Work Laptop on the Road: VPN, Split Tunneling & Compliance Basics

Blog

Work Laptop on the Road: VPN, Split Tu...

Work Laptop on the Road: VPN, Split Tunneling & Compliance Basics

30 Oct 2025

Work Laptop on the Road: VPN, Split Tunneling & Compliance Basics

Travelling with a corporate laptop is a balancing act between security, performance and convenience. Your company VPN protects sensitive traffic, but it can slow things down, drain battery and block local services. Split tunnelling promises relief by sending only work apps through the VPN and letting everything else use the local connection. Used wrongly, it can leak data or breach policy. Used correctly, it’s a smart way to stay productive on hotel Wi‑Fi, airport lounges and 4G/5G hotspots. This guide explains what split tunnelling is, when to use it, how to prepare before you fly, and the battery/compliance trade‑offs to watch. It’s written for travellers first, while staying friendly to IT policies and tooling. We’ll also cover practical connectivity choices, from personal hotspots to regional eSIMs such as Esim North America and Esim Western Europe, so you aren’t left fighting captive portals when a meeting starts.

What is split tunnelling?

When you connect to a corporate VPN, you typically get one of two modes:

  • Full tunnel: All traffic goes through the VPN. Maximum control and security. Greater latency, bandwidth overhead and battery use.
  • Split tunnel: Only defined apps or destinations go through the VPN. Everything else goes out locally to the internet. Better performance and battery. Increased exposure if misconfigured.

There are two common flavours of split tunnelling:

  • Per‑app: Only specific applications (e.g., Outlook, Teams, SAP) use the VPN. Others (e.g., Spotify, personal browser tabs) bypass it.
  • Per‑destination: Traffic to corporate domains, subnets or IP ranges uses the VPN; everything else goes direct.

Key risks to understand:

  • Data leakage: If an app that handles company data is not routed via the VPN, logs and content may leak to local networks.
  • Policy breach: Many organisations disable or tightly control split tunnelling to enforce monitoring, DLP and compliance.
  • Captive portals: Some networks block or throttle VPNs. Split tunnelling can help you authenticate to the network, but policies still govern what’s allowed.

If your search intent is “vpn split tunneling travel,” the core takeaway is: it’s useful on the road, but only when your company explicitly allows and configures it.

Should you use split tunnelling on the road?

Pros (when permitted by IT): - Faster access to local/cloud services (video calls, maps, local content). - Better battery life due to reduced encryption overhead and lower round‑trip times. - Fewer geolocation issues for non‑work apps (streaming, public cloud buckets in‑region). - Smoother captive portal logins on hotel and airport Wi‑Fi.

Cons: - Increased risk surface on untrusted networks; misrouted traffic could expose metadata or content. - Harder for IT to enforce uniform controls and logs across all traffic. - Some collaboration tools may behave unpredictably when half inside, half outside the tunnel.

Bottom line: Use split tunnelling only if your IT policy allows it, ideally with centrally managed per‑app rules. If your device is managed (MDM/EDR), let IT push the profile. Avoid ad‑hoc, user‑side tweaks unless you have explicit approval.

Prepare your work laptop before you travel

Use this checklist one week before departure:

  1. Confirm policy - Ask IT whether split tunnelling is allowed on corporate devices. - Clarify which apps must be forced through VPN and which can bypass. - Request written guidance for your destination(s).
  2. Update and test - Patch your OS, VPN client and browser. - Test the VPN on at least two networks (home and a mobile hotspot). - Confirm you can reach key services (email, intranet, storage, CRM) with and without split tunnelling (if permitted).
  3. MFA and recovery - Add backup MFA methods (TOTP app, phone, hardware key). - Generate one‑time recovery codes in case SMS is unavailable. - Ensure your device time zone and clock auto‑sync (MFA can fail with time drift).
  4. Profiles and policies - Have IT push the correct VPN profile(s) and DNS split rules for your region. - Check that Always‑On VPN behaviour matches policy (e.g., blocks traffic until tunnel up). - Verify the kill switch is enabled if required.
  5. Connectivity plan - Prefer mobile data over insecure public Wi‑Fi when possible. Load an eSIM for your route: see Destinations, or choose a regional plan like Esim North America or Esim Western Europe. Country options include Esim United States, Esim France, Esim Italy and Esim Spain. - Set up your phone’s personal hotspot as a backup. - Save hotel Wi‑Fi details offline, but avoid auto‑connect on unknown networks.
  6. Contacts and contingencies - Save IT helpdesk contacts and escalation hours in your calendar (local time). - Request an alternative protocol/port (e.g., TLS/443) profile if your main VPN is blocked. - Ask for safe split tunnelling defaults if you’ll be presenting or streaming.

Pro tips: - Download offline installers for the VPN client and MFA app. - Cache the latest company root certificates in case the device can’t reach internal distribution points. - If travelling to higher‑risk regions, ask about a “clean laptop” policy and temporary accounts.

