Installation Preparation section, you can configure AirWatch Tunnel settings per your
deployment's configuration and functionality needs in the AirWatch Admin Console.
Configure the AirWatch Tunnel installer in the AirWatch Console under Groups & Settings > All Settings > System >
Enterprise Integration > AirWatch Tunnel. The wizard walks you through the installer configuration step-by-step. The
options configured in the wizard are packaged in the installer, which you can download from the AirWatch Admin
Console and move to your Tunnel servers. Changing the details in this wizard typically requires a reinstall of the AirWatch
Tunnel with the new configuration.
To deploy the AirWatch Tunnel, you need the details of the server where you plan to install. Before configuration,
determine the deployment model, one or more hostnames and ports, and which features of AirWatch Tunnel to
implement, such as access log integration, NSX integration, SSL offloading, enterprise certificate authority integration,
and so on. Because the wizard dynamically displays the appropriate options based on your selections, the configuration
screens may display different text boxes and options.
After you complete the AirWatch Tunnel configuration, you also must configure various settings to enable the AirWatch
Browser and per app tunnel-enabled apps to use AirWatch Tunnel. Doing so ensures all HTTP(S) and TCP traffic for the
specified applications is routed through the AirWatch Tunnel.
2. On the ConfigurationType screen, select the components that you want to configure.
Your options are Proxy and Per-App Tunnel. Depending on your selections, the following screens may display
different text boxes and options. In the drop-down menus that display, select whether you are configuring a Relay-
Endpoint or Basic deployment for each component. Select the information icon to see an example for the selected
type.
3. Select Next.
25
Chapter 4: Tunnel Configuration
Setting Description
Endpoint The internal DNSof the Tunnel endpoint server. This value is the hostname that the relay server
Host Name connects to on the relay-endpoint port. If you plan to install the AirWatch Tunnel on an
SSLoffloaded server, enter the name of that server in place of the Host Name.
When you enter the Host Name, do not include a protocol, such as http://, https://, etc.
Relay Port The proxy service is installed on this port. Devices connect to the <relayhostname>:<port> to use the
(HTTPS) AirWatch Tunnel proxy feature. The default value is 2020.
Relay- (Relay-Endpoint only). This value is the port used for communication between the AirWatch Tunnel
Endpoint relay and AirWatch Tunnel endpoint. The default value is 2010.
Port Relay-endpoint port for proxy must be the same value as the relay-endpoint port for per app tunnel.
Advanced Proxy Configuration Details
Use Enable Kerberos proxy support to allow access to Kerberos authentication for your target back end
Kerberos Web services. This feature does not currently support Kerberos Constrained Delegation (KCD). For
Proxy more information, see Kerberos KDC Proxy Support.
The Endpoint server must be on the same domain as KDC for the Kerberos Proxy to communicate
successfully with the KDC.
Realm This text box only displays if you enable Use Kerberos Proxy. Enter the domain of the KDCserver.
PER - APP TUNNELING CONFIGURATION
Relay Host (Relay-endpoint only). Enter the FQDNof the public host name for the Tunnel relay server, for
Name example, tunnel.acmemdm.com. This hostname must be publicly available as it is the DNS that
devices connect to from the Internet.
Host Name This is the internal DNS of the Tunnel endpoint server.
/ Endpoint When entering the Host Name, do not include protocol (http://, https://, and so on).
Host Name
Port (Relay The default value is 8443. This value is the port number assigned for communication with the
Port) AirWatch Tunnel component.
Relay- (Relay-endpoint only). This value is the port used for communication between the AirWatch Tunnel
Endpoint relay and the Per App Tunnel endpoint. The default value is 2010.
Port The relay-endpoint port for proxy must be the same value as the relay-endpoint port for per app
tunnel.
If AirWatch Content Gateway and is installed on the same server as AirWatch Tunnel, then this port
value must be different from the relay-endpoint port used for the Content Gateway. The default
relay-endpoint port for Content Gateway is 443.
5. Select Next.
6. On the SSL screen, configure the following settings to select the certificates that secure client-server communication
from enabled application on a device to the AirWatch Tunnel.
26
Chapter 4: Tunnel Configuration
Setting Description
PROXY (APP WRAPPING / BROWSER / SDK) SSL CERTIFICATE
Default By default, this setup uses an AirWatch certificate for secure server-client communication.
AirWatch issues a certificate for the hostname configured on the Details screen.
Use Public Enable this option if you prefer to use a third-party SSLcertificate for encryption between
SSLCertificate AirWatch Browser or SDK-enabled apps and the AirWatch Tunnel server.
Upload a .PFX or .P12 certificate file and enter the password. This file must contain both your
public and private key pair. CER and CRTfiles are not supported.
PER - APP TUNNELING SSL CERTIFICATE
Default By default, this setup uses an AirWatch certificate for secure server-client communication.
AirWatch issues a unique certificate for the hostname configured on the Details screen.
To use the Default option, select Next, and certificates are generated automatically.
Use Public Enable this option if you prefer to use a third-party SSLcertificate for encryption between
SSLCertificate AirWatch Browser or SDK-enabled apps and the AirWatch Tunnel server.
Upload a .PFX or .P12 certificate file and enter the password. This file must contain both your
public and private key pair. CER and CRTfiles are not supported.
