Work Laptop on the Road: VPN, Split Tunneling & Compliance Basics

Blog

Work Laptop on the Road: VPN, Split Tu...

Work Laptop on the Road: VPN, Split Tunneling & Compliance Basics

30 Oct 2025

Work Laptop on the Road: VPN, Split Tunneling & Compliance Basics

Travelling with a corporate laptop is a balancing act between security, performance and convenience. Your company VPN protects sensitive traffic, but it can slow things down, drain battery and block local services. Split tunnelling promises relief by sending only work apps through the VPN and letting everything else use the local connection. Used wrongly, it can leak data or breach policy. Used correctly, it’s a smart way to stay productive on hotel Wi‑Fi, airport lounges and 4G/5G hotspots. This guide explains what split tunnelling is, when to use it, how to prepare before you fly, and the battery/compliance trade‑offs to watch. It’s written for travellers first, while staying friendly to IT policies and tooling. We’ll also cover practical connectivity choices, from personal hotspots to regional eSIMs such as Esim North America and Esim Western Europe, so you aren’t left fighting captive portals when a meeting starts.

What is split tunnelling?

When you connect to a corporate VPN, you typically get one of two modes:

  • Full tunnel: All traffic goes through the VPN. Maximum control and security. Greater latency, bandwidth overhead and battery use.
  • Split tunnel: Only defined apps or destinations go through the VPN. Everything else goes out locally to the internet. Better performance and battery. Increased exposure if misconfigured.

There are two common flavours of split tunnelling:

  • Per‑app: Only specific applications (e.g., Outlook, Teams, SAP) use the VPN. Others (e.g., Spotify, personal browser tabs) bypass it.
  • Per‑destination: Traffic to corporate domains, subnets or IP ranges uses the VPN; everything else goes direct.

Key risks to understand:

  • Data leakage: If an app that handles company data is not routed via the VPN, logs and content may leak to local networks.
  • Policy breach: Many organisations disable or tightly control split tunnelling to enforce monitoring, DLP and compliance.
  • Captive portals: Some networks block or throttle VPNs. Split tunnelling can help you authenticate to the network, but policies still govern what’s allowed.

If your search intent is “vpn split tunneling travel,” the core takeaway is: it’s useful on the road, but only when your company explicitly allows and configures it.

Should you use split tunnelling on the road?

Pros (when permitted by IT): - Faster access to local/cloud services (video calls, maps, local content). - Better battery life due to reduced encryption overhead and lower round‑trip times. - Fewer geolocation issues for non‑work apps (streaming, public cloud buckets in‑region). - Smoother captive portal logins on hotel and airport Wi‑Fi.

Cons: - Increased risk surface on untrusted networks; misrouted traffic could expose metadata or content. - Harder for IT to enforce uniform controls and logs across all traffic. - Some collaboration tools may behave unpredictably when half inside, half outside the tunnel.

Bottom line: Use split tunnelling only if your IT policy allows it, ideally with centrally managed per‑app rules. If your device is managed (MDM/EDR), let IT push the profile. Avoid ad‑hoc, user‑side tweaks unless you have explicit approval.

Prepare your work laptop before you travel

Use this checklist one week before departure:

  1. Confirm policy - Ask IT whether split tunnelling is allowed on corporate devices. - Clarify which apps must be forced through VPN and which can bypass. - Request written guidance for your destination(s).
  2. Update and test - Patch your OS, VPN client and browser. - Test the VPN on at least two networks (home and a mobile hotspot). - Confirm you can reach key services (email, intranet, storage, CRM) with and without split tunnelling (if permitted).
  3. MFA and recovery - Add backup MFA methods (TOTP app, phone, hardware key). - Generate one‑time recovery codes in case SMS is unavailable. - Ensure your device time zone and clock auto‑sync (MFA can fail with time drift).
  4. Profiles and policies - Have IT push the correct VPN profile(s) and DNS split rules for your region. - Check that Always‑On VPN behaviour matches policy (e.g., blocks traffic until tunnel up). - Verify the kill switch is enabled if required.
  5. Connectivity plan - Prefer mobile data over insecure public Wi‑Fi when possible. Load an eSIM for your route: see Destinations, or choose a regional plan like Esim North America or Esim Western Europe. Country options include Esim United States, Esim France, Esim Italy and Esim Spain. - Set up your phone’s personal hotspot as a backup. - Save hotel Wi‑Fi details offline, but avoid auto‑connect on unknown networks.
  6. Contacts and contingencies - Save IT helpdesk contacts and escalation hours in your calendar (local time). - Request an alternative protocol/port (e.g., TLS/443) profile if your main VPN is blocked. - Ask for safe split tunnelling defaults if you’ll be presenting or streaming.