Configure split tunnelling safely (with IT approval)

Your corporate image may lock these settings; if so, use IT‑pushed profiles instead. If user‑config is permitted:

Windows 11/10 (generic steps)

  • Open your corporate VPN client. Look for “Split tunnelling,” “Per‑app VPN” or “Exclude local networks.”
  • Choose the mode approved by IT:
  • Per‑app include list: Add only work apps to the VPN list.
  • Per‑app exclude list: Keep all apps in VPN except those explicitly excluded (safer default).
  • Per‑destination: Add corporate subnets (e.g., 10.0.0.0/8), domains or DNS suffixes.
  • Ensure DNS for corporate domains resolves via the VPN (check “Use VPN DNS for internal domains”).
  • Enable the kill switch if required, and verify that non‑VPN traffic is blocked when the tunnel is down (for non‑split apps).
  • Apply and test:
  • Open a corporate app (should route via VPN).
  • Open a public website (should route directly if excluded).
  • Confirm IP paths with “whoami” sites or tracert; check DNS with nslookup against internal names.

macOS (generic steps)

  • In your managed VPN app or Network settings profile, locate split tunnelling controls.
  • Use per‑app or per‑domain routing as defined by IT; avoid wildcards that could capture personal traffic.
  • Verify “Send all traffic over VPN” is disabled only if split tunnelling is explicitly allowed.
  • Check DNS suffix search and internal resolver settings are applied when the tunnel is up.
  • Test with Activity Monitor’s per‑process network view or a browser extension that shows current egress IP.

Pro tips: - Don’t exclude your browser if you access SaaS tools that handle company data—keep it on the VPN unless IT says otherwise. - Avoid excluding update services; patching over untrusted networks is sensitive and may be blocked by your company anyway. - If performance is poor, ask IT about protocol options (e.g., IKEv2 vs TLS) rather than changing encryption settings yourself.

Network choices on the road

Order of preference for reliability and safety:

  1. Mobile data via eSIM on your laptop/tablet or phone hotspot.
  2. Known, password‑protected networks you control (MiFi, travel router with your SIM/eSIM).
  3. Enterprise‑grade public networks (airline lounges).
  4. Hotel or café Wi‑Fi (last resort).

Why eSIMs help: - Stable IPs and lower contention than crowded hotel networks. - Fewer captive portals that break VPN handshakes. - Predictable costs and usage alerts.

Plan ahead with Destinations and pick a regional or country plan to match your itinerary: Esim North America, Esim Western Europe, Esim United States, Esim France, Esim Italy or Esim Spain. If you’re managing a team, centralise purchasing and support via For Business. Partners and MSPs can streamline provisioning through the Partner Hub.

Captive portal tip: - Most portals block VPNs until you accept terms. Temporarily disconnect the VPN, join the Wi‑Fi, complete the portal, then reconnect. If policy enforces Always‑On VPN, use mobile data to complete sign‑in or ask IT for a captive‑portal profile.

Battery and performance trade‑offs

VPNs consume CPU to encrypt/decrypt traffic and can keep radios active, increasing battery use. Practical steps:

  • Prefer modern, efficient protocols approved by IT. IKEv2 and WireGuard‑based options are generally lighter than older SSL/TLS stacks, but only switch if your organisation supports them.
  • Use split tunnelling (if allowed) for heavy, non‑sensitive traffic like video conferencing to reduce packets through the tunnel.
  • Avoid marginal Wi‑Fi. Weak signals force higher transmit power and retries. A good eSIM or hotspot can use less energy overall.
  • Close background sync and heavy downloads before joining a meeting. Cloud drive re‑indexing can saturate the tunnel.
  • Reduce resolution/frame rate in video calls if bandwidth is tight.
  • Let your device sleep between tasks; some VPN clients keep sockets alive—enable power‑friendly settings if IT permits.
  • Keep your device cool. Thermal throttling increases energy per task and can worsen VPN performance.

Compliance essentials (don’t break policy)

  • Respect MDM/EDR controls. Don’t install personal VPNs or proxies alongside corporate VPN clients.
  • Don’t modify encryption, DNS or split rules beyond what IT has approved.
  • Treat public cloud/SaaS as “work data” unless explicitly personal. If you use a browser for both, keep that browser within the VPN.
  • In restricted or high‑risk countries, consult IT about export controls, device searches and data minimisation. Ask whether a loaner device is required.
  • If your VPN is blocked regionally, use the IT‑approved fallback profile. Avoid consumer workarounds that could violate policy.

Troubleshooting on the road: quick fixes

If the VPN won’t connect: - Try another network (switch to your eSIM or hotspot). - Check time/date and time zone; re‑sync if MFA fails. - Complete captive portal sign‑in before reconnecting. - Toggle a secondary protocol/port profile (e.g., TLS/443) if provided. - Reboot the device; network stacks and drivers often recover on restart.

If split tunnelling misroutes traffic: - Flush DNS cache and retry. - Ensure corporate domains are on the “include” list. - Remove risky exclusions (e.g., your browser) and test again.

If calls are choppy: - Move the conferencing app to bypass VPN (only if IT allows). - Drop video quality or switch to audio‑only. - Swap to mobile data; hotel Wi‑Fi uplinks are often the bottleneck.

If you can’t reach internal sites: - Verify the VPN is up and that DNS suffix search is applied. - Try the short hostname and the FQDN. - Ask IT whether the site is geo‑restricted or requires a different profile.

Pro tips: - Keep offline copies of key docs for read‑only access if the VPN drops. - Save your helpdesk’s “known issues” page for quick self‑diagnosis.

FAQ

  • What is split tunnelling in a VPN? Split tunnelling routes only selected apps or destinations through the VPN, with other traffic using the local internet. It improves performance and battery life, but must be configured and approved by IT to avoid data leakage.
  • Is it safe to use split tunnelling on hotel Wi‑Fi? Only if your company allows it and has defined which traffic must stay inside the tunnel. Use mobile data where possible, and keep work apps (email, browsers used for SaaS, storage clients) inside the VPN.
  • Will a VPN slow my connection? Yes, some. Encryption and longer routes add latency and reduce throughput. Efficient protocols and split tunnelling (if permitted) mitigate this. A good eSIM or hotspot often outperforms congested Wi‑Fi.
  • Can I watch streaming services while connected to my corporate VPN? Often your company blocks or discourages this. Even if it works, streaming through the VPN can waste bandwidth and trigger policy issues. If allowed, keep streaming outside the tunnel with split tunnelling, and only on personal time.
  • My VPN breaks at captive portals. What should I do? Disconnect the VPN, complete the portal login, then reconnect. If your device enforces Always‑On VPN, connect via mobile data first or use an IT‑approved captive‑portal profile.
  • Should I tether from my phone or use hotel Wi‑Fi? Tethering via a regional eSIM is typically safer and more reliable. See Destinations for travel options, including Esim North America and Esim Western Europe.

