Mobile client

The mobile client extends ​SIA​ protection to mobile devices. You deploy the mobile client in your enterprise to scan mobile traffic and enforce ​SIA​ policy to mobile applications.

If you enable the proxy, you can define how mobile traffic is handled. These settings are configured in a policy as part of the AUP and AVC configuration under Access Control. Based on the mobile device operating system, ​SIA​ allows you to select the proxy type or configure a walled garden for your mobile traffic. For Android devices, you can further send only browser traffic to ​SIA​ Proxy for scanning. For more information on these mobile settings, see Mode for mobile devices.

These terms apply:

  • Administrators configure the same policy settings and ​ETP Client​ configuration settings for the mobile client as they do for the desktop version. For example, you can configure the setting that allows end users to disable the client.

  • The mobile client is supported on Android, Apple iOS, iPadOS, and Google Chrome OS. For more information about supported operating systems and devices, see Supported mobile operating systems.

  • The mobile client is available in the app stores specific to the device and operating system. You can use your organization's MDM solution to deploy the client from app stores to supported mobile devices across your network.

  • You need to use an entitlement code to activate mobile clients that are distributed with MDM solutions. For instructions, see Distribute the mobile client.

  • End users can activate the mobile client on their personal device with an activation code. For more information, see Bring your own device (BYOD) support.

  • If you plan to allow MITM TLS Inspection by ​SIA​ Proxy, you can use your organization's MDM solution to distribute the ​SIA​ Proxy TLS MITM certificate to your mobile devices.
    Note the following:

    • Some Android devices only support certificates that are in PEM format. If a specific Android device does not support the PEM format, try downloading the certificate in DER format and then rename it to use the .cer file extension.
    • Some iOS devices only support certificates that are in DER format.

After the mobile client is installed and set up on a user's device, it acts as a VPN client. ​ETP Client​ protects user's devices whether it is on a wireless network or the cellular network. By default, the mobile client disables itself when another VPN client is enabled. To avoid this, you need to configure the MDM solution to restrict use of VPN clients and prioritize the ​ETP Client​.

📘

The mobile client now supports mobile network operators and internet service providers that use only IPv6 in their network.

Supported mobile operating systems

Mobile ​ETP Client​ supports these operating systems:

Operating SystemDeviceVersion
iOS
iPadOS
Apple iPhone
Apple iPad
Version 13 or later
AndroidN/AVersion 6.0 or later
Chrome OSChromebookVersion 76 or later

Mobile client statuses

Like the desktop client, the mobile client reports when a device is protected or unprotected. This status is visible in the mobile client. The client can report these statuses:

  • Protected indicates mobile requests are protected with ​SIA​. The following protected statuses are possible:

    • Protected via Secure DNS-over-TLS. Indicates that mobile requests are protected with DoT. For more about DoT, see DNS over TLS.

    • Protected via DNS over UDP. Indicates that mobile DNS requests are protected with the UDP. DNS over UDP (DoU) is used in situations where DoT can't be used and the client is forced to fall back to DoU. This can occur if DoT is blocked by a firewall or by enterprise middleboxes. It can also occur when DoT is disabled; or the administrator configures the client to Always Attempt a DoT connection, and this connection cannot be established.

    • Protected via Local Network. Indicates mobile requests are protected only when the device is on the corporate network that's configured to forward DNS requests to ​SIA​. In this case, the local DNS server handles requests. This status also appears if ​ETP Client​ cannot send requests to ​SIA​ because outbound UDP port 53 is blocked in the enterprise firewall.

  • Unprotected indicates that ​ETP Client​ is disabled or disconnected, or that the connection is interrupted. This status may also indicate that the client cannot reach the ​Akamai​ infrastructure, including ​SIA​ configuration, ​SIA​ DNS, or ​SIA​ Proxy. Depending on the situation, the following unprotected statuses are possible:

    • Unprotected! Initializing, please wait. Indicates the mobile client is still loading and establishing a connection.

    • Unprotected! No network. Indicates the mobile client is unable to connect to a network.

    • Unprotected! Disabled by User. If you allow end users to disable the client, this status indicates that the client was disabled by the user.

    • Unprotected! Suspended by Admin. Indicates the mobile client was disabled by an administrator.

    • Unprotected! Service is Unavailable. Indicates that ​ETP Client​ cannot reach ​Akamai​ infrastructure, including ​SIA​ configuration, ​SIA​ DNS, or ​SIA​ Proxy.

    • Unprotected! Another VPN is active. Indicates that device is using another VPN. The user needs to disconnect the VPN to use ​ETP Client​.

    • Unprotected! Disabled when hotspot is on. This status applies to Android devices only. The client does not support hotspot on Android devices.

​ETP Client​ stats

The mobile client allows end users to view the number of requests that are scanned and the number of requests that are blocked by the client.

