Skip to content

Commit db64c78

Browse files
authored
Merge pull request #6816 from MandiOhlinger/13092960
13092960: 2202 release
2 parents 2490e7f + fd66455 commit db64c78

1 file changed

Lines changed: 115 additions & 50 deletions

File tree

memdocs/intune/configuration/vpn-settings-ios.md

Lines changed: 115 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 11/11/2021
10+
ms.date: 02/23/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -47,22 +47,44 @@ Create an [iOS/iPadOS VPN device configuration profile](vpn-settings-configure.m
4747
Select the VPN connection type from the following list of vendors:
4848

4949
- **Check Point Capsule VPN**
50-
- **Cisco Legacy AnyConnect**: Applicable to Cisco Legacy AnyConnect app version 4.0.5x and earlier.
51-
- **Cisco AnyConnect**: Applicable to [Cisco AnyConnect](https://itunes.apple.com/app/cisco-anyconnect/id1135064690) app version 4.0.7x and later.
50+
- **Cisco Legacy AnyConnect**
51+
52+
Applies to Cisco Legacy AnyConnect app version 4.0.5x and earlier.
53+
54+
- **Cisco AnyConnect**
55+
56+
Applies to [Cisco AnyConnect](https://itunes.apple.com/app/cisco-anyconnect/id1135064690) app version 4.0.7x and later.
57+
5258
- **SonicWall Mobile Connect**
53-
- **F5 Access Legacy**: Applicable to F5 Access app version 2.1 and earlier.
54-
- **F5 Access**: Applicable to F5 Access app version 3.0 and later.
55-
- **Palo Alto Networks GlobalProtect (Legacy)**: Applicable to Palo Alto Networks GlobalProtect app version 4.1 and earlier.
56-
- **Palo Alto Networks GlobalProtect**: Applicable to Palo Alto Networks GlobalProtect app version 5.0 and later.
59+
- **F5 Access Legacy**
60+
61+
Applies to F5 Access app version 2.1 and earlier.
62+
- **F5 Access**
63+
64+
Applies to F5 Access app version 3.0 and later.
65+
- **Palo Alto Networks GlobalProtect (Legacy)**
66+
67+
Applies to Palo Alto Networks GlobalProtect app version 4.1 and earlier.
68+
- **Palo Alto Networks GlobalProtect**
69+
70+
Applies to Palo Alto Networks GlobalProtect app version 5.0 and later.
5771
- **Pulse Secure**
5872
- **Cisco (IPSec)**
5973
- **Citrix VPN**
6074
- **Citrix SSO**
61-
- **Zscaler**: To use Conditional Access, or allow users to bypass the Zscaler sign in screen, you must integrate Zscaler Private Access (ZPA) with your Azure AD account. For detailed steps, see the [Zscaler documentation](https://help.zscaler.com/zpa/configuration-guide-microsoft-azure-ad).
75+
- **Zscaler**
76+
77+
To use Conditional Access, or allow users to bypass the Zscaler sign in screen, you must integrate Zscaler Private Access (ZPA) with your Azure AD account. For detailed steps, see the [Zscaler documentation](https://help.zscaler.com/zpa/configuration-guide-microsoft-azure-ad).
6278
- **NetMotion Mobility**
63-
- **IKEv2**: [IKEv2 settings](#ikev2-settings) (in this article) describes the properties.
64-
- **Microsoft Tunnel (standalone client)(preview)**: Applicable to the Microsoft Tunnel client app.
65-
- **Microsoft Tunnel (preview)** - Applicable to the preview version of the Microsoft Defender for Endpoint app that includes Tunnel client functionality.
79+
- **IKEv2**
80+
81+
[IKEv2 settings](#ikev2-settings) (in this article) describes the properties.
82+
- **Microsoft Tunnel (standalone client)(preview)**
83+
84+
Applies to the Microsoft Tunnel client app.
85+
- **Microsoft Tunnel (preview)**
86+
87+
Applies to the preview version of the Microsoft Defender for Endpoint app that includes Tunnel client functionality.
6688
- **Custom VPN**
6789

6890
> [!NOTE]
@@ -242,72 +264,115 @@ These settings apply when you choose **Connection type** > **IKEv2**.
242264