Pro tips: - Download offline installers for the VPN client and MFA app. - Cache the latest company root certificates in case the device can’t reach internal distribution points. - If travelling to higher‑risk regions, ask about a “clean laptop” policy and temporary accounts.

Configure split tunnelling safely (with IT approval)

Your corporate image may lock these settings; if so, use IT‑pushed profiles instead. If user‑config is permitted:

Windows 11/10 (generic steps)

  • Open your corporate VPN client. Look for “Split tunnelling,” “Per‑app VPN” or “Exclude local networks.”
  • Choose the mode approved by IT:
  • Per‑app include list: Add only work apps to the VPN list.
  • Per‑app exclude list: Keep all apps in VPN except those explicitly excluded (safer default).
  • Per‑destination: Add corporate subnets (e.g., 10.0.0.0/8), domains or DNS suffixes.
  • Ensure DNS for corporate domains resolves via the VPN (check “Use VPN DNS for internal domains”).
  • Enable the kill switch if required, and verify that non‑VPN traffic is blocked when the tunnel is down (for non‑split apps).
  • Apply and test:
  • Open a corporate app (should route via VPN).
  • Open a public website (should route directly if excluded).
  • Confirm IP paths with “whoami” sites or tracert; check DNS with nslookup against internal names.

macOS (generic steps)

  • In your managed VPN app or Network settings profile, locate split tunnelling controls.
  • Use per‑app or per‑domain routing as defined by IT; avoid wildcards that could capture personal traffic.
  • Verify “Send all traffic over VPN” is disabled only if split tunnelling is explicitly allowed.
  • Check DNS suffix search and internal resolver settings are applied when the tunnel is up.
  • Test with Activity Monitor’s per‑process network view or a browser extension that shows current egress IP.

Pro tips: - Don’t exclude your browser if you access SaaS tools that handle company data—keep it on the VPN unless IT says otherwise. - Avoid excluding update services; patching over untrusted networks is sensitive and may be blocked by your company anyway. - If performance is poor, ask IT about protocol options (e.g., IKEv2 vs TLS) rather than changing encryption settings yourself.

Network choices on the road

Order of preference for reliability and safety:

  1. Mobile data via eSIM on your laptop/tablet or phone hotspot.
  2. Known, password‑protected networks you control (MiFi, travel router with your SIM/eSIM).
  3. Enterprise‑grade public networks (airline lounges).
  4. Hotel or café Wi‑Fi (last resort).

Why eSIMs help: - Stable IPs and lower contention than crowded hotel networks. - Fewer captive portals that break VPN handshakes. - Predictable costs and usage alerts.

Plan ahead with Destinations and pick a regional or country plan to match your itinerary: Esim North America, Esim Western Europe, Esim United States, Esim France, Esim Italy or Esim Spain. If you’re managing a team, centralise purchasing and support via For Business. Partners and MSPs can streamline provisioning through the Partner Hub.

Captive portal tip: - Most portals block VPNs until you accept terms. Temporarily disconnect the VPN, join the Wi‑Fi, complete the portal, then reconnect. If policy enforces Always‑On VPN, use mobile data to complete sign‑in or ask IT for a captive‑portal profile.