Next step: If you’re equipping a team for secure travel, centralise data plans and support with For Business.

Read more blogs

Andes Highlights (3 Weeks): Peru–Bolivia–Chile–Argentina Connectivity

Andes Highlights (3 Weeks): Peru–Bolivia–Chile–Argentina Connectivity

Planning a south america itinerary 3 weeks through the high Andes? This route stitches together Peru’s Sacred Valley, Bolivia’s La Paz and Salar de Uyuni, Chile’s Atacama Desert, and northern Argentina’s quebradas or Mendoza wine country—often by long-distance bus and a couple of short flights. Connectivity is different at altitude: coverage is strong in cities but drops in high passes and salt flats; bus Wi‑Fi is patchy; border towns can be blackspots. The smart move is an eSIM with multi‑country coverage, backed by offline maps, offline translations, and a simple routine for crossing borders by bus without losing service. Below you’ll find a practical, connectivity-first itinerary; checklists to prep your phone, apps and documents; and on-the-ground tips for staying online where it matters: booking transport, hailing taxis, backing up photos, and navigating when the signal disappears.If you’re transiting via Europe or North America, you can also add a layover eSIM to stay connected door-to-door. Start with our country list on Destinations, then follow the steps, and you won’t waste time chasing SIM shops at 3,500 metres.The 3‑week Andes route at a glanceWeek 1: Peru (Cusco, Sacred Valley, Machu Picchu) - Fly into Cusco (or Lima then connect). - Base in Cusco; day trips to Pisac/Chinchero/Maras–Moray. - Train to Aguas Calientes; Machu Picchu visit; return to Cusco or continue to Puno/Lake Titicaca.Week 2: Bolivia and Chile (La Paz, Uyuni, San Pedro de Atacama) - Bus/collectivo via Copacabana to La Paz. - Fly or overnight bus to Uyuni. - 3‑day Uyuni–altiplano tour ending in San Pedro de Atacama (Chile).Week 3: Chile and Argentina (Atacama to Salta or Mendoza/Buenos Aires) - Choose: - North: San Pedro to Salta/Jujuy by bus; fly to Buenos Aires. - Or South: San Pedro–Calama flight to Santiago; bus or flight to Mendoza; onward to Buenos Aires.Connectivity notes (quick): - Cities: generally strong 4G/4G+; 5G in major hubs (Santiago, Buenos Aires). - Altitude/rural: expect long no‑signal stretches (Uyuni, altiplano passes, Paso Jama). - Bus Wi‑Fi: often advertised, rarely reliable. Plan to be offline onboard. - Border regions: networks switch; a multi‑country eSIM avoids sudden loss.eSIM vs local SIMs for a 4‑country tripFor a route with multiple borders and remote legs, eSIM wins on time and reliability.What a multi‑country eSIM gets you: - One plan across Peru, Bolivia, Chile, Argentina (check coverage per country on Destinations). - No passport/SIM registration queues at kiosks. - Keep your home number active on the physical SIM for calls/SMS codes. - Instant top‑ups if you burn data on photos or navigation.When a local SIM still helps: - Long stay in one country with heavy data use (e.g., a month in Buenos Aires). - Dead zones where a different local network performs better (rarely worth the hassle on a 3‑week pace).Practical approach: - Use an eSIM as your primary data line across all four countries. - If you find a specific local network far better in one region, add a cheap local SIM and keep the eSIM as backup.Device readiness checklist (before you fly)1) Check eSIM compatibility and SIM‑lock status on your phone.2) Buy and install your eSIM while on home Wi‑Fi. Keep a PDF/printed copy of the QR code.3) Label lines clearly (e.g., “eSIM Andes Data”, “Home SIM”).4) Turn on data roaming for the eSIM; leave roaming off for your home SIM to avoid charges.5) Set up dual‑SIM rules: data on eSIM; calls/SMS default to home SIM if needed.6) Download offline: Google Maps/Organic Maps for all target regions; language packs (Spanish at minimum); bus/air tickets; hotel confirmations.7) Cloud backups: set to upload on Wi‑Fi only; pre‑create shared albums for travel companions.8) Test tethering/hotspot with your laptop/tablet.If you’re transiting popular hubs, consider a short layover eSIM: - USA connections: add an Esim United States or a broader Esim North America.- Europe connections: Madrid/Barcelona? Use an Esim Spain. Paris or Rome? See Esim France and Esim Italy. Multi‑country layovers? Try Esim Western Europe.City‑by‑city connectivity notesCusco & the Sacred Valley (Peru)Coverage: Good in Cusco city; variable in high villages (Maras/Moray) and along Inca Trail approaches.Tips: Download Sacred Valley maps offline; pin viewpoints and ruins. most taxis use WhatsApp—save your accommodation’s number.Machu Picchu/Aguas Calientes: Patchy to none at the citadel. Upload your photos later; don’t rely on live ticket retrieval.Lake Titicaca: Puno and CopacabanaPuno: Reasonable 4G; bus terminals crowded—screenshot QR tickets.Crossing to Copacabana: Expect a signal drop around the border; have directions saved offline.La Paz (Bolivia)Good urban 4G; the cable car network has decent signal but tunnels do not.Yungas/“Death Road” tours: Mountain valleys cause dead zones—share your emergency contacts with the operator, carry a charged power bank, and don’t plan remote calls.Uyuni and the Altiplano (Bolivia to Chile)Uyuni town: OK 4G; ATMs finicky—use Wi‑Fi for banking apps.Salt flats/lagunas: Assume offline for most of the 3‑day tour. Guides often carry satellite phones; agree a pickup time/place in San Pedro and preload your map route.San Pedro de Atacama (Chile)Town: Solid 4G; accommodations often have Wi‑Fi but speeds vary.Geysers, Valle de la Luna: Offline navigation essential; sunrise trips start before mobile networks wake up in some areas.Salta/Jujuy or Mendoza/Buenos Aires (Argentina)Salta/Jujuy: Good city coverage; quebradas have long no‑signal sections.Mendoza: City 4G/5G; vineyards outside town can be patchy.Buenos Aires: Strong 4G/5G; ideal for cloud backups and large downloads before you fly home.Border crossings by bus: step‑by‑stepThe big ones on this route: Peru–Bolivia (Puno/Copacabana), Bolivia–Chile (Uyuni–San Pedro via Hito Cajón), Chile–Argentina (Paso Jama to Salta or Los Libertadores to Mendoza).How to keep service and sanity:1) The day before:- Top up your eSIM data.