The Advanced settings tab lets you configure more settings that are optional for the Proxy component. Except where noted, you can configure these settings before or after installation.


  1. Navigate to Groups & Settings > All Settings > System > Enterprise Integration > VMware Tunnel > Configuration and select the Advanced tab.
  2. Configure the following VMware Tunnel Proxy component settings.
    Setting Description
    RSA Adaptive Auth Integration Enable this setting if you want to integrate the Proxy component with RSA authentication for comprehensive Web browsing security.
    Access Logs

    Enable this setting to tell VMware Tunnel to write access logs to syslog for any of your own purposes. These logs are not stored locally. They are pushed to the syslog host over the port you define. Communication to the syslog server occurs over UDP, so ensure that UDP traffic is allowed over this port.

    In relay-endpoint deployments, the relay server writes the access logs and in a basic deployment, the basic server writes the access logs.

    There is no correlation between this syslog integration and the integration accessed on Groups & Settings > All Settings > System > Enterprise Integration > Syslog.

    This feature can be enabled during initial configuration in the Advanced settings tab in the Workspace ONE UEM console. If configured after installation, you must re-install VMware Tunnel.

    Syslog Hostname Enter the URL of your syslog host. This setting displays after you enable Access Logs.
    Port Enter the port over which you want to communicate with the syslog host.This setting displays after you enable Access Logs.
    API and AWCM outbound calls via proxy Enable this option if the communication for initialization between the VMware Tunnel and Workspace ONE UEM API or AWCM is through an outbound proxy.
    Show detailed errors Enable this option to ensure client applications (for example, VMware Browser) are informed when the VMware Tunnel fails to authenticate a device.
    Log Level Set the appropriate logging level, which determines how much data is reported to the LOG files.

    Maintain your SSL certificates. If you are using AirWatch SSL, select Regenerate to regenerate the certificates.

  3. If applicable, configure the Relay - Endpoint Authentication Credentials settings, which are used for authentication between the relay and endpoint servers.
    These text boxes are pre-populated for you after configuration, but you can change them, for example, to meet your organization password strength requirements.
    Setting Description
    Username Enter the user name used to authenticate the relay and endpoint servers.
    Password Enter the password used to authenticate the relay and endpoint servers.
  4. Select Save.