Tunnel proxy deployment secures the network traffic between an end user device and a Website through the VMware Browser mobile application.

Procedure

  1. In the admin UI Configure Manually section, click Select.
  2. In the General Settings > Edge Service Settings line, click Show.
  3. Click Per App Tunnel and Proxy Settings gearbox icon.
  4. Change NO to YES to enable tunnel proxy.
  5. Configure the following edge service settings resources.

    Option

    Description

    Identifier

    Set by default to View. Unified Access Gateway can communicate with servers that use the View XML protocol, such as View Connection Server, Horizon Air, and Horizon Air Hybrid-mode.

    API Server URL

    Enter the AirWatch API server URL. For example, enter as https://example.com:<port>.

    API Server User Name

    Enter the user name to log in to the API server.

    API Server Password

    Enter the password to log in to the API server.

    Organization Group Code

    Enter the organization of the user.

    AirWatch Server Hostname

    Enter the AirWatch server host name.

  6. To configure other advanced settings, click More.

    Option

    Description

    Outbound Proxy Host

    Enter the host name where the outbound proxy is installed.

    Note:

    This is not the Tunnel Proxy.

    Outbound Proxy Port

    Enter the port number of the outbound proxy.

    Outbound Proxy User Name

    Enter the user name to log in to the outbound proxy.

    Outbound Proxy Password

    Enter the password to log in to the outbound proxy.

    NTLM Authentication

    Change NO to YES to specify that the outbound proxy request requires NTLM authentication.

    Use for AirWatch Tunnel Proxy

    Change NO to YES to use this proxy as an outbound proxy for AirWatch Tunnel. If not enabled, Unified Access Gateway uses this proxy for the initial API call to get the configuration from the AirWatch admin console.

    Host Entries

    Enter a comma separated list of host entries to be added in /etc/hosts file. Each entry includes an IP, a hostname, and an optional hostname alias in that order, separated by a space. For example, 10.192.168.1 example1.com, 10.192.168.2 example2.com example-alias

    Trusted Certificates

    Select the trusted certificate files to be added to the trust store.

  7. Click Save.