243265
## Automatic VPN
244266

245-
- **On-demand VPN**: On-demand VPN uses rules to automatically connect or disconnect the VPN connection. When your devices attempt to connect to the VPN, it looks for matches in the parameters and rules you create, such as a matching IP address or domain name. If there's a match, then the action you choose runs.
267+
- **Type of automatic VPN**: Select the VPN type you want to configure: On-demand VPN or per-app VPN:
246268

247-
For example, create a condition where the VPN connection is only used when a device isn't connected to a company Wi-Fi network. Or, if a device can't access a DNS search domain you enter, then the VPN connection isn't started.
269+
- **Not configured** (default): Intune doesn't change or update this setting.
270+
- **On-demand VPN**: On-demand VPN uses rules to automatically connect or disconnect the VPN connection. When your devices attempt to connect to the VPN, it looks for matches in the parameters and rules you create, such as a matching domain name. If there's a match, then the action you choose runs.
248271

249-
- **Add**: Select this option to add a rule.
272+
For example, you can create a condition where the VPN connection is only used when a device isn't connected to a company Wi-Fi network. Or, if a device can't access a DNS search domain you enter, then the VPN connection isn't started.
250273

251-
- **I want to do the following**: If there's a match between the device value and your on-demand rule, then select the action. Your options:
274+
- **On-demand rules** > **Add**: Select **Add** to add a rule. If there isn't an existing VPN connection, then use these settings to create an on-demand rule. If there's a match to your rule, then the device does the action you select.
252275

253-
- Establish VPN
254-
- Disconnect VPN
255-
- Evaluate each connection attempt
256-
- Ignore
276+
- **I want to do the following**: If there's a match between the device value and your on-demand rule, then select the action you want the device to do. Your options:
257277

258-
- **I want to restrict to**: Select the condition that the rule must meet. Your options:
278+
- **Establish VPN**: If there's a match between the device value and your on-demand rule, then a VPN connection is created.
279+
- **Disconnect VPN**: If there's a match between the device value and your on-demand rule, then the VPN connection is disconnected.
280+
- **Evaluate each connection attempt**: If there's a match between the device value and your on-demand rule, then use the **Choose whether to connect** setting to decide what happens for *each* VPN connection attempt:
281+
- **Connect if needed**: If there isn't an existing VPN connection, then for each VPN connection attempt, decide if users should connect using a DNS domain name:
282+
- **When users try to access these domains**: Enter one or more DNS domains, like `contoso.com`. If users try to connect to a domain in this list, then the device uses DNS to resolve the domains you enter. If the domain doesn't resolve, then a VPN connection is created. If the domain does resolve, then a VPN connection isn't created.
259283

260-
- **Specific SSIDs**: Enter one or more wireless network names that the rule will apply. This network name is the Service Set Identifier (SSID). For example, enter `Contoso VPN`.
261-
- **Specific DNS domains**: Enter one or more DNS domains that the rule will apply. For example, enter `contoso.com`.
262-
- **All domains**: Select this option to apply your rule to all domains in your organization.
284+
Remember, domains are internal resources that aren't resolved by public DNS. A device can't access the domain from an external network. When a VPN connection is established, the internal domain can be accessed.
263285

264-
- **But only if this URL probe succeeds**: Optional. Enter a URL that the rule uses as a test. If the device accesses this URL without redirection, then the VPN connection is started. And, the device connects to the target URL. The user doesn't see the URL string probe site.
286+
- **Use the following DNS servers to resolve these domains (optional)**: Enter one or more DNS server IP addresses, like `10.0.0.22`. The DNS servers you enter are used to resolve the domains in the **When users try to access these domains** setting.
265287

266-
For example, a URL string probe is an auditing Web server URL that checks device compliance before connecting the VPN. Or, the URL tests the VPNs ability to connect to a site before the device connects to the target URL through the VPN.
288+
- **When this URL is unreachable, force-connect the VPN**: Optional. Enter an HTTP or HTTPS probing URL that the rule uses as a test. This URL is probed every time a user tries to access a domain in the **When users try to access these domains** setting. The user doesn't see the URL string probe site.
267289

268-
- **Prevent users from disabling automatic VPN**: Your options:
290+
For example, a URL string probe is an auditing web server URL that checks device compliance before connecting the VPN. Or, the URL tests the VPNs ability to connect to a site before the device connects to the target URL through the VPN.
269291

