This section covers common error messages that you may encounter while working with VMware Tunnel and the procedure to fix the root cause of the problem.
Device Configuration Error
- In the UEM console , navigate to the Device Detail page of the affected device and click the Profiles tab to confirm if the Tunnel VPN profile is installed.
- For all the Android devices, open the Workspace ONE Intelligent Hub and under the Profiles section, check if the Tunnel VPN profile exists.
- For all iOS devices, navigate to Settings > VPN and verify the VPN configuration details.
TLS Handshake Failure
- In the UEM console, navigate to the Tunnel configuration page and verify the Front-End Certificate Thumbprint under server Authentication.
- For all the Android devices, open the Workspace ONE Intelligent Hub and under the Profiles section, verify the certificate thumbprint for the
Type.cer
.- For all the iOS devices, navigate to Settings > General > Device Management> Device Manager.
- Click More Details and under the Certificate section, click the certificate with the Tunnel hostname.
- Scroll down to the SHA-1 text box and verify the certificate thumbprint.
- On the server side, open
/opt/vmware/tunnel/vpnd/server.conf
and search forssl_thumbprint
. - Verify if the thumbprint on the device, server, and the UEM console is the same. If not, restart the
vpnd
service on the UEM console and republish the VPN profile.
DNS Resolution Failure
You might encounter DNS resolution error if the VMware Tunnel server FQDN does not get resolved to an IP address.
- From the device connected network,ensure that the Tunnel server FQDN resolves to an IP address.
- In the command prompt, enter the following command:
nslookup <Tunnel_Server_FQDN>
. Tunnel server FQDN resolves to an IP address.
Unable to Reach the Tunnel Gateway
If device is unable to communicate with the Tunnel server on the mentioned port, you may not be able to reach the Tunnel gateway.
- From the device connected network, ensure that the device connects to the Tunnel server on the port that is mentioned in the tunnel configuration.The device must get connected and display the Tunnel server Front-End SSL certificate.
- In the command prompt, enter the following command:
openssl s_client -connect <dest_fqdn>:<port> -servername <server_fqdn>
- In the Tunnel server, enter the following command:
netstat -tlpn
The server must display the port that is mentioned in the tunnel configuration.
- In the Tunnel server, enter the following command:
systemctl status vpnd
. The service must be active and running.Note:- Verify the Firewall and the load balancer rules.
- SSL Offloading and SSL Bridging are not supported for the Per-App Tunnel component.
Access Denied Error / Device Unknown to Gateway
You might encounter an "access denied error" or a "device unknown to Gateway" error if the device details are not present on the Tunnel server or when the device is non-compliant.
- Open the Workspace ONE Intelligent Hub and verify the complaince status.
- Navigate to the Device detail page for the affected device and verify the device complaince status.
- From the /opt/vmware/tunnel/vpnd directory, run
./vpnreport whitelist --udid=<Device_udid>
.In the result xml, theComplianceStatusId
must be 3 or 5 for the affected device UUID.Note: The connection between the Tunnel server and the API server connection must be successful to achieve the expected result.
No Apps Assigned
You might encounter the "No Apps Assigned" error within the Workspace ONE Tunnel application when the managed application is not mapped with the VMware VPN profile.
- Navigate to the internal or the public application under Apps & Books and check for the device in the assignment group where the App Tunneling is enabled.
Unable to Access Internal Sites From Managed Apps Through the VPN
Intranet websites are not accessible from the Tunnel Server.
- Ensure that you can access the internal websites from the tunnel server. If it is a Cascade mode, the internal site must be accessible from the Backend server.
- Ensure that all the application binaries are allowlisted for the VPN. For example, applications like VMware Horizon Client and Microsoft Outlook might have multiple binaries that must be allowlisted.
Device Traffic Rules is Not Sent to the Devices
Device Traffic Rules control how traffic is directed through the VMware Tunnel when using the Per-App Tunnel component. These rules allow you to tunnel, block, or bypass traffic as needed. In some scenarios, the updated Device Traffic Rules is not sent to the devices. When the administrator changes the Device Traffic Rules and click Save, the Device Traffic Rules gets mapped to the profile, but the updated Device Traffic Rules is not replaced for the devices where the VPN profile is already installed. Device Traffic Rules is only updated for the newly enrolled devices or for the devices that have the VPN profile reinstalled.
To send the updated Device Traffic Rules to the devices post modifying the Device Traffic Rules, administrators must click Save and Publish. Save and Publish adds a version to the VPN profile and republishes Device Traffic Rules to all the devices.
- If the adminsitartor changes the Android application in the Device Traffic Rules and clicks Save and Publish, the VPN profiles for both iOS, Android profiles gets a version update and the VPN profile installs are queued for all the assigned devices.
- Reinstalling the profile reissues the client certificate to the device with a new thumbprint.
VPN-Managed Application Fails to Honor Device Traffic Rules on Overriding the Device Traffic Rules
VPN-managed application fail to honor the Device Traffic Rules on overriding the Device Traffic Rules rules for the Child OG. The VPN profile fails to map the correct Device Traffic Rules configuration.