- Confirm your plan includes both countries you’re entering/leaving.- Download offline maps for both sides of the border and your town of arrival.- Save bus company WhatsApp and terminal address offline.2) On departure morning:- Keep a paper copy or offline PDF of tickets, insurance, and accommodation proof.- Charge phone and power bank; pack a short cable in your daypack.3) On the bus:- Don’t count on bus Wi‑Fi. Keep your eSIM as primary, but expect drops near mountain passes.- If your phone supports it, enable “Wi‑Fi calling” for later when you reach accommodation Wi‑Fi.4) At the border posts:- Data may be unavailable. Keep QR codes and booking numbers offline.- After exiting one country and entering the next, toggle Airplane Mode off/on to re‑register on the new network.- If the eSIM doesn’t attach, manually select a network in Mobile Settings.5) Arrival:- Send your accommodation a quick WhatsApp when you’re back online.- Recheck your eSIM’s data roaming is on; confirm you’re on an in‑country network, not a weak roaming partner.Pro tips: - Dual profiles: If your eSIM allows, keep a secondary profile for a different network in the same country—helpful in border towns.- Cash buffer: Some border terminals don’t accept cards; download a currency converter for offline use.Offline survival kit (5‑minute setup)Maps: Download regions for Cusco, Sacred Valley, Puno, La Paz, Uyuni, San Pedro, Salta/Jujuy or Mendoza, and Buenos Aires.Translations: Download Spanish for offline use; add phrasebook favourites (bus tickets, directions, dietary needs).Documents: Save PDFs of passports, tickets, hotel addresses; star them for quick access.Rides: Screenshots of pickup points; pin bus terminals and hotel doors.Entertainment: Podcasts and playlists for long bus legs, set to download on Wi‑Fi only.Altitude and your tech: what changesCoverage gaps lengthen: Fewer towers at high altitude; valleys can block signal. Assume offline on remote excursions.Batteries drain faster in cold: Keep your phone warm and carry a power bank (10,000–20,000 mAh).Hotel Wi‑Fi may be congested: Schedule big uploads (photo backups, app updates) for big-city stays like Santiago or Buenos Aires.GPS still works offline: Your blue dot shows on offline maps without data—preload everything.Data budgeting for 3 weeksTypical traveller usage across this route: - Messaging/Maps/Bookings: 0.2–0.5 GB/day- Social and photo sharing: 0.3–0.7 GB/day- Occasional video calls/streaming: 0.5–1.0 GB/dayFor a mixed-use trip, plan 15–25 GB for 3 weeks. Heavy creators should double it and upload over hotel Wi‑Fi when possible. If you work remotely, consider a higher‑capacity plan and a backup eSIM; see our guidance on For Business.Practical route with transport and connectivity cuesDays 1–4 Cusco base: Strong city signal; day trips may be spotty—go offline-ready.Days 5–6 Machu Picchu: Expect no service at the ruins; sync tickets ahead.Days 7–8 Puno to La Paz via Copacabana: Border signal drop; re‑register networks after crossing.Days 9–11 Uyuni tour to San Pedro: Treat as offline; charge nightly; carry spare cables.Days 12–14 San Pedro: Stable in town; tours offline; top up data before Paso Jama.Days 15–17 Salta/Jujuy or Mendoza: Good urban 4G; rural patches are offline.Days 18–21 Buenos Aires: Strongest connectivity of the trip; clear your uploads and map downloads for the flight home.Partnering and stopover extrasHospitality and tour operators in the Andes: help your guests stay connected—explore co‑branded solutions via our Partner Hub.Transatlantic flyers: test your eSIM setup on a layover with an Esim United States or Esim Western Europe before hitting high-altitude blackspots.FAQs1) Do I need a local SIM in each country?No. A multi‑country eSIM covering Peru, Bolivia, Chile and Argentina is simpler and works well for a 3‑week pace. Consider a local SIM only if you’ll spend longer in one country and want the absolute best regional coverage.2) Will my WhatsApp number change with an eSIM?No. WhatsApp is tied to your registered number, not your data line. Keep your home SIM active for voice/SMS (roaming off if you wish), and use the eSIM for data—WhatsApp continues as normal.3) Can I hotspot to my laptop or camera?Yes. Enable tethering on your eSIM. Mind your data: cloud backups and OS updates can burn gigabytes—set them to Wi‑Fi only or schedule in big cities.4) What if there’s no signal on the Uyuni/Atacama legs?That’s expected. GPS still works offline. Pre-download maps and translations, carry a power bank, and sync plans with your tour operator before departure.5) Will I get roaming charges at borders?If you’re using a multi‑country eSIM with coverage in both countries, you won’t incur extra roaming fees from your home carrier. Keep roaming off on your home SIM to avoid accidental use.6) I’m connecting via Europe or the US—worth getting a layover eSIM?Yes. It’s an easy way to test your setup and stay reachable. Try Esim North America or country options like Esim Spain, Esim France, or Esim Italy for common hubs.Next step: Browse South America coverage options and build your plan on Destinations.