SANcertificates are not currently supported. Certificates must be either issued to the AirWatch
Tunnel Hostname or a valid wildcard certificate for the corresponding domain.
The Tunnel Device Root Certificate is automatically generated when you select Next to continue
to the Authentication section.
7. Select Next.
8. On the Authentication screen, configure the following settings to select the certificates that devices use to
authenticate to the AirWatch Tunnel.
l Proxy Authentication / Per-App Tunnel Authentication By default, all the components use AirWatch issued
certificates. To use Enterprise CAcertificates for client-server authentication, select the Enterprise CAoption.
o Select Default to use AirWatch issued certificates.
o Select Enterprise CAin place of AirWatch-issued certificates for authentication between the AirWatch
Browser, per app tunnel-enabled apps, or SDK-enabled apps and the AirWatch Tunnel requires that a
certificate authority and certificate template are set up in your AirWatch environment before configuring
AirWatch Tunnel.
Select the certificate authority and certificate template that are used to request a certificate from the CA.
Upload the full chain of the public key of your certificate authority to the configuration wizard.
The CA template must contain CN=UDID in the subject name. Supported CAs are ADCS, RSA, and SCEP. For
more information about integrating with your certificate provider, see the Certificate Management
documentation for your CA, available on AirWatch Resources in the Certificate Management section.
9. Select Next.
10. On the Profile Association screen, you can optionally create a new iOSor Android VPNprofile or select an existing
27
Chapter 4: Tunnel Configuration
one. For a device to take advantage of per app tunnel functionality, it must be issued with a device profile with a
VPNpayload configured that uses AirWatch Tunnel as the VPNprovider. These profiles can also be created after the
AirWatch Tunnel configuration is complete.
Select the platform, then select whether to Create New Profile or Use Existing. The Create New Profile option
creates a device profile in Devices > Profiles > List View. This profile is assigned to the organization group where you
configure AirWatch Tunnel and the deployment type is set to On Demand. If you choose to create one or more
profiles now, refer to the Configuring Per App Tunnelingwith AirWatch Tunnel section of the VMware AirWatch
Tunnel Admin Guide for more details.
The profile is only created with this step you still must publish it manually. By default any profiles you create on this
screen are assigned to all devices at the current organization group. You can edit these profiles manually after
completing AirWatch Tunnel configuration.
12. On the Miscellaneous screen, you can enable access logs for the proxy or per app tunnel components. If you intend
to use this feature you must configure it now as part of the configuration, as it cannot be enabled later without
reconfiguring Tunnel and rerunning the installer. For more information on these settings, refer to the Access Logs
and Syslog Integration and Configuring Advanced Settings sections.
For per app tunneling, you can also configure NSXCommunication, which is the integration between AirWatch and
VMware NSX to achieve micro-segmentation. For more information on this integration, refer to the VMware
AirWatch and VMware NSXIntegration Guide.
13. Select Next, review the summary of your configuration, confirm that all hostnames, ports and settings are correct,
and select Save. The installer is now ready to download on the AirWatch Tunnel configuration screen.
14. If you plan to use SSLoffloading for the AirWatch Tunnel proxy component, select the Advanced tab on the Tunnel
Configuration screen and select Export Proxy Certificate. Then, import this certificate on the server performing SSL
offloading. (This server can be a load balancer or reverse proxy.)
15. Select the General tab and then select the Download Virtual Appliance hyperlink. This button downloads the OVA
file used for deploying AirWatch Tunnel on to relays and endpoints. The download file also includes the PowerShell
script and .ini template file for the PowerShell deployment method.
For legacy installer methods, select Download Linux Installer. This button downloads a single TAR file used for
deploying the relay and endpoints. You must also confirm a certificate password that is used during installation. The
password must contain a minimum of six characters.
28
Chapter 4: Tunnel Configuration
must restart the AirWatch Tunnel service for the changes to take effect.
1. Navigate to Groups &Settings > All Settings > System > Enterprise Integration > AirWatch Tunnel > Configuration
and select the Advanced tab.
Adaptive Auth Enter the RSAadmin account password for the user name you entered.
Admin Password This setting displays after you enable RSAAdaptive Auth Integration.
29
Chapter 4: Tunnel Configuration
3. If applicable, configure the following Kerberos Proxy settings, which display only if you select Use Kerberos Proxy
during the AirWatch Tunnel configuration. If the realm info you entered during configuration does not work
properly, you can enter the KDCIPaddress here, which overrides the information that you provided during
configuration.
You must reinstall the AirWatch Tunnel after changing these settings. A restart does not work.
Setting Description
KDCServer IP Enter your KDCServer IPaddress.
This text box displays only if you select Use Kerberos Proxy during AirWatch Tunnel
configuration.
Kerberos Proxy Enter the port over which AirWatch Tunnel can communicate with your Kerberos Proxy.
Port This text box displays only if you select Use Kerberos Proxy during AirWatch Tunnel
configuration.
5. If applicable, configure the following Relay - Endpoint Authentication Credentials settings, which are used for
authentication between the relay and endpoint servers. These text boxes are pre-populated for you after
configuration, but you can change them, for example, to meet your organization's password strength requirements.
Setting Description
Username Enter the user name used to authenticate the relay and endpoint servers.
Password Enter the password used to authenticate the relay and endpoint servers.