Battery and performance trade‑offs

VPNs consume CPU to encrypt/decrypt traffic and can keep radios active, increasing battery use. Practical steps:

  • Prefer modern, efficient protocols approved by IT. IKEv2 and WireGuard‑based options are generally lighter than older SSL/TLS stacks, but only switch if your organisation supports them.
  • Use split tunnelling (if allowed) for heavy, non‑sensitive traffic like video conferencing to reduce packets through the tunnel.
  • Avoid marginal Wi‑Fi. Weak signals force higher transmit power and retries. A good eSIM or hotspot can use less energy overall.
  • Close background sync and heavy downloads before joining a meeting. Cloud drive re‑indexing can saturate the tunnel.
  • Reduce resolution/frame rate in video calls if bandwidth is tight.
  • Let your device sleep between tasks; some VPN clients keep sockets alive—enable power‑friendly settings if IT permits.
  • Keep your device cool. Thermal throttling increases energy per task and can worsen VPN performance.

Compliance essentials (don’t break policy)

  • Respect MDM/EDR controls. Don’t install personal VPNs or proxies alongside corporate VPN clients.
  • Don’t modify encryption, DNS or split rules beyond what IT has approved.
  • Treat public cloud/SaaS as “work data” unless explicitly personal. If you use a browser for both, keep that browser within the VPN.
  • In restricted or high‑risk countries, consult IT about export controls, device searches and data minimisation. Ask whether a loaner device is required.
  • If your VPN is blocked regionally, use the IT‑approved fallback profile. Avoid consumer workarounds that could violate policy.

Troubleshooting on the road: quick fixes

If the VPN won’t connect: - Try another network (switch to your eSIM or hotspot). - Check time/date and time zone; re‑sync if MFA fails. - Complete captive portal sign‑in before reconnecting. - Toggle a secondary protocol/port profile (e.g., TLS/443) if provided. - Reboot the device; network stacks and drivers often recover on restart.

If split tunnelling misroutes traffic: - Flush DNS cache and retry. - Ensure corporate domains are on the “include” list. - Remove risky exclusions (e.g., your browser) and test again.

If calls are choppy: - Move the conferencing app to bypass VPN (only if IT allows). - Drop video quality or switch to audio‑only. - Swap to mobile data; hotel Wi‑Fi uplinks are often the bottleneck.

If you can’t reach internal sites: - Verify the VPN is up and that DNS suffix search is applied. - Try the short hostname and the FQDN. - Ask IT whether the site is geo‑restricted or requires a different profile.

Pro tips: - Keep offline copies of key docs for read‑only access if the VPN drops. - Save your helpdesk’s “known issues” page for quick self‑diagnosis.

FAQ

  • What is split tunnelling in a VPN? Split tunnelling routes only selected apps or destinations through the VPN, with other traffic using the local internet. It improves performance and battery life, but must be configured and approved by IT to avoid data leakage.
  • Is it safe to use split tunnelling on hotel Wi‑Fi? Only if your company allows it and has defined which traffic must stay inside the tunnel. Use mobile data where possible, and keep work apps (email, browsers used for SaaS, storage clients) inside the VPN.
  • Will a VPN slow my connection? Yes, some. Encryption and longer routes add latency and reduce throughput. Efficient protocols and split tunnelling (if permitted) mitigate this. A good eSIM or hotspot often outperforms congested Wi‑Fi.
  • Can I watch streaming services while connected to my corporate VPN? Often your company blocks or discourages this. Even if it works, streaming through the VPN can waste bandwidth and trigger policy issues. If allowed, keep streaming outside the tunnel with split tunnelling, and only on personal time.
  • My VPN breaks at captive portals. What should I do? Disconnect the VPN, complete the portal login, then reconnect. If your device enforces Always‑On VPN, connect via mobile data first or use an IT‑approved captive‑portal profile.
  • Should I tether from my phone or use hotel Wi‑Fi? Tethering via a regional eSIM is typically safer and more reliable. See Destinations for travel options, including Esim North America and Esim Western Europe.

Next step: If you’re equipping a team for secure travel, centralise data plans and support with For Business.