Users are also given graphical data to show the top domains or applications based on operating system that are scanned and blocked in the past seven days and four weeks.

As shown, the client also indicates the average number of requests that are scanned and the average number of potential threats that are blocked per day.

The following applies:

  • The stats report the number of blocked DNS requests. This number represents requests where a user was shown a block notification.
  • When viewing a website, ​ETP Client​ may block URLs that the user has not attempted to access. For example, a blocked URL may be a link that's on an allowed website. In this situation, the user is shown a block notification for the URL and the block is counted in the stats.
  • A blocked domain is counted only once every 30 seconds for the same network. If more events occur for the same domain within the 30 second time frame, the additional blocks are not counted in the stats. As a result, it is possible that the number of blocked requests in the stats is different from the number of events in ​SIA​ reports.
  • A user can receive only one notification in a 30 second time frame. If multiple domains generate events within the 30 seconds, only one notification appears to avoid overwhelming the user with alerts.

Limitations of the mobile client

These limitations currently apply to mobile client:

  • A VPN client application cannot run simultaneously with the mobile client. If a VPN client is activated on the device, ​SIA​ client app automatically disables itself. To protect users with the mobile ​ETP Client​, you can use your organization's MDM solution to restrict use of another VPN client and prioritize the mobile client.

  • Any user and group that is set up for authentication and configured as exceptions to a blocked AVC risk level, category, category operation, application, and application operation, are not granted access. These authentication settings do not apply to traffic that goes through the mobile client. This also applies to other areas of the policy, including user and group exceptions configured for a custom list or DLP.

  • When an administrator makes policy changes or other configuration changes to ​SIA​, these updates are communicated to the mobile client and take effect within a five minute interval.

  • Certificate pinning is used by many mobile applications to validate that TLS certificates presented by web servers are known. These pinned certificates may be incompatible with the TLS man-in-middle certificate that is used for ​SIA​ Proxy. As a result, the ​SIA​ policy is applied differently if traffic comes from a mobile browser or a mobile app, as follows:

    • On an Android operating system version 10 and later, mobile traffic from mobile browsers is forwarded to ​SIA​ Proxy and TLS inspection is performed with the ​SIA​ Proxy certificate.

    • A selective proxy is applied to traffic from Apple iOS, iPadOS, Android apps, as well as any Android OS that is earlier than version 10. In this case, only known domains, AUP and AVC configured with block error page action, and risky domains and customer lists configured with the Allow or block action are sent to ​SIA​ Proxy. All other domains are handled on DNS level by ​SIA​ DNS.

  • If your organization sets up proxy chaining for the full web proxy and you use the mobile client, make sure you configure the local proxy to copy the Akamai-User-Agent header Mobile Clients send and forward it to the proxy.

  • When selecting a mode for mobile devices, consider the following:

    • If the mobile mode is set to Walled Garden for a device, make sure you also select Walled Garden as the default operating mode in the policy.

    • If you select the full proxy for any mobile device or you select Proxy (Browser Only) mode for Android, make sure the default operating mode is not set to Walled Garden.

      For more information about the default operating mode, see Default operating mode and Mode for mobile devices.

  • After a device is restarted or shut down, ​ETP Client​ may not start running by default. Make sure the ​ETP Client​ app is set to start automatically. For example, on some Android devices you can do the following to enable the Autostart option:

    • On the Android device, go to Settings > More Settings > Permission management > Autostart.
    • Check to see that this setting is enabled for ​ETP Client​.
  • On a mobile device, ​SIA​ assigns a pseudo-MAC address. If you uninstall and reinstall ​ETP Client​ on an Android device, ​SIA​ will track the device with a new pseudo-MAC address. This means that ​SIA​ reports contain multiple entries for the same device. Data related to the original installation of the client is shown with the original pseudo-MAC address, while data related to the new client installation is tracked with a new pseudo-MAC address. Entries for the original client are visible until they’re retired from our database.

Distribute mobile ​ETP Client​

This section provides instructions for distributing the mobile client with a MDM solution.

📘

Although the mobile client is available for download from the Google Play Store and the Apple App Store, no direct download is required. The MDM solutions in this section allow you to import the mobile client directly from the app stores.

Before you begin

Make sure you complete ​ETP Client​ preparation steps. For more information, see Prepare for ​ETP Client​ setup.

SolutionOperating SystemInstructions
Google Workspace Endpoint ManagementAndroid, iOS, ChromeOSDistribute the mobile client with Google Workspace Endpoint Management
Microsoft IntuneAndroid, iOS, iPadOSDistribute the mobile client with Microsoft Intune
VMware Workspace ONE Unified Endpoint Management (UEM) Powered by AirWatchAndroid, iOSDistribute the mobile client with Workspace ONE UEM
MobileIronAndroid, iOSDistribute the mobile client with MobileIron