6. Select Save.
30
Chapter 4: Tunnel Configuration
2. Select Enabled for AirWatch App Tunnel and specify the App Tunnel Mode as AirWatch Tunnel Proxy.
3. (Optional) Enable the split tunnel for iOSdevices by entering URLs into the App Tunnel Domains text box. If a URL
that is about to be invoked contains a domain that matches the list in the settings, this URL request goes through
the AirWatch Tunnel. If the URL domain does not match the domain in the list, it goes directly to the Internet. Leave
the text box empty to send all requests through the AirWatch Tunnel.
4. Select Save.
5. Ensure the AirWatch Browser is using the Shared SDK profiles for iOSand Android by navigating to Groups
&Settings > All Settings > Apps > AirWatch Browser and selecting them under SDKProfile.
2. Next, you need to create an AirWatch Tunnel VPNprofile for your iOSor Android devices. Here is where you can
select the Per-App VPN check box to enable app tunneling for apps and the Safari Domains (for iOS)from which end
users can connect to internal resources.
3. Finally, you need to push any apps that you want to enable with app tunnel functionality from the AirWatch Admin
Console. A Use VPN check box on the Deployment tab of the Add Application page tells the application to use app
tunneling.
31
Chapter 4: Tunnel Configuration
Additional Details
An on-demand feature lets you configure apps to connect automatically using AirWatch Tunnel when launched. The
connection remains active until a time-out period of receiving no traffic, then it is disconnected. When using AirWatch
Tunnel, no IPaddress is assigned to the device, so you do not need to configure the network or assign a subnet to
connected devices.
In addition, iOS apps can use the iOSDNSService to send DNS queries through the AirWatch Tunnel server to the
DNSserver on a corporate network. This allows applications such as Web browsers to use your corporate DNSserver to
look up IPaddress of your internal Web servers.
2. Configure the profile's General settings. Consider setting the Deployment type for this profile to Auto so end-users
receive it automatically.
These settings determine how the profile is deployed and who receives it. For more information on General settings,
refer to the VMware AirWatch Mobile Device Management Guide, available on AirWatch Resources.
4. Enter a Connection Name, which is the name that displays on the user's device in the AirWatch Tunnel application,
and select AirWatch Tunnel as the Connection Type.
The Server text box populates automatically with your AirWatch Tunnel component server URL.
6. Configure Safari Domains, which are the Web sites that trigger an automatic VPNconnection. Do not include the
protocol (for example, http, https) as part of the domain name. For example, a valid domain entry might
be:acme.com
Select the Add icon (+)to enter multiple domains. Wildcards are supported.
What to do next
Configure an internal or public app to use the profile when making connections to the domains you specified.
32
Chapter 4: Tunnel Configuration
1. Navigate to Devices > Profiles > List View > Add and select Android or Android for Work.
4. Enter a Connection Name and select AirWatch Tunnel as the Connection Type.
The Server text box populates automatically with your AirWatch Tunnel component server URL. If this component is
not configured, you see a message and hyperlink to the system settings page where you can configure it.
What to do next
Configure an internal or public app to use the profile when making connections.
4. On the Deployment tab, select Use VPN and then select theprofile you created.
5. Select Add Assignment and select Per-App VPN Profile in the Advanced section.
33
Chapter 4: Tunnel Configuration
Note: AirWatch Tunnel for iOS does not currently support UDP traffic.
Requirements
l iOS 8.0+
l Ensure you are on the latest AirWatch version for optimal functionality.
The AirWatch Tunnel displays as Connected whenever an end user opens a managed app that you configured to use the
App Tunnel profile or a Safari domain that you set to connect automatically.
34
Chapter 4: Tunnel Configuration
Requirements
l Android Agent v5.3+
l Android 4.4+
l Ensure you are on the latest AirWatch version for optimal functionality.
Important:If you are using Per App Tunnel with Android (and in the future, Windows) devices in a relay-endpoint
setup, then ensure that your internal DNSis exposed to the AirWatch Tunnel relay server in the DMZ.
For basic endpoint setups, ensure that your internal DNSis exposed to the AirWatch Tunnel server in the DMZ.
For more information, see the following AirWatch Knowledge Base article:https://support.air-
watch.com/articles/98834728-Per-app-VPN-requires-internal-DNS-resolution-for-Android.
35
Chapter 4: Tunnel Configuration
The AirWatch Tunnel displays as Connected whenever an end user opens a managed app that you configured to use the
App Tunnel profile or a domain that you set to connect automatically.
36
Chapter 5:
Virtual Appliance Installation
Virtual Appliance Installation Overview 38
Deploy AirWatch Tunnel using vSphere 38
PowerShell Virtual Appliance Deployment 40
37
Chapter 5: Virtual Appliance Installation
Note: AirWatch Tunnel deploys using a hardened, VMware appliance. For more information on the hardening of this
appliance, see the Deploying and Configuring Access Point guide on http://pubs.vmware.com/accesspoint-
27/index.jsp.
Note: If you are using Relay-Endpoint configuration and use an outbound proxy to reach the API server, deploy the
AirWatch Tunnel endpoint before you deploy the relay.
3. Select the folder where you want to deploy the virtual appliance OVA file. Right-click the file and select Deploy OVF
Template.
4. Select the OVA file on your local machine or enter the URL for the OVA file. Click Next.
6. Enter a unique Name for the deployment then select the folder or data center to hold the OVA file and select Next.
7. Select the number of Network Interface Controllers (NICs) you want to associate with the appliance for your
deployment configuration. Click Next.