Read more blogs

Andes Highlights (3 Weeks): Peru–Bolivia–Chile–Argentina Connectivity

Andes Highlights (3 Weeks): Peru–Bolivia–Chile–Argentina Connectivity

Planning a south america itinerary 3 weeks through the high Andes? This route stitches together Peru’s Sacred Valley, Bolivia’s La Paz and Salar de Uyuni, Chile’s Atacama Desert, and northern Argentina’s quebradas or Mendoza wine country—often by long-distance bus and a couple of short flights. Connectivity is different at altitude: coverage is strong in cities but drops in high passes and salt flats; bus Wi‑Fi is patchy; border towns can be blackspots. The smart move is an eSIM with multi‑country coverage, backed by offline maps, offline translations, and a simple routine for crossing borders by bus without losing service. Below you’ll find a practical, connectivity-first itinerary; checklists to prep your phone, apps and documents; and on-the-ground tips for staying online where it matters: booking transport, hailing taxis, backing up photos, and navigating when the signal disappears.If you’re transiting via Europe or North America, you can also add a layover eSIM to stay connected door-to-door. Start with our country list on Destinations, then follow the steps, and you won’t waste time chasing SIM shops at 3,500 metres.The 3‑week Andes route at a glanceWeek 1: Peru (Cusco, Sacred Valley, Machu Picchu) - Fly into Cusco (or Lima then connect). - Base in Cusco; day trips to Pisac/Chinchero/Maras–Moray. - Train to Aguas Calientes; Machu Picchu visit; return to Cusco or continue to Puno/Lake Titicaca.Week 2: Bolivia and Chile (La Paz, Uyuni, San Pedro de Atacama) - Bus/collectivo via Copacabana to La Paz. - Fly or overnight bus to Uyuni. - 3‑day Uyuni–altiplano tour ending in San Pedro de Atacama (Chile).Week 3: Chile and Argentina (Atacama to Salta or Mendoza/Buenos Aires) - Choose: - North: San Pedro to Salta/Jujuy by bus; fly to Buenos Aires. - Or South: San Pedro–Calama flight to Santiago; bus or flight to Mendoza; onward to Buenos Aires.Connectivity notes (quick): - Cities: generally strong 4G/4G+; 5G in major hubs (Santiago, Buenos Aires). - Altitude/rural: expect long no‑signal stretches (Uyuni, altiplano passes, Paso Jama). - Bus Wi‑Fi: often advertised, rarely reliable. Plan to be offline onboard. - Border regions: networks switch; a multi‑country eSIM avoids sudden loss.eSIM vs local SIMs for a 4‑country tripFor a route with multiple borders and remote legs, eSIM wins on time and reliability.What a multi‑country eSIM gets you: - One plan across Peru, Bolivia, Chile, Argentina (check coverage per country on Destinations). - No passport/SIM registration queues at kiosks. - Keep your home number active on the physical SIM for calls/SMS codes. - Instant top‑ups if you burn data on photos or navigation.When a local SIM still helps: - Long stay in one country with heavy data use (e.g., a month in Buenos Aires). - Dead zones where a different local network performs better (rarely worth the hassle on a 3‑week pace).Practical approach: - Use an eSIM as your primary data line across all four countries. - If you find a specific local network far better in one region, add a cheap local SIM and keep the eSIM as backup.Device readiness checklist (before you fly)1) Check eSIM compatibility and SIM‑lock status on your phone.2) Buy and install your eSIM while on home Wi‑Fi. Keep a PDF/printed copy of the QR code.3) Label lines clearly (e.g., “eSIM Andes Data”, “Home SIM”).4) Turn on data roaming for the eSIM; leave roaming off for your home SIM to avoid charges.5) Set up dual‑SIM rules: data on eSIM; calls/SMS default to home SIM if needed.6) Download offline: Google Maps/Organic Maps for all target regions; language packs (Spanish at minimum); bus/air tickets; hotel confirmations.7) Cloud backups: set to upload on Wi‑Fi only; pre‑create shared albums for travel companions.8) Test tethering/hotspot with your laptop/tablet.If you’re transiting popular hubs, consider a short layover eSIM: - USA connections: add an Esim United States or a broader Esim North America.