Mobile client

The ETP mobile client extends ETP protection to mobile devices. You deploy the mobile client in your enterprise to scan mobile traffic and enforce ETP policy to mobile applications.

If you enable the proxy, you can define how mobile traffic is handled. These settings are configured in a policy as part of the AUP and AVC configuration under Access Control. Based on the mobile device operating system, ETP allows you to select the proxy type or configure a walled garden for your mobile traffic. For Android devices, you can further send only browser traffic to ETP Proxy for scanning. For more information on these mobile settings, see Mode for mobile devices.

These terms apply:

  • Administrators configure the same policy settings and ETP Client configuration settings for the mobile client as they do for the desktop version. For example, you can configure the setting that allows end users to disable the client.

  • The mobile client is supported on Android, Apple iOS, iPadOS, and Google Chrome OS. For more information about supported operating systems and devices, see Supported mobile operating systems.

  • The ETP mobile client is available in the app stores specific to the device and operating system. You can use your organization's MDM solution to deploy the client from app stores to supported mobile devices across your network.

  • You need to use an entitlement code to activate ETP mobile clients that are distributed with MDM solutions. For instructions, see Distribute ETP mobile client.

  • End users can activate the mobile client on their personal device with an activation code. For more information, see Bring your own device (BYOD) support.

  • If you plan to allow MITM TLS Inspection by ETP Proxy, you can use your organization's MDM solution to distribute the ETP Proxy TLS MITM certificate to your mobile devices.

After the ETP mobile client is installed and set up on a user's device, it acts as a VPN client. ETP Client protects user's devices whether it is on a wireless network or the cellular network. By default, ETP mobile client disables itself when another VPN client is enabled. To avoid this, you need to configure the MDM solution to restrict use of VPN clients and prioritize the ETP Client.


ETP mobile client now supports mobile network operators and internet service providers that use only IPv6 in their network.

Supported mobile operating systems

The ETP Mobile Client supports these operating systems:

Operating System




Apple iPhone
Apple iPad

Version 13 or later



Version 6.0 or later

Chrome OS


Version 76 or later

Mobile client statuses

Like the ETP desktop client, the mobile client reports when a device is protected or unprotected. This status is visible in the mobile client. The client can report these statuses:

  • Protected indicates mobile requests are protected with ETP. The following protected statuses are possible:

    • Protected via Secure DNS-over-TLS. Indicates that mobile requests are protected with DoT. For more about DoT, see DNS over TLS.

    • Protected via DNS over UDP. Indicates that mobile DNS requests are protected with the UDP. DNS over UDP (DoU) is used in situations where DoT can't be used and the client is forced to fall back to DoU. This can occur if DoT is blocked by a firewall or by enterprise middleboxes. It can also occur when DoT is disabled; or the administrator configures the client to Always Attempt a DoT connection, and this connection cannot be established.

    • Protected via Local Network. Indicates mobile requests are protected only when the device is on the corporate network that's configured to forward DNS requests to ETP. In this case, the local DNS server handles requests. This status also appears if ETP Client cannot send requests to ETP because outbound UDP port 53 is blocked in the enterprise firewall.

  • Unprotected indicates that ETP Client is disabled or disconnected, or that the connection is interrupted. This status may also indicate that the client cannot reach the ‚ÄčAkamai‚Äč infrastructure, including ETP configuration, ETP DNS, or ETP Proxy. Depending on the situation, the following unprotected statuses are possible:

    • Unprotected! Initializing, please wait. Indicates the mobile client is still loading and establishing a connection.

    • Unprotected! No network. Indicates the mobile client is unable to connect to a network.

    • Unprotected! Disabled by User. If you allow end users to disable the client, this status indicates that the client was disabled by the user.

    • Unprotected! Suspended by Admin. Indicates ETP mobile client was disabled by an administrator.

    • Unprotected! Service is Unavailable. Indicates that ETP client cannot reach ‚ÄčAkamai‚Äč infrastructure, including ETP configuration, ETP DNS, or ETP Proxy.

    • Unprotected! Another VPN is active. Indicates that device is using another VPN. The user needs to disconnect the VPN to use ETP Client.

    • Unprotected! Disabled when hotspot is on. This status applies to Android devices only. The client does not support hotspot on Android devices.

ETP Client stats

ETP mobile client allows end users to view the number of requests that are scanned and the number of requests that are blocked by the client.

Users are also given graphical data to show the top domains or applications based on operating system that are scanned and blocked in the past seven days and four weeks.