For best results, consult your network admins. Using three NICs provides the most security.
38
Chapter 5: Virtual Appliance Installation
Settings Descriptions
Virtual Disk Format For evaluation and testing, select the Thin Provision format.
For production environments, select one of the Thick Provision formats
VM Storage Policy The values in this text box are defined by your vSphere administrator.
Click Next.
d. (Optional) Customize the AirWatch Outbound Proxy Settings if you use an outbound proxy to make the initial
39
Chapter 5: Virtual Appliance Installation
10. Review the OVA settings. Select the Power on after deployment check box if you want to have the AirWatch Tunnel
server power on after deployment finishes.
2. Right click the file and select Open With. Select notepad or your preferred file editor.
40
Chapter 5: Virtual Appliance Installation
Settings Descriptions
vSphere Settings
name=<VIRTUAL_MACHINE_NAME> Enter the virtual appliance unique name.
Example: name=TunnelAppliance
source=<OVA_FILE_PATH> Enter the full file path to the OVA file on your local
machine.
Example: source=C:\access-point.ova
target=vi://<USERNAME>:PASSWORD@<VSPHEREDO Enter the vCenter user name and address/hostname.
MAIN>/ Then enter the location to place the appliance in vSphere.
<LOCATION/TO/PLACE/APPLIANCE/IN/VSPHERE>
Do not remove the PASSWORD. PASSWORD in upper
case results in a password prompt during deployment so
that passwords do not need to be specified in this INI file.
Example:
target=vi://[email protected]:PASSWORD@vsphere.
com
/MyMachines/host/Development/Resources/MyResour
cePool
41
Chapter 5: Virtual Appliance Installation
Settings Descriptions
deploymentOption=<NUMBER_OF_NICS> Enter the number of Network Interface Controllers you
dns=<DNS_IP> want to associate with the appliance for your deployment
configuration. Your options are:
ip0=<NIC1_IP_ADDRESS>
ip1=<NIC2_IP_ADDRESS> l onenic
ip2=<NIC3_IP_ADDRESS> l twonic
l threenic
Then enter the address for each NIC you are using. Delete
the excess lines if you are not using all three.
The different IP addresses entered change based on your
NIC settings.
l If you use one NIC, then the IP address is used for all
communications.
42
Chapter 5: Virtual Appliance Installation
Settings Descriptions
tunnelProxyEnabled=<true_or_false> Enter true if you are using the AirWatch Tunnel Proxy
component.
Example: tunnelProxyEnabled=true
apiServerUrl=<API_SERVER_URL> Enter the API server URL.
apiServerUsername=<API_SERVER_USERNAME> Enter the user name of an AirWatch Admin user account.
This user is an admin user with API permissions.
organizationGroupCode=<ORGANIZATION_GROUP_ Enter the Organization Group ID the AirWatch Tunnel is
CODE> configured for.
airwatchServerHostname= <HOSTNAME> Enter the hostname or IP address for the virtual
appliance. Ensure that this field matches what is entered
in the AirWatch Admin Console to prevent installation
issues.
outboundProxyPort=<OUTBOUND_PROXY_PORT> Enter the outbound proxy port if you use an outbound
proxy for the initial setup API call or for tunnel traffic.
This field is commented out by default.
outboundProxyHost=<OUTBOUND_PROXY_HOST> Enter the outbound proxy host if you use an outbound
proxy for the initial setup API call or for tunnel traffic.
This field is commented out by default.
airwatchOutboundProxy=<true or false> Enter true if you want to route tunnel traffic through an
outbound proxy for the initial setup API call or for tunnel
traffic.
This field is commented out by default.
ntlmAuthentication=<true or false> Enter true if you use NTLM authentication for the initial
setup API call or for tunnel traffic.
This field is commented out by default.
4. Save the file in the same folder as the PowerShell script and run the PowerShell script.
Note: If you are using an outbound proxy to the API server, deploy the AirWatch Tunnel endpoint before you deploy
the relay.
43
Chapter 5: Virtual Appliance Installation
Prerequisites
l Windows administrator privileges
l PowerShell 4
l Configured .ini template file to pass the configuration values to the appliance (part of the OVA download package
available on AirWatch Resources at https://resources.air-watch.com/view/sbfsfykltpqfxhvg9tpy/en)
l PowerShell script to configure the appliance (part of the OVA download package available on AirWatch Resources at
https://resources.air-watch.com/view/sbfsfykltpqfxhvg9tpy/en)
l Communication between the Windows machine used to deploy the OVA and your vSphere instance
Procedure
1. Open PowerShell as an administrator.
2. Navigate to the folder containing your PowerShell script and modified .ini template.
Example:
.\apdeploy.ps1 AWTunnel.ini
44
Chapter 6:
AirWatch Tunnel Management
Upgrade the AirWatch Tunnel Virtual Appliance 46
Create Network Traffic Rules 46
Access Logs and Syslog Integration 48
SSLOffloading 49
Kerberos KDC Proxy Support 50
Outbound Proxy Overview 52
RSAAdaptive Authentication 56
45
Chapter 6: AirWatch Tunnel Management
2. Deploy the new OVA in place of the existing OVA. Follow the steps you used before. See Deploy AirWatch Tunnel
using vSphere for more information.