- Europe connections: Madrid/Barcelona? Use an Esim Spain. Paris or Rome? See Esim France and Esim Italy. Multi‑country layovers? Try Esim Western Europe.City‑by‑city connectivity notesCusco & the Sacred Valley (Peru)Coverage: Good in Cusco city; variable in high villages (Maras/Moray) and along Inca Trail approaches.Tips: Download Sacred Valley maps offline; pin viewpoints and ruins. most taxis use WhatsApp—save your accommodation’s number.Machu Picchu/Aguas Calientes: Patchy to none at the citadel. Upload your photos later; don’t rely on live ticket retrieval.Lake Titicaca: Puno and CopacabanaPuno: Reasonable 4G; bus terminals crowded—screenshot QR tickets.Crossing to Copacabana: Expect a signal drop around the border; have directions saved offline.La Paz (Bolivia)Good urban 4G; the cable car network has decent signal but tunnels do not.Yungas/“Death Road” tours: Mountain valleys cause dead zones—share your emergency contacts with the operator, carry a charged power bank, and don’t plan remote calls.Uyuni and the Altiplano (Bolivia to Chile)Uyuni town: OK 4G; ATMs finicky—use Wi‑Fi for banking apps.Salt flats/lagunas: Assume offline for most of the 3‑day tour. Guides often carry satellite phones; agree a pickup time/place in San Pedro and preload your map route.San Pedro de Atacama (Chile)Town: Solid 4G; accommodations often have Wi‑Fi but speeds vary.Geysers, Valle de la Luna: Offline navigation essential; sunrise trips start before mobile networks wake up in some areas.Salta/Jujuy or Mendoza/Buenos Aires (Argentina)Salta/Jujuy: Good city coverage; quebradas have long no‑signal sections.Mendoza: City 4G/5G; vineyards outside town can be patchy.Buenos Aires: Strong 4G/5G; ideal for cloud backups and large downloads before you fly home.Border crossings by bus: step‑by‑stepThe big ones on this route: Peru–Bolivia (Puno/Copacabana), Bolivia–Chile (Uyuni–San Pedro via Hito Cajón), Chile–Argentina (Paso Jama to Salta or Los Libertadores to Mendoza).How to keep service and sanity:1) The day before:- Top up your eSIM data.- Confirm your plan includes both countries you’re entering/leaving.- Download offline maps for both sides of the border and your town of arrival.- Save bus company WhatsApp and terminal address offline.2) On departure morning:- Keep a paper copy or offline PDF of tickets, insurance, and accommodation proof.- Charge phone and power bank; pack a short cable in your daypack.3) On the bus:- Don’t count on bus Wi‑Fi. Keep your eSIM as primary, but expect drops near mountain passes.- If your phone supports it, enable “Wi‑Fi calling” for later when you reach accommodation Wi‑Fi.4) At the border posts:- Data may be unavailable. Keep QR codes and booking numbers offline.- After exiting one country and entering the next, toggle Airplane Mode off/on to re‑register on the new network.- If the eSIM doesn’t attach, manually select a network in Mobile Settings.5) Arrival:- Send your accommodation a quick WhatsApp when you’re back online.- Recheck your eSIM’s data roaming is on; confirm you’re on an in‑country network, not a weak roaming partner.Pro tips: - Dual profiles: If your eSIM allows, keep a secondary profile for a different network in the same country—helpful in border towns.