The Advanced settings tab lets you configure more settings that are optional for the Proxy component. Except where noted, you can configure these settings before or after installation.
- Navigate to Advanced tab. and select the
- Configure the following VMware Tunnel Proxy component settings.
RSA Adaptive Auth Integration
Enable this setting if you want to integrate the Proxy component with RSA authentication for comprehensive Web browsing security.
Enable this setting to tell VMware Tunnel to write access logs to syslog for any of your own purposes. These logs are not stored locally. They are pushed to the syslog host over the port you define. Communication to the syslog server occurs over UDP, so ensure that UDP traffic is allowed over this port.
In relay-endpoint deployments, the relay server writes the access logs and in a basic deployment, the basic server writes the access logs.
There is no correlation between this syslog integration and the integration accessed on.
This feature can be enabled during initial configuration in the Advanced settings tab in the Workspace ONE UEM console. If configured after installation, you must re-install VMware Tunnel.
Enter the URL of your syslog host. This setting displays after you enable Access Logs.
Enter the port over which you want to communicate with the syslog host.This setting displays after you enable Access Logs.
API and AWCM outbound calls via proxy
Enable this option if the communication for initialization between the VMware Tunnel and Workspace ONE UEM API or AWCM is through an outbound proxy.
Show detailed errors
Enable this option to ensure client applications (for example, VMware Browser) are informed when the VMware Tunnel fails to authenticate a device.
Set the appropriate logging level, which determines how much data is reported to the LOG files.
Maintain your SSL certificates. If you are using AirWatch SSL, select Regenerate to regenerate the certificates.
- If applicable, configure the Relay - Endpoint Authentication Credentials settings, which are used for authentication between the relay and endpoint servers.
These text boxes are pre-populated for you after configuration, but you can change them, for example, to meet your organization password strength requirements.
Enter the user name used to authenticate the relay and endpoint servers.
Enter the password used to authenticate the relay and endpoint servers.
- Select Save.