2. Use the same .ini template from your previous deployment with the PowerShell script.
3. Follow the steps you use before. See Run the AirWatch Tunnel PowerShell Script for more information.
Looking for information on Single Sign-On? For information on implementing Android mobile single sign-on for
Workspace ONE, see the following AirWatch Knowledge Base article:https://support.air-
watch.com/articles/98942587-VMware-Identity-Manager-and-Android-Single-Sign-On-SSO-.
Prerequisites
l Configured AirWatch Tunnel with the Per-App Tunnel component enabled.
l Android 4.4+
l Applies to mobile applications configured for Per App VPN for AirWatch Tunnel. See Configure Public Apps to Use Per
App Profile for more information.
1. Navigate to Groups & Settings > All Settings > System > Enterprise Integration > AirWatch Tunnel > Network
Traffic Rules.
46
Chapter 6: AirWatch Tunnel Management
Settings Descriptions
Default Select the default action the AirWatch Tunnel app takes when the defined rules do not apply to the
Action network traffic.
The default action is always applied last.
l Tunnel All apps on the device configured for Per App VPN send network traffic through the
tunnel.
For example, set the Default Action to Tunnel to ensure all configured apps without a defined
traffic rule use the AirWatch Tunnel for internal communications.
l Block Blocks all apps on the device configured for Per App VPN from sending network traffic.
For example, set the Default Action to Block to ensure that all configured apps without a defined
traffic rule cannot send any network traffic regardless of destination.
l Bypass All apps on the device configured for Per App VPN bypass the tunnel and connect to
the Internet directly.
For example, set the Default Action to Bypass to ensure all configured apps without a defined
traffic rule bypass the AirWatch Tunnel to access their destination directly.
Add Select Add to create a rule.
Rank Select the up or down arrows to rearrange the ranking of your network traffic rules. You can also
select-and-drag the rule.
The up and down arrows only display when you have more than one rule created.
Application Select Add to add a triggering application for the network rule.
This drop-down menu is populated with applications with Per App VPN enabled.
Action Select the action from the drop-down menu that the AirWatch Tunnel app applies to all network
traffic from the triggering app when the app starts.
l Tunnel Sends app network traffic for specified domains through the tunnel to your internal
network
l Bypass Bypasses the AirWatch Tunnel so the app attempts to access specified domains
directly.
l Proxy Redirect traffic to the specified HTTPS proxy for the listed domains. The proxy must be
HTTPS and must follow the correct format: https://example.com:port
47
Chapter 6: AirWatch Tunnel Management
Settings Descriptions
Destination Enter the hostname applicable to the action set for the rule. For example, enter all the domains to
Hostname block traffic from accessing using the Block action.
Use a comma (,) to distinguish between hostnames.
You may use wildcard characters for your hostnames. Wildcards must follow the format:
l *.<domain>.*
l *<domain>.*
l *.*
l *
4. Select Publish Rules to update your applicable AirWatch Tunnel device profiles to a new version with the new
network traffic rules. The updated device profiles publish to the assigned smart groups.
Important: You must enable access logs before you install any of the components. Any changes you make to the
access logs configuration on the AirWatch Admin Console require reinstallation of the AirWatch Tunnel server.
vi /etc/rsyslog.conf
48
Chapter 6: AirWatch Tunnel Management
Make sure UDP port 514 is open routing to the syslog server:
SSLOffloading
SSLoffloading is supported for the AirWatch Tunnel Proxy component. It is not supported for the Per App Tunnel
component because this component uses SSL certificate pinning on the client and server side, creating an end-to-end
encrypted tunnel.
When accessing HTTPendpoints using HTTPTunneling, all HTTPtraffic is encrypted and authenticated using an
SSLcertificate and sent over port 2020 as HTTPS. To enable SSLoffloading, ensure that the SSLoffloading setting is
selected during installation for the relay server. This setting informs the relay to expect to receive all traffic on the port
you configured.
You can perform SSLoffloading with products such as F5's BIG-IPLocal Traffic Manager (LTM), or Microsoft's Unified
Access Gateway (UAG), Threat Management Gateway (TMG) or Internet Security and Acceleration Server (ISA) solutions.
Support is not exclusive to these solutions. AirWatch Tunnel Proxy is compatible with general SSL offloading solutions if
the solution supports the HTTP CONNECT method. In addition, ensure that your SSLoffloading solution is configured to
forward original host headers to the AirWatch Tunnel relay server.
The following diagram illustrates how SSLoffloading affects traffic in a relay-endpoint configuration.
49
Chapter 6: AirWatch Tunnel Management
Note: SSL offloading for basic configuration has communication from the SSL termination proxy going directly to the
AirWatch Tunnel endpoint.
2. The traffic reaches an SSL Termination Proxy (customers use their own SSL termination proxy), which must contain
the AirWatch certificate exported from the AirWatch Admin Console or your organization's own public certificate.
This SSLtermination proxy must also be configured to forward original host headers to the AirWatch Tunnel relay
server.
If you are not using your own public cert, then you can export the SSL certificate from the AirWatch Admin Console
by navigating to Settings > System > Enterprise Integration > AirWatch Tunnel > Configuration and selecting the
Export Certificate button under Authentication.
3. Requests to HTTP(S) endpoints have their SSL certificate offloaded and are sent to the relay server unencrypted over
port 2020 by default.