How to Set Up an eSIM on iPhone 15/16: Step-by-Step with Fixes

How to Set Up an eSIM on iPhone 15/16: Step-by-Step with Fixes

Travelling with an iPhone 15 or 16? Good news: Apple’s eSIM experience is now fast, reliable and ideal for travellers who want local data without juggling plastic SIMs. This guide walks you through a clean, repeatable iPhone eSIM setup, including QR code install, manual activation details (SM‑DP+), carrier app installs and Quick Transfer. You’ll also find practical APN tips, a fixes section for the most common errors, and pro traveller settings so data just works the moment you land. If you hit a snag at any point, jump straight to Troubleshooting below.If you’re still shopping for a plan, browse country and regional options on Destinations — from single-country picks like Esim United States, Esim France, Esim Italy or Esim Spain to multi-country passes like Esim Western Europe and Esim North America.Before you start: what you needEstimated time: 5–10 minutesCost: Free to install (plan cost varies)An iPhone 15 or iPhone 16 running current iOS (Settings > General > Software Update).Reliable Wi‑Fi (strongly recommended during activation).Your eSIM details:Either a QR code, orManual activation details: SM‑DP+ address, Activation Code, and (if provided) Confirmation Code.If transferring from another iPhone: both phones on iOS 16+ and signed into iCloud with Bluetooth on.Quick checks: - Remove any old VPN profiles (Settings > General > VPN & Device Management) if they may interfere. - Backup screenshots or a PDF of your QR code so you have it offline on arrival.Compatibility note: - iPhone 15/16 models sold in the United States are eSIM‑only. International variants generally still include a physical SIM tray. All support multiple eSIMs with up to two lines active at the same time.Step-by-step iPhone eSIM setupYou can add an eSIM in four ways. Use the method your provider supports.Tip: If your provider instructs you to activate only after you land, you can still pre‑install the eSIM over Wi‑Fi and toggle it on later.Option 1: Install via QR code (fastest)Connect to Wi‑Fi.On your iPhone: Settings > Mobile Data (Cellular) > Add eSIM.Tap Use QR Code and point the camera at your code.When prompted, tap Continue. If asked, choose to Add eSIM.Wait for “Activating” to complete. This can take 1–3 minutes.Label the line (e.g., “Japan data”).Set as your Mobile Data line if it’s your travel plan. Keep your home line for calls/SMS if needed.Leave Data Roaming off until you arrive, unless your plan requires activation at purchase.If you see “Invalid QR Code” or “Plan Cannot Be Added”, see Troubleshooting.Option 2: Enter details manually (SM‑DP+ and Activation Code)Settings > Mobile Data > Add eSIM > Use QR Code > Enter Details Manually.Enter: - SM‑DP+ Address: e.g., “xyz.smdp.com” (exactly as provided) - Activation Code: long string (case‑sensitive) - Confirmation Code: only if your provider lists oneTap Next and wait for activation.Label and assign the line for data as needed.Tip: Typo‑sensitive. Copy/paste carefully. Double‑check dots and dashes.Option 3: Install via carrier/appInstall your provider’s app from the App Store.Create/log in to your account and purchase/assign the eSIM to your device.In the app, select “Install eSIM” and follow the prompts.When iOS prompts to add the plan, confirm and wait for activation.Option 4: eSIM Quick Transfer (moving from your old iPhone)Put both iPhones side by side with Bluetooth on and signed into iCloud.On your new iPhone: Settings > Mobile Data > Add eSIM > Transfer From Nearby iPhone.On your old iPhone, approve the transfer and choose the line.Wait for activation on the new device and confirm the line is working.Decide whether to keep the eSIM active on the old phone (usually off for travel).After activation: configure for travelThese post‑install settings make the difference between “it works” and “it works every time”.Label lines: Settings > Mobile Data > tap the new plan > Label.Default line:Mobile Data: choose your travel eSIM.Voice: choose your home line if you want your usual number active.iMessage & FaceTime: Settings > Messages/FaceTime > Send & Receive > pick the appropriate number/email.Data Roaming: Toggle on when you land in your destination.Network Selection: If auto fails, try manual. Settings > Mobile Data > Network Selection > turn off Automatic and choose a listed partner network.5G/LTE: Settings > Mobile Data > Mobile Data Options > Voice & Data > try 5G Auto/On or LTE per provider guidance.Low Data Mode: Turn off if speeds seem throttled unnecessarily.APN and data settings (only if needed)Most eSIMs auto‑configure APN. If data connects but webpages won’t load, set APN manually.Go to Settings > Mobile Data > your eSIM plan > Mobile Data Network (Cellular Data Network).Under Mobile Data (Cellular Data):APN: enter the exact APN value provided (e.g., “internet”, “fast.t-mobile.com” — this will vary).Username/Password: leave blank unless specified.MMS/Personal Hotspot APNs: set only if you’ve been given values.Return one level and reboot