Consider configuring additional functionality to enhance your VMware Tunnel deployment. These features allow you more control over device access and networking support.

The additional functionality allows you to maintain and manage your VMware Tunnel deployment. The network traffic rules control access to your internal resources by restricting traffic sent from apps or to specified domains. You can also configure the outbound proxy during installation to control traffic to and from your network. The Kerberos KDC Proxy limits access to devices with correct authentication. Use RSA authentication to control access to internal resources through two-factor authentication. SSL offloading, supported by the Proxy component only, eases the burden of encrypting and decrypting traffic from the VMware Tunnel server.

The access logs and syslog integration provides detailed logs for troubleshooting.