4. The traffic continues from the relay server to the endpoint server on port 2010 by default.
5. The endpoint server communicates with your back end systems to access the requested resources.
50
Chapter 6: AirWatch Tunnel Management
1. During the configuration, check the box Use Kerberos proxy and enter the Realm of the KDC server.
2. If the Realm is not reachable, then you can configure the KDC server IP on the Advanced settings tab in system
settings.
Only add the IP if the Realm is not reachable, as it takes precedence over the Realm value entered in the
configuration.
By default the Kerberos proxy server uses port 2040, which is internal only. Therefore, no firewall changes are
required to have external access over this port.
3. Save the settings and download the installer to install AirWatch Tunnel Proxy.
4. Enable Kerberos from the SDK settings in the AirWatch Admin Console so the requesting application is aware of the
51
Chapter 6: AirWatch Tunnel Management
KKDCP. Navigate to Groups & Settings > All Settings > Apps > Settings And Policies and select Security Policies.
Under Integrated Authentication, select Enable Kerberos. Save the settings.
Accessing Logs
The path for KKDCPlogs for AirWatch Tunnel for Linux is:/var/log/airwatch/proxy/mag.log.
{
"kdcServer":"internal-dc01.internal.local.:88",
"kdcAccessible":true
}
52
Chapter 6: AirWatch Tunnel Management
l Proxy Port
l Whether the proxy requires any authentication (Basic/NTLM) and appropriate credentials
Entering this information and completing the installer enables outbound proxy support. This sends all traffic from the
AirWatch Tunnel Proxy server except requests to the AirWatch API/AWCM servers to the outbound proxy you
configure. If you want to send the requests to the API/AWCM servers through your outbound proxy as well, then you
must enable the Enable APIand AWCMoutbound calls via proxy setting on the AirWatch Tunnel >Advanced settings
page.
Use the Proxy Tool for PACFiles and Multiple Outbound Proxies (Proxy Component)
Use can use the proxy tool if AirWatch Tunnel routes its outbound requests through an outbound proxy that has rules
set in a PACfile that also requires authentication.
To use the tool, perform the following steps:
1. Within Linux CLImode, navigate to /opt/airwatch/tunnel/proxy/tools.
sudo sh Proxytools.sh
53
Chapter 6: AirWatch Tunnel Management
3. Select your authentication method, which can be None, Basic, or NTLM for a single service account. Also enter your
credentials, if applicable, and the URIof the proxy for testing.
4. Select Save.
54
Chapter 6: AirWatch Tunnel Management
Basic Mode
During installation, the installer prompts you to use an outbound proxy. If you want to use an outbound proxy, then
enter Yes when prompted during Tunnel installation, which then prompts you for the following information:
l Proxy Host
l Proxy Port
Relay-Endpoint Mode
Per App Tunnel uses the AirWatch Tunnel Proxy component as its endpoint when deployed in relay-endpoint mode.
Because the outbound proxy is configured on the endpoint in this mode, refer to the Outbound Proxy for the Proxy
Component section.
## ------------------------------------------------------
## OUTBOUND PROXY CONFIGURATION -------------------------
## ------------------------------------------------------
55
Chapter 6: AirWatch Tunnel Management
## Outbound proxy SSL encryption. Encrypt the traffic between tunnel server and
outbound proxies.
## 0 - SSL encryption will be turned off
## 1 - SSL encryption will be turned on (Recommended for Relay/Endpoint mode)
outbound_proxy_ssl 1
By default, the communication with an outbound proxy occurs over SSL. If your
proxy does not use SSL, then please replace 1 with 0.
RSAAdaptive Authentication
AirWatch Tunnel integrates with RSA Adaptive Authentication to allow end users to access internal endpoints using step-
up authentication. This integration applies only to the AirWatch Tunnel Proxy component.
56
Chapter 6: AirWatch Tunnel Management
RSAAdaptive Authentication studies user and device patterns, such as location, and then determines whether or not to
prompt users to log in based on its algorithm. For example, if end users attempt to access an intranet site and are
prompted to authenticate, then they may not be asked to authenticate an hour later if no other device attributes have
changed significantly. However, if end users travel to another country or state, then the system may prompt them to
authenticate again to access the same site.
Requirements
l RSA Adaptive Authentication server v7.0.
l Authentication Manager integrated with the RSA SecurID plug-in to validate the SecurID tokens.
o This integration is limited to the use of the RSASecurIDplug-in, along with the RSAAdaptive Authentication
service. AQuestion-Answer based implementation of step-up authentication is not supported with this release.
l AirWatch Tunnel Proxy component installed. Currently, this integration works only with the proxy component of
AirWatch Tunnel.