270-
- **Not configured**: Intune doesn't change or update this setting.
271-
- **Yes**: Prevents users from turning off automatic VPN. It forces users to keep the automatic VPN enabled and running.
272-
- **No**: Allows users to turn off automatic VPN.
292+
If the probe fails because the URL is unreachable or doesn't return a 200 HTTP status code, then a VPN connection is created.
273293

274-
This setting applies to:
275-
- iOS 14 and newer
276-
- iPadOS 14 and newer
294+
Remember, an internal URL can't be accessed because the device is connected to an external network. A VPN connection is created on demand. Once the VPN connection is established, internal resources are available.
295+
296+
- **Never connect**: For each VPN connection attempt, when users try to access the domains you enter, then a VPN connection is never created.
297+
298+
- **When users try to access these domains**: Enter one or more DNS domains, like `contoso.com`. If users try to connect to a domain in this list, then a VPN connection isn't created. If they try to connect to a domain not in this list, then a VPN connection is created.
299+
300+
- **Ignore**: If there's a match between the device value and your on-demand rule, then a VPN connection is ignored.
301+
302+
- **I want to restrict to**: In the **I want to do the following** setting, if you select **Establish VPN**, **Disconnect VPN**, or **Ignore**, then select the condition that the rule must meet. Your options:
277303

278-
- **Per-app VPN**: Enables per-app VPN by associating this VPN connection with an iOS/iPadOS app. When the app runs, the VPN connection starts. You can associate the VPN profile with an app when you assign the software. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
304+
- **Specific SSIDs**: Enter one or more wireless network names that the rule will apply. This network name is the Service Set Identifier (SSID). For example, enter `Contoso VPN`.
305+
- **Specific search domains**: Enter one or more DNS domains that the rule will apply. For example, enter `contoso.com`.
306+
- **All domains**: Select this option to apply your rule to all domains in your organization.
279307

280-
Per-app VPN isn't supported on IKEv2. For more information, see [set up per-app VPN for iOS/iPadOS devices](vpn-setting-configure-per-app.md).
308+
- **But only if this URL probe succeeds**: Optional. Enter a URL that the rule uses as a test. If the device accesses this URL without redirection, then the VPN connection is started. And, the device connects to the target URL. The user doesn't see the URL string probe site.
281309

282-
- **Provider Type**: Only available for Pulse Secure and Custom VPN.
283-
- When using iOS/iPadOS **per-app VPN** profiles with Pulse Secure or a Custom VPN, choose app-layer tunneling (app-proxy) or packet-level tunneling (packet-tunnel). Set the **ProviderType** value to **app-proxy** for app-layer tunneling, or **packet-tunnel** for packet-layer tunneling. If you're not sure which value to use, check your VPN provider's documentation.
310+
For example, a URL string probe is an auditing Web server URL that checks device compliance before connecting the VPN. Or, the URL tests the VPNs ability to connect to a site before the device connects to the target URL through the VPN.
284311

285-
- **Safari URLs that will trigger this VPN**: Add one or more web site URLs. When these URLs are visited using the Safari browser on the device, the VPN connection is automatically established.
312+
- **Block users from disabling automatic VPN**: Your options:
286313

287-
- **Associated Domains**: Enter associated domains in the VPN profile to use with this VPN connection.
314+
- **Not configured**: Intune doesn't change or update this setting.
315+
- **Yes**: Prevents users from turning off automatic VPN. It forces users to keep the automatic VPN enabled and running.
316+
- **No**: Allows users to turn off automatic VPN.
288317

289-
For more information, see [associated domains](device-features-configure.md#associated-domains).
318+
This setting applies to:
290319

291-
- **Excluded Domains**: Enter domains that can bypass the VPN connection when per-app VPN is connected. For example, enter `contoso.com`. Traffic to the `contoso.com` domain will use the public Internet even if the VPN is connected.
320+
- iOS 14 and newer
321+
- iPadOS 14 and newer
292322

293-
- **Prevent users from disabling automatic VPN**: Your options:
323+
- **Per-app VPN**: Enables per-app VPN by associating this VPN connection with a specific app. When the app runs, the VPN connection starts. You can associate the VPN profile with an app when you assign the app software or program. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
294324

295-
- **Not configured**: Intune doesn't change or update this setting.
296-
- **Yes**: Prevents users from turning off the Connect On Demand toggle within the VPN profile settings. It forces users to keep per-app VPN or on-demand rules enabled and running.
297-
- **No**: Allows users to turn off the Connect On Demand toggle, which disables per-app VPN and on-demand rules.
325+
Per-app VPN isn't supported on an IKEv2 connection. For more information, see [set up per-app VPN for iOS/iPadOS devices](vpn-setting-configure-per-app.md).
298326