the iPhone if the change doesn’t apply immediately.Pro tips: - If the APN field is missing or greyed out, your profile is locked by the carrier; contact support to push correct settings. - “Could not activate mobile data network” usually means incorrect APN or temporary network registration delay. Recheck APN and toggle Airplane Mode for 20 seconds.Troubleshooting: top errors and fast fixesIf activation fails, work methodically. Most issues resolve in under 5 minutes.1) “Invalid QR code” / “This code is no longer valid” - Cause: Code already redeemed, expired, or scanned incorrectly. - Fix: - Confirm you’re scanning the most recent QR from your provider. - Try Enter Details Manually (SM‑DP+, Activation Code). - Ask the provider to reissue the eSIM.2) “Activation unsuccessful” / Stuck on “Activating” - Cause: Wi‑Fi glitch or temporary carrier server timeout. - Fix: - Force‑quit Settings, toggle Airplane Mode on for 20 seconds, then off. - Reboot iPhone. - Switch to a different Wi‑Fi or use a known‑good hotspot. - Try again after 10–15 minutes.3) “No Service” after install - Cause: Roaming off, wrong network selected, unsupported band, or not yet in the coverage area. - Fix: - Toggle Data Roaming on (when in destination). - Settings > Mobile Data > Network Selection: try manual selection of a partner network. - Settings > Mobile Data Options > Voice & Data: switch between 5G Auto, 5G On, and LTE. - Restart the iPhone.4) Data doesn’t work; calls/SMS do (or vice‑versa) - Cause: APN not set, wrong default data line, or plan is data‑only. - Fix: - Confirm your eSIM is selected as the Mobile Data line. - Set APN manually as provided by the carrier. - If your plan is data‑only, use OTT apps for calls/messages.5) “Plan cannot be added” / “Unable to complete cellular plan change” - Cause: Region/IMEI/EID mismatch or unsupported device profile. - Fix: - Ensure you’re on the latest iOS. - Provide your device EID to the provider (Settings > General > About). - Ask the provider to reprovision the eSIM.6) “Could not activate mobile data network” - Cause: APN or temporary network block. - Fix: - Reenter APN, then reboot. - Toggle Airplane Mode, then test again. - Try manual network selection.Still stuck? Delete and reinstall the eSIM: - Settings > Mobile Data > tap the plan > Remove eSIM. Re‑add via QR/manual details. Ensure Wi‑Fi is stable during reactivation.Managing multiple eSIMs on iPhone 15/16Store many, use two: iPhone 15/16 can store multiple eSIMs and keep up to two lines active at once.Switch data line quickly: Settings > Mobile Data > Mobile Data > select the plan you need.Pause a line (don’t delete): Toggle “Turn On This Line” off to keep the profile for later.Delete when finished: Remove eSIM to tidy your list. Keep a copy of the QR/manual details in case you need to reinstall.Pro tips for travellersPre‑install on Wi‑Fi before you fly, then toggle the line on when you land.Keep your home line on for SMS codes, but set the travel eSIM as the Mobile Data line.Save the QR code and manual details offline (Files app/Notes) for airport re‑installs.If speed dips in crowds, try manual network selection or switch between 5G and LTE.Hotspot/tethering: Check your plan allows it; if not working, set the APN for Personal Hotspot if provided.Plan your eSIM by destinationChoose a country or a multi‑country pass based on your route: - Single countries: Esim United States, Esim France, Esim Italy, Esim Spain - Multi‑country: Esim Western Europe, Esim North AmericaSee the full list on Destinations.Travelling as a team? Explore pooled and managed plans For Business. Partners and resellers can access assets and tools via the Partner Hub.FAQ1) Can I use two eSIMs at the same time on iPhone 15/16?Yes. You can have multiple eSIMs stored and keep two lines active simultaneously. Assign one for Mobile Data and choose how to handle voice and iMessage/FaceTime.2) Do iPhone 15/16 models support physical SIMs?US‑market iPhone 15/16 models are eSIM‑only. Many international variants also support a physical nano‑SIM alongside eSIM. Regardless, eSIM is supported across the range.3) When should I install my travel eSIM?If allowed by your provider, install over Wi‑Fi before departure, then switch Data Roaming on when you land. If your plan starts counting from activation, install at the airport on arrival.4) How do I move my eSIM to a new iPhone 16?Use Add eSIM > Transfer From Nearby iPhone (Quick Transfer) with both phones on iOS 16+. Some providers require issuing a new eSIM—contact them with your new device’s EID if Quick Transfer isn’t offered.5) My data works but some apps are slow. What can I check?- Disable Low Data Mode.- Try switching 5G Auto ↔ LTE.- Set APN manually if your provider supplies one.- Toggle Private Relay/VPN off temporarily.- Try manual network selection to a different roaming partner.6) What if my QR code has expired?Ask your provider to reissue the eSIM or use the manual SM‑DP+ and Activation Code path if those details are still valid.Next stepPick your plan now and be ready to connect on landing: browse Destinations.