57
Chapter 6: AirWatch Tunnel Management
Client Compatibility
l AirWatch iOS Browser v4.5+
AirWatch Android Browser v3.1+
58
Appendix: AirWatch Tunnel Troubleshooting
Appendix:
AirWatch Tunnel Troubleshooting
Per App Tunnel
Per App Tunnel logs are stored in the native syslog system of Linux. Logs are stored in /var/log/airwatch/tunnel and can
be sorted by the following command (as root):
tail -f /var/log/airwatch/tunnel/vpnd/tunnel.log
Commands
Virtual Appliance
59
Appendix: AirWatch Tunnel Troubleshooting
CentOS/RHEL 6.x:
CentOS/RHEL 7.x:
Proxy
Proxy logs are stored in the native syslog system of Linux. Logs are stored in /var/log/airwatch/proxy and can be sorted
by the following command (as root):
tail -f /var/log/airwatch/proxy/mag.log
Commands
Proxy Any CentOS/RHELversion/Virtual Appliance:
60
Appendix: AirWatch Tunnel Troubleshooting
61
Chapter 7:
Tunnel Server Installer Method
AirWatch Tunnel Installer Overview 63
AirWatch Tunnel for Linux System Requirements 63
Manual Installation of Packages 67
Relay-Endpoint Installation Overview 67
Basic (Endpoint only)Install Overview 75
Uninstall the AirWatch Tunnel 79
Upgrade the AirWatch Tunnel for Linux 80
62
Chapter 7: Tunnel Server Installer Method
63
Chapter 7: Tunnel Server Installer Method
Status
Requirement Notes
Checklist
Internally registered DNS (Optional):For a basic endpoint deployment, register the internal DNS
Relay-endpoint:Register the internal DNSentry for the endpoint server.
Externally registered DNS Basic endpoint:Register the public DNS for the basic tunnel server.
Relay-endpoint:Register the public DNS for the relay server.
(Optional)SSL Certificate AirWatch certificates are automatically generated by default as part of
from a trusted third your Tunnel configuration.
party Alternatively, you can upload the full chain of the public SSLcertificate
to the AirWatch Admin Console during configuration.
Ensure that the SSL certificate is trusted by all device types being used.
(that is, not all Comodo certificates are natively trusted by Android).
SAN certificates are not supported.
Ensure that the subject of the certificate is the public DNSof your
Tunnel server or is a valid wildcard certificate for the corresponding
domain.
If your SSLcertificate expires, then you must reupload the renewed
SSLcertificate and redownload and rerun the installer.
64
Chapter 7: Tunnel Server Installer Method
Status
Requirement Notes
Checklist
IPv6 enabled locally IPv6 must be enabled locally on the Tunnel server hosting per app
tunnel. AirWatch requires it to be enabled for the per app tunnel service
to run successfully.
65
Chapter 7: Tunnel Server Installer Method
Status
Source Component Destination Component Protocol Port Verification Note
Checklist
AirWatch Tunnel AirWatch RESTAPI HTTPor SaaS: Verify by using wget to
Endpoint HTTPS 443 https://APIServerUrl/API/help
SaaS: On- and ensuring you receive a '401
https://asXXX.awmdm. Prem: not authorized' response.
com or https://asXXX. 80 or 5
airwatchportals.com 443
On-Prem:
Most commonly your
DS or Console server
AirWatch Tunnel Relay-Endpoint Configuration
AirWatch AirWatch Cloud HTTPor SaaS: Verify by using wget to
TunnelRelay Messaging Server** HTTPS 443 https://<AWCM
URL>:<port>/awcm/status and
On- 2
ensuring you receive an HTTP
Prem:
200 response.
2001*
AirWatch AirWatch HTTPS 2010* Telnet from AirWatch Tunnel
TunnelRelay TunnelEndpoint Relay to the AirWatch Tunnel 3
Endpoint server on port
AirWatch Tunnel Internal Web sites / Web HTTPor 80 or
4
Endpoint apps HTTPS 443
AirWatch Tunnel Internal resources HTTP, 80,
Endpoint HTTPS, 443,
4
or TCP Any
TCP
AirWatch AirWatch RESTAPI HTTPor 80 or Verify by using wget to
TunnelEndpoint Endpoint HTTPS 443 https://APIServerUrl/API/help
and Relay SaaS: and ensuring you receive a '401
https://asXXX.awmdm. not authorized' response.
com or https://asXXX. 5
airwatchportals.com
On-Prem:
Most commonly your
DS or Console server
*This port can be changed if needed based on your environment's restrictions.
** For SaaS customers who need to whitelist outbound communication, please refer to the following AirWatch
Knowledge Base article for a list of up-to-date IPranges AirWatch currently owns:https://support.air-
watch.com/articles/21419683-What-are-the-AirWatch-IP-ranges-for-SaaS-data-centers-.
66
Chapter 7: Tunnel Server Installer Method
2. For the AirWatch Tunnel to query the AirWatch Admin Console for compliance and tracking purposes.
3. For AirWatch Tunnel Relay topologies to forward device requests to the internal AirWatch Tunnel endpoint only.
5. The AirWatch Tunnel must to communicate with the API for initialization. Ensure that there is connectivity between
the RESTAPIand the AirWatch Tunnel server.
* For CentOS/RHEL 7.x systems, you may require installing the epel-release rpm to install these packages through yum.
67
Chapter 7: Tunnel Server Installer Method
2. Once on the Linux server, navigate to the folder you copied the file to and then unarchive the TAR file by using the
following command:
3. Once un-archived, you can find the following files within the installation folders:
l config.xml
l AirWatchTunnel.bin
l vpn_config.xml
$ sudo ./AirWatchTunnel.bin
If you are installing for the first time, the following screen displays:
Press Enter.
6. After accepting the licensing agreement, you must enter the number of the components you want to install. You can
install both by entering a comma-separated list of numbers. For example, enter 1,2 to install AirWatchTunnelProxy
and Per-App Tunnel.