As shown, the client also indicates the average number of requests that are scanned and the average number of potential threats that are blocked per day.

The following applies:

  • The stats report the number of blocked DNS requests. This number represents requests where a user was shown a block notification.
  • When viewing a website, ETP Client may block URLs that the user has not attempted to access. For example, a blocked URL may be a link that's on an allowed website. In this situation, the user is shown a block notification for the URL and the block is counted in the stats.
  • A blocked domain is counted only once every 30 seconds for the same network. If more events occur for the same domain within the 30 second time frame, the additional blocks are not counted in the stats. As a result, it is possible that the number of blocked requests in the stats is different from the number of events in ETP reports.
  • A user can receive only one notification in a 30 second time frame. If multiple domains generate events within the 30 seconds, only one notification appears to avoid overwhelming the user with alerts.

Limitations of the ETP Mobile Client

These limitations currently apply to ETP Mobile Client:

  • A VPN client application cannot run simultaneously with the mobile client. If a VPN client is activated on the device, ETP client app automatically disables itself. To protect users with ETP mobile client, you can use your organization's MDM solution to restrict use of another VPN client and prioritize the ETP mobile client.

  • Any user and group that is set up for authentication and configured as exceptions to a blocked AVC risk level, category, category operation, application, and application operation, are not granted access. These authentication settings do not apply to traffic that goes through the mobile client. This also applies to other areas of the policy, including user and group exceptions configured for a custom list or DLP.

  • When an administrator makes policy changes or other configuration changes to ETP, these updates are communicated to the ETP mobile client and take effect within a five minute interval.

  • Certificate pinning is used by many mobile applications to validate that TLS certificates presented by web servers are known. These pinned certificates may be incompatible with the TLS man-in-middle certificate that is used for ETP Proxy. As a result, the ETP policy is applied differently if traffic comes from a mobile browser or a mobile app, as follows:

    • On an Android operating system version 10 and later, mobile traffic from mobile browsers is forwarded to ETP Proxy and TLS inspection is performed with the ETP Proxy certificate.

    • A selective proxy is applied to traffic from Apple iOS, iPadOS, Android apps, as well as any Android OS that is earlier than version 10. In this case, only known domains, AUP and AVC configured with block error page action, and risky domains and customer lists configured with the Allow or block action are sent to ETP Proxy. All other domains are handled on DNS level by ETP DNS.

  • If your organization sets up proxy chaining for the full web proxy and you use the ETP mobile client, make sure you configure the local proxy to copy the Akamai-User-Agent header Mobile Clients send and forward it to the proxy.

  • When selecting a mode for mobile devices, consider the following:

    • If the mobile mode is set to Walled Garden for a device, make sure you also select Walled Garden as the default operating mode in the policy.

    • If you select the full proxy for any mobile device or you select Proxy (Browser Only) mode for Android, make sure the default operating mode is not set to Walled Garden.

    For more information about the default operating mode, see Default operating mode and Mode for mobile devices.

  • After a device is restarted or shut down, ETP Client may not start running by default. Make sure the ETP Client app is set to start automatically. For example, on some Android devices you can do the following to enable the Autostart option:

    • On the Android device, go to Settings > More Settings > Permission management > Autostart.
    • Check to see that this setting is enabled for ETP Client.
  • On a mobile device, ETP assigns a pseudo-MAC address. If you uninstall and reinstall ETP Client on an Android device, ETP will track the device with a new pseudo-MAC address. This means that ETP reports contain multiple entries for the same device. Data related to the original installation of the client is shown with the original pseudo-MAC address, while data related to the new client installation is tracked with a new pseudo-MAC address. Entries for the original client are visible until they‚Äôre retired from our database.

Distribute ETP mobile client

This section provides instructions for distributing the ETP mobile client with a MDM solution.


Although ETP mobile client is available for download from the Google Play Store and the Apple App Store, no direct download is required. The MDM solutions in this section allow you to import the mobile client directly from the app stores.

Before you begin

Make sure you complete ETP Client preparation steps. For more information, see Prepare for ETP Client setup.


Operating System


Google Endpoint Management

Chrome OS

Distribute ETP mobile client to Chromebook with Google Endpoint Management

Microsoft Intune

Android, iOS, iPadOS

Distribute ETP mobile client with Microsoft Intune

VMware Workspace ONE Unified Endpoint Management (UEM) Powered by AirWatch

Android, iOS

Distribute ETP mobile client with Workspace ONE UEM


Android, iOS

Distribute ETP mobile client with MobileIron

Did this page help you?