MDM + eSIM at Scale: Jamf, Intune, and Knox Deployment Patterns

MDM + eSIM at Scale: Jamf, Intune, and Knox Deployment Patterns

Enterprises want travel-ready devices that “just work” the moment staff land. The trick is marrying modern eSIM provisioning with your MDM so you can control cost, security, and user effort. This guide shows practical mdm esim deployment patterns that scale across Jamf (Apple), Intune (iOS and Android), and Samsung Knox. We’ll cover enrolment flows that minimise user taps, profile locking to stop accidental deletions, dual‑SIM policies that split work vs personal usage, and roaming presets for fleets moving between regions. You’ll also find checklists and pro tips that reduce support tickets and bill shock.We assume your organisation provides work devices for travel, or supports COPE/CYOD where personal lines coexist with corporate data. Use this as a blueprint to pilot, then operationalise. For region planning, see our coverage library across Destinations, including ready-to-deploy options for Esim United States, Esim France, Esim Italy, Esim Spain, Esim Western Europe, and Esim North America.What you can and can’t automate todayBefore designing flows, acknowledge current platform realities:Silent eSIM install is limited. On iOS and standard Android Enterprise, fully silent eSIM download/activation is generally not available to third‑party MDMs. Users usually scan a QR or paste an activation code (SM‑DP+ address and code).MDM excels at governance. You can lock who can add/remove plans, steer which SIM handles data, and preconfigure roaming behaviours (especially on Samsung via Knox).Multiple eSIM profiles can be stored. Most recent iPhones and Androids can hold several eSIMs, with one active for data at a time. This enables preloading per-region profiles.The right pre-provisioning removes friction. If you deliver the code securely, guide the user at enrolment, and then lock settings, day‑one travel becomes smooth.Core building blocks for mdm esim deploymentActivation methods:QR code scan (most common, fastest for users).SM‑DP+ server and activation code entered manually.Carrier/eSIM app deep-link (opens to a prefilled code; still user-confirmed).Ownership and enrolment models:COBO (corporate-owned, business-only): strongest control, ideal for travel pools.COPE/CYOD: align dual‑SIM policies to separate work data (eSIM) and personal voice (physical SIM).Automated Device Enrolment (Apple) / Zero-touch (Android) for day‑0 governance.Lifecycle states:Download, enable for data, set data roaming, lock modifications, suspend or remove post‑trip.Policy pillars:Profile locking (prevent removal/changes).Dual‑SIM defaults (data on eSIM; personal SIM voice only).Roaming presets (country/region-based switching and controls).Cross‑platform baseline policy pack (start here)Apply these controls in Jamf, Intune, and Knox (where supported):1) Restrictions and lock‑down - iOS/iPadOS: Disable “Modify eSIM/cellular plan” in Restrictions payload (Jamf and Intune support this). This prevents deleting or adding plans after deployment. - Android Enterprise (fully managed): Disallow mobile network configuration changes. Use OEMConfig/Knox to enhance this on Samsung. - Optionally disable hotspot if you fund only device use, not tethering.2) Secure delivery of activation details - Store and distribute SM‑DP+ and activation codes via: - Jamf Self Service item or Intune Company Portal page. - A managed app with AppConfig (codes scoped per user/group). - Conditional access for off-network users via VPN or Microsoft Tunnel.3) Dual‑SIM governance - Communicate the standard: “eSIM = work data; physical SIM = personal voice/text.” - Enforce default data SIM and block data on the personal SIM where the platform allows (Knox can enforce; iOS typically requires user confirmation guided by Self Service).4) Roaming controls - iOS: you cannot programmatically toggle Data Roaming on/off; provide in-app guidance and compliance notifications. - Samsung via Knox: set data roaming per region profile; lock the user toggle if you need strict cost control.5) Observability and support - Use a managed data-usage app or network analytics to alert at thresholds. - Create device groups per destination; push correct eSIM profile and instructions before travel.Pro tip: Pre-provision multiple regional eSIMs (e.g., Esim Western Europe plus Esim United States) on eligible devices; switch the active data line just before travel.Jamf patterns for iOS/iPadOSRecommended enrolment flow (ADE)Use Apple Business Manager with Automated Device Enrolment to drop users into Jamf out of the box.During Setup Assistant, restrict “Cellular Plan” modifications via a configuration profile pushed immediately after enrolment.Day‑0 “self‑serve” eSIM installation1) Scope a Jamf Self Service item named “Activate Work Travel eSIM”. 2) Present country/region options mapped to your travel catalogue (e.g., Esim France, Esim Italy, Esim Spain, or broader Esim North America). 3) On selection, reveal the QR or invoke a deeplink to your eSIM provider’s install URL (still user‑approved). 4) After installation, prompt the user to: - Set the eSIM as “Mobile Data” line. - Keep personal SIM for “Default Voice Line” (if COPE). - Enable Data Roaming if travelling out of their home network.5) Post‑install, Jamf immediately re‑applies the restriction to prevent further eSIM changes.Pro tips: - Use Jamf Smart Groups based on upcoming travel to target the correct instructions and codes. - Embed a 30‑second video or step‑by‑step within Self Service; it reduces support tickets dramatically.Pre‑travel top‑ups and seasonal switchesCreate Self Service policies “Enable EU Data” and “Enable US Data”.Each policy reveals the relevant QR/code and a short checklist for the user to switch the Mobile Data line.Re-lock eSIM modifications after the switch.Dual‑SIM policy on iOSYou cannot currently force default data line via MDM on iOS; instead:Provide a one-screen Self Service guide with screenshots.Use an in-app confirmation (“I’ve set eSIM for data”) to mark the