- Make sure that you create the application and the VPN profile at the OG level which has the traffic rules that are overridden.
Unable to View Internal and Public Applications Under the Device Traffic Rules Application List
Internal and public applications are not displayed under the Device Traffic Rules application list. You might encounter this issue if the VPN profile is not mapped with the correct Tunnel Configuration.
- Navigate to Profile > List View.
- Select the profile that is mapped to the application and click VPN Payload. Verify the Tunnel server configuration.
- If the Tunnel not configured message is displayed, click Add version and remove the VPN payload.
- Add a new VPN Payload.
Tunnel Server is Not Up to Update With Respect to the Compliance Change Events
Devices fail to honor compliance policy updates. You might encounter this issue if the device compliance change event fails to reach the Tunnel server.
- In the Workspace ONE UEM console, navigate to All Settings > System > Advanced > Site Url.
- Verify the AirWatch Cloud Messaging connection.
- Perform the Tunnel test connection from the Tunnel configuration page.
- From the Tunnel server, verify the service status by running the following commands:
.systemctl status vpnd
systemctl status vpnreportd
.Note: If you have multiple AirWatch Cloud Messaging that uses implicit clustering, configure the load balancer to use the cookie persistence that routes the AirWatch Cloud Messaging traffic.
Tunnel Front-End Server Fails to Communicate With the Back-End Server
Due to the incorrect network configuration or usage of an incorrect certificate for the server-client authentication, you might experience a communication failure between the Tunnel Front-End server and the Back-End server.
- Ensure that the Front-End server can communicate with the Back-End Tunnel server on the port mentioned in the tunnel configuration.
- Run the following command in the Tunnel Front-End server:
openssl s_client -connect <dest_fqdn>:<port> -servername <backend_fqdn>
Must display the Tunnel Back-End server SSL certificate. - In the server.conf file, verify the following:
On the Tunnel, front-end server verify if the c_r_t (that is, cascade_root_thumbprint ) has the thumbprint of the Back-End server's SSL certificate.
- The c_r_t in the Tunnel front-end server is same as the cascade_back_end_thumbprint in the Back-end server.
On the Tunnel back-end server c_r_t should have the root CA's thumbprint of the Tunnel front-end server's SSL certificate.
- When the AirWatch certificate is used for Server Auth, the c_r_t in the back-end server is always same as the ssl_thumbprint in the Tunnel front-end server.
- When a third-party SSL certificate is used for Server Auth, the c_r_t in the back-end server is the third party's root CA's thumbprint.
- Verify if there are any firewall or load balancer rules blocking between the Front-End server to Back-End Tunnel Server.
Note:
- SSL Offloading and SSL Bridging are not supported for the Per-App Tunnel configuration.
- If you are using Public certificate for the server authentication, the certificate must have a Server and Client authentication under Enhanced Key Usage field.
Unable to Load and Add Device Traffic Rules and Server Traffic Rules in the VMware Tunnel Configuration Page
When you load the Tunnel configuration page, "Tunnel Configuration doesn't exist" is displayed and you may not be able to add Device Traffic Rules or Server Traffic Rules.
To clear the IIS bindings hostname and keeping the hostname blank:
- From the Windows Start menu, click Administrative Tools > Internet Information Services (IIS) Manager to open it on the API server.
- In IIS Manager under Connections, expand your server name.
- Then expand Sites.
- Right-click on a website, and click Edit Bindings.
- In the Site Bindings window, select the http/https binding for this website, and click Edit.
- In the Edit Site Binding window keep the hostname blank and click OK.
- Restart the IIS sites for the changes to take effect.
- Update the Tunnel microservice appsettings.json's
Host
key under theAirWatchApiClient
to include the hostname that is used in the IIS bindings."AirWatchApiClient": { "Host": "acme.example.com", "ClientTimeoutInSeconds": 40, "HostDiscoveryTimeoutInSeconds": 30, "Port": 8081
Note: The port key will only be used if the customer is using a custom port. - Restart the Airwatch Tunnel Service
- Refresh the browser if you are using the Tunnel configuration screen after the service restart.
Verify VMware Tunnel Microservice
You can use the VMware Tunnel health endpoint to verify the upstream or downstream connectivity to the VMware Tunnel microservice.
- Use the following REST API to get the VMware Tunnel microservice health from Workspace ONE UEM API Explorer.
GET {environment}/api/mdm/tunnel/health aw-tenant-code: API key configured Basic auth
- Verify the API response of VMware Tunnel health endpoint.
200 ok { "api_to_tunnel_microservice_connectivity": "True", "tunnel_microservice _to_api_connectivity": "True", "database_connectivity_status": "True" }
Unable to Upload Third-Party SSL Certificate
- Import the non-working certificate onto the windows certificate store on the app server of the console where this issue is seen.
- Once imported, export the certificate from the store with the same password if required. The exported certificate will be available on your local machine on the path you chose to save it.
- Use this exported certificate for uploading on the third-party server authentication tab of the Tunnel configuration. The certificated should upload successfully and the Tunnel config can be saved.