299-
This setting applies to:
300-
- iOS 14 and newer
301-
- iPadOS 14 and newer
327+
- **Provider Type**: Only available for Pulse Secure and Custom VPN.
328+
329+
When using **per-app VPN** profiles with Pulse Secure or a Custom VPN, choose app-layer tunneling (app-proxy) or packet-level tunneling (packet-tunnel):
330+
331+
- **app-proxy**: Select this option for app-layer tunneling.
332+
- **packet-tunnel**: Select this option for packet-layer tunneling.
333+
334+
If you're not sure which option to use, then check your VPN provider's documentation.
335+
336+
- **Safari URLs that will trigger this VPN**: Add one or more web site URLs. When these URLs are visited using the Safari browser on the device, the VPN connection is automatically established. For example, enter `contoso.com`.
337+
338+
- **Associated Domains**: Enter associated domains in the VPN profile to use with this VPN connection.
339+
340+
For more information, see [associated domains](device-features-configure.md#associated-domains).
341+
342+
- **Excluded Domains**: Enter domains that can bypass the VPN connection when per-app VPN is connected. For example, enter `contoso.com`. Traffic to the `contoso.com` domain will use the public Internet even if the VPN is connected.
343+
344+
- **Block users from disabling automatic VPN**: Your options:
345+
346+
- **Not configured**: Intune doesn't change or update this setting.
347+
- **Yes**: Prevents users from turning off the Connect On Demand toggle within the VPN profile settings. It forces users to keep per-app VPN or on-demand rules enabled and running.
348+
- **No**: Allows users to turn off the Connect On Demand toggle, which disables per-app VPN and on-demand rules.
349+
350+
This setting applies to:
351+
352+
- iOS 14 and newer
353+
- iPadOS 14 and newer
302354

303355
## Per-app VPN
304356

305-
These settings apply when you choose **Connection type** > **Microsoft Tunnel (standalone client) (preview)** or **Connection type** > **Microsoft Tunnel (preview)**.
357+
These settings apply to the following VPN connection types:
358+
359+
- **Microsoft Tunnel (standalone client) (preview)**
360+
- **Microsoft Tunnel (preview)**
361+
362+
**Settings**:
306363

307-
- **Per-app VPN**: **Enable** associates a specific to this VPN connection. When the app runs, traffic automatically routes through the VPN connection. You can associate the VPN profile with an app when you assign the software. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
364+
- **Per-app VPN**: **Enable** associates a specific app to this VPN connection. When the app runs, traffic automatically routes through the VPN connection. You can associate the VPN profile with an app when you assign the software. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
308365

309366
For more information, see [Microsoft Tunnel for Intune](../protect/microsoft-tunnel-overview.md).
310367

368+
- **Safari URLs that will trigger this VPN**: Add one or more web site URLs. When these URLs are visited using the Safari browser on the device, the VPN connection is automatically established. For example, enter `contoso.com`.
369+
370+
- **Associated Domains**: Enter associated domains in the VPN profile to use with this VPN connection.
371+
372+
For more information, see [associated domains](device-features-configure.md#associated-domains).
373+
374+
- **Excluded Domains**: Enter domains that can bypass the VPN connection when per-app VPN is connected. For example, enter `contoso.com`. Traffic to the `contoso.com` domain will use the public Internet even if the VPN is connected.
375+
311376
## Proxy
312377

313378
If you use a proxy, then configure the following settings.
@@ -318,6 +383,6 @@ If you use a proxy, then configure the following settings.
318383

319384
## Next steps
320385

321-
The profile is created, but may not doing anything yet. Be sure to [assign the profile](device-profile-assign.md) and [monitor its status](device-profile-monitor.md).
386+
The profile is created, but may not be doing anything yet. Be sure to [assign the profile](device-profile-assign.md) and [monitor its status](device-profile-monitor.md).
322387

323388
Configure VPN settings on [Android](vpn-settings-android.md), [Android Enterprise](vpn-settings-android-enterprise.md), [macOS](vpn-settings-macos.md), and [Windows 10](vpn-settings-windows-10.md) devices.

0 commit comments

Comments
 (0)