device compliant and suppress reminders.Restrict eSIM modification to keep the work plan intact.Microsoft Intune patterns (iOS and Android)Enrolment and scopingiOS/iPadOS: Enrol through Company Portal or ADE; apply the iOS device restriction to block eSIM modifications post‑install.Android Enterprise:COBO: Fully Managed is best for travel pools.COPE: Work Profile on company‑owned gives balance but fewer network controls; consider Samsung + KSP for more power.Delivering eSIM details securelyUse Intune to publish a Company Portal resource “Install Work eSIM” scoped by Azure AD groups (e.g., “Travel_EU_Q4”).Optionally deliver codes via a managed app using AppConfig so they never appear in email or chat.For high-risk destinations, require VPN before revealing the code.Enforcing dual‑SIM and roaming (Android)With Samsung devices, deploy the Knox Service Plugin (KSP) via Intune’s OEMConfig:Set preferred SIM for mobile data to eSIM.Disable data on physical SIM (voice/text unaffected).Toggle and lock Data Roaming per region profile (e.g., allow in EU, block elsewhere).For non‑Samsung Android, use available Android restrictions to limit user changes; depth varies by OEM.Pro tip: Maintain device groups per region and travel window. When a user is added to “Travel_US_Nov,” Intune auto-publishes the Esim United States resource, applies KSP roaming settings (if Samsung), and sends a single push prompting installation.Samsung Knox deployment patterns (Knox Manage or Intune + KSP)Samsung offers the deepest cellular controls for Android Enterprise:Preferred data SIM: Force eSIM as the data line and keep personal SIM for voice/SMS.Data Roaming control: Allow/block and optionally hide the toggle from users to prevent drift.Mobile networks UI restrictions: Prevent users from adding/removing profiles or altering APNs.APN fine‑tuning: Rarely needed with eSIM, but useful for private APN cases.Typical flow (COBO travel handset): 1) Zero‑touch enrol into Knox Manage or Intune DO. 2) Push KSP with a “Home” profile (roaming off, data on eSIM, tethering off). 3) Before travel, switch to a “Destination” profile (roaming on, data on eSIM, usage alerts). 4) Distribute the eSIM activation QR via Knox E-FOTA notification or Intune Company Portal. 5) Lock network settings post‑install.Pro tip: Pair KSP roaming policies with a data-usage app that shows per‑SIM consumption. Users understand what’s going on, and you stay ahead of overages.Roaming presets for fleetsBuild a small library of policy + plan bundles:Western Europe bundle:eSIM: Esim Western EuropePolicy: Data roaming on; personal SIM data off; hotspot allowed for field teams if needed.Guidance: Remind users to choose eSIM for data on arrival.North America bundle:eSIM: Esim North America or country‑specific Esim United StatesPolicy: Roaming on; push time‑zone and dialling tips; enable Wi‑Fi Assist guidance if required.Country‑specific bundles:France/Italy/Spain with Esim France, Esim Italy, Esim SpainPolicy: Standard dual‑SIM rules; translate quick-start steps for local teams if necessary.Preload multiple profiles (where devices support it) so frequent travellers only switch the active data line in Settings. Reference coverage and plan validity on Destinations when planning trips.Operational playbooksCOBO travel pool devicesDevice state: Fully managed (Jamf ADE / Intune DO / Knox Manage).Install method: QR in a managed portal with a 60‑second guide.Lockdown: Block eSIM modifications; hide roaming toggles (Samsung).Offboarding: Remove or disable the travel profile after return (user‑assisted).COPE (personal SIM + corporate eSIM)Device state: Jamf or Intune with clear Self Service instructions.Policy: eSIM for data; personal SIM voice/SMS. Restrict personal SIM data (Samsung) or provide guidance (iOS).Privacy: Communicate what is and isn’t monitored; keep trust high.Frequent-flyer executivesPreload EU + US eSIMs; give a one‑tap Self Service checklist “Switch Data to EU/US”.Provide a wallet card or offline PDF with steps for when they land without data.Troubleshooting quick checks (field-proven)eSIM not downloading? Confirm device is unlocked, on Wi‑Fi, and date/time is automatic.No data after install? Ensure the eSIM is selected as the Mobile Data line and Data Roaming is on outside the home network.Dual‑SIM confusion? Rename lines (e.g., “Work eSIM” and “Personal SIM”) in Settings to reduce mistakes.Poor performance? Toggle Airplane Mode for 10 seconds; then check network selection is automatic.Stuck policy? Force an MDM sync (Jamf: Self Service “Update Inventory”; Intune: Company Portal “Check status”).FAQsCan MDM silently install an eSIM profile?Generally no on iOS and standard Android. Expect a user‑confirmed QR scan or code entry. Build your flow to make that step quick and clear.How do I stop users deleting the work eSIM?iOS/iPadOS: Disable eSIM/cellular plan modifications via MDM Restrictions.Android: Use Device Owner restrictions; on Samsung, enforce additional SIM/network policies via Knox.Can I enforce that work data uses the eSIM and personal SIM is voice only?Yes on Samsung via Knox (preferred data SIM, disable personal SIM data).On iOS, you’ll guide users to set eSIM as the data line and then lock plan modifications.Can I turn Data Roaming on/off with MDM?Samsung via Knox: yes, including hiding the toggle.iOS: not programmatically; provide clear user prompts at install and arrival.How many eSIMs can a device store?Modern iPhones and Androids can store multiple eSIM profiles, with one active for data. Exact limits vary by model. Preload frequent destinations and switch as needed.What’s the best way to support travellers landing without data?Provide QR codes that work over hotel/airport Wi‑Fi, offline quick-start steps in Self Service, and a short SMS template they can send from their personal SIM to get help.Next stepReady to pilot mdm esim deployment with proper policy controls? Share your route map and device mix with our enterprise team via For Business. We’ll help you design enrolment flows, locking, dual‑SIM policies, and region bundles that scale.