68
Chapter 7: Tunnel Server Installer Method
10. Enter Y to grant the installer firewall permissions needed for AirWatchTunnel.
69
Chapter 7: Tunnel Server Installer Method
Note:The ports you see may differ from the ones shown, because the installer shows the values you set during
AirWatch Tunnel configuration.
11. Review the summary information and verify that the information is correct.
12. The product begins installation. If there were any errors, the installer displays an error message with details and log it
to the installation log file, which gets saved in the directory in which you installed the AirWatch Tunnel.
70
Chapter 7: Tunnel Server Installer Method
To complete your installation, perform the steps for Install the AirWatch Tunnel Endpoint Server.
2. Once on the Linux box, navigate to the folder you copied the file to and then unarchive the TAR file by using the
following command:
3. Once un-archived, you can find the following files within the installation folders:
l config.xml
l AirWatchTunnel.bin
l vpn_config.xml
71
Chapter 7: Tunnel Server Installer Method
$ sudo ./AirWatchTunnel.bin
If you are installing for the first time, the following displays:
Press Enter.
6. After accepting the licensing agreement, you must enter the number of the components you want to install.
In a relay-endpoint configuration where you install both Proxy and Per-App Tunnel, you only install a single
endpoint. Enter 2, as shown.
72
Chapter 7: Tunnel Server Installer Method
Even if you are installing both components, you only see one or the other listed beneath Product Features.
10. Enter Y or N for whether you want to use an outbound proxy as part of your AirWatchTunnelconfiguration.
For more information about using outbound proxies, see Outbound Proxy Overview.
11. Enter Y to grant the installer the firewall permissions needed for AirWatchTunnel.
73
Chapter 7: Tunnel Server Installer Method
12. Review the summary information and verify that the information is correct.
13. The product begins installation. If there were any errors, the installer displays an error message with details and log it
to the installation log file, which gets saved in the directory in which you installed the Tunnel.
74
Chapter 7: Tunnel Server Installer Method
1. Navigate to Groups &Settings > All Settings > System > Enterprise Integration > AirWatch Tunnel.
2. Once on the Linux box, navigate to the folder you copied the file to and then unarchive the TAR file by using the
following command:
3. Once un-archived, you can find the following files within the installation folders:
l config.xml
l AirWatchTunnel.bin
l vpn_config.xml
$ sudo ./AirWatchTunnel.bin
If you are installing for the first time, the following screen displays with a License Agreement:
75
Chapter 7: Tunnel Server Installer Method
Press Enter.
6. After accepting the licensing agreement, you must enter the number of the components you want to install. You can
install both by entering a comma-separated list of numbers. For example, enter 1,2 to install AirWatchTunnelProxy
and Per-App Tunnel.
76
Chapter 7: Tunnel Server Installer Method
9. Enter Y or N for whether you want to use an outbound proxy as part of your AirWatch Tunnel configuration. Also
enter Y or Nfor whether the AirWatchTunnel server is SSLOffloaded.
For more information about using outbound proxies, see Outbound Proxy Overview.
10. Enter Y to grant the installer the firewall permissions needed for AirWatchTunnel.
77
Chapter 7: Tunnel Server Installer Method
Note:The ports you see may differ from the ones shown, since the installer shows the values you set during
AirWatch Tunnel configuration.
11. Review the summary information and verify that the information is correct.
12. The product begins installation. If there were any errors, the installer displays an error message with details and log it
to the installation log file, which gets saved in the directory in which you installed the AirWatch Tunnel.
78
Chapter 7: Tunnel Server Installer Method
cd /opt/airwatch/tunnel/_tunnel_installation/
2. Execute Uninstall_Tunnel.
79
Chapter 7: Tunnel Server Installer Method
sudo ./Uninstall_Tunnel
2. Select the General tab and then select the Download Linux Installer hyperlink to download the latest version of the
AirWatch Tunnel installer.
4. Create a directory for the Tunnel installer and copy the AirWatchTunnel.tar file to this location.
5. Continue with the steps for Installation for a Relay-Endpoint Configuration or Installation for a Basic (Endpoint only)
Configuration.
The installer detects the existing AirWatch Tunnel instance running on the server and prompts you to confirm the
upgrade.
80
Finding More Documentation
Note: Always pull the document from AirWatch Resources each time you reference it.
2. Select AirWatch Resources from the navigation bar or home screen. The AirWatchResources page displays a list of
recent documentation and a list of Resources Categories on the left.
3. Select your AirWatch Version from the drop-down menu in the search parameters to filter a displayed list of
documents. This selection limits the search to documentation that is specific to your version of AirWatch.
l Search for a particular resource using the search box in the top-right by entering keywords or document names.
l Add a document to your favorites and it appears in My Resources. Access documents you saved as a Favorite by
selecting myAirWatch from the navigation bar. Then select My Resources from the toolbar.
l Download a PDF of a document by selecting the button. Note, however, that documentation is frequently
updated with the latest bug fixes and feature enhancements. Always pull the document from AirWatch
Resources each time you want to reference it.
81
Finding More Documentation
Having trouble finding a document?Make sure that you select a specific AirWatch Version. Searching All Versions
typically returns excessive results. Select Documentation from the category list, at a minimum. If you know which
category you want to search (for example, Platform, Install &Architecture, EmailManagement), then select that
category to narrow your search further and return better results. Limit File Type to PDFto limit the search to
technical documentation manuals.
82