- Cash buffer: Some border terminals don’t accept cards; download a currency converter for offline use.Offline survival kit (5‑minute setup)Maps: Download regions for Cusco, Sacred Valley, Puno, La Paz, Uyuni, San Pedro, Salta/Jujuy or Mendoza, and Buenos Aires.Translations: Download Spanish for offline use; add phrasebook favourites (bus tickets, directions, dietary needs).Documents: Save PDFs of passports, tickets, hotel addresses; star them for quick access.Rides: Screenshots of pickup points; pin bus terminals and hotel doors.Entertainment: Podcasts and playlists for long bus legs, set to download on Wi‑Fi only.Altitude and your tech: what changesCoverage gaps lengthen: Fewer towers at high altitude; valleys can block signal. Assume offline on remote excursions.Batteries drain faster in cold: Keep your phone warm and carry a power bank (10,000–20,000 mAh).Hotel Wi‑Fi may be congested: Schedule big uploads (photo backups, app updates) for big-city stays like Santiago or Buenos Aires.GPS still works offline: Your blue dot shows on offline maps without data—preload everything.Data budgeting for 3 weeksTypical traveller usage across this route: - Messaging/Maps/Bookings: 0.2–0.5 GB/day- Social and photo sharing: 0.3–0.7 GB/day- Occasional video calls/streaming: 0.5–1.0 GB/dayFor a mixed-use trip, plan 15–25 GB for 3 weeks. Heavy creators should double it and upload over hotel Wi‑Fi when possible. If you work remotely, consider a higher‑capacity plan and a backup eSIM; see our guidance on For Business.Practical route with transport and connectivity cuesDays 1–4 Cusco base: Strong city signal; day trips may be spotty—go offline-ready.Days 5–6 Machu Picchu: Expect no service at the ruins; sync tickets ahead.Days 7–8 Puno to La Paz via Copacabana: Border signal drop; re‑register networks after crossing.Days 9–11 Uyuni tour to San Pedro: Treat as offline; charge nightly; carry spare cables.Days 12–14 San Pedro: Stable in town; tours offline; top up data before Paso Jama.Days 15–17 Salta/Jujuy or Mendoza: Good urban 4G; rural patches are offline.Days 18–21 Buenos Aires: Strongest connectivity of the trip; clear your uploads and map downloads for the flight home.Partnering and stopover extrasHospitality and tour operators in the Andes: help your guests stay connected—explore co‑branded solutions via our Partner Hub.Transatlantic flyers: test your eSIM setup on a layover with an Esim United States or Esim Western Europe before hitting high-altitude blackspots.FAQs1) Do I need a local SIM in each country?No. A multi‑country eSIM covering Peru, Bolivia, Chile and Argentina is simpler and works well for a 3‑week pace. Consider a local SIM only if you’ll spend longer in one country and want the absolute best regional coverage.2) Will my WhatsApp number change with an eSIM?No. WhatsApp is tied to your registered number, not your data line. Keep your home SIM active for voice/SMS (roaming off if you wish), and use the eSIM for data—WhatsApp continues as normal.3) Can I hotspot to my laptop or camera?Yes. Enable tethering on your eSIM. Mind your data: cloud backups and OS updates can burn gigabytes—set them to Wi‑Fi only or schedule in big cities.4) What if there’s no signal on the Uyuni/Atacama legs?That’s expected. GPS still works offline. Pre-download maps and translations, carry a power bank, and sync plans with your tour operator before departure.5) Will I get roaming charges at borders?If you’re using a multi‑country eSIM with coverage in both countries, you won’t incur extra roaming fees from your home carrier. Keep roaming off on your home SIM to avoid accidental use.6) I’m connecting via Europe or the US—worth getting a layover eSIM?Yes. It’s an easy way to test your setup and stay reachable. Try Esim North America or country options like Esim Spain, Esim France, or Esim Italy for common hubs.Next step: Browse South America coverage options and build your plan on Destinations.

iPad eSIM Setup (Wi‑Fi + Cellular): Supported Models & Steps

iPad eSIM Setup (Wi‑Fi + Cellular): Supported Models & Steps

If you travel with an iPad, an eSIM is the cleanest way to get online without hunting for physical SIMs. This guide covers exactly which iPads support eSIM, how to install a travel eSIM step‑by‑step, and how to configure data, roaming and Personal Hotspot so your other devices can share the connection. We’ve written this with travellers in mind: fast, reliable setup, minimal faff.A quick heads-up: eSIM works only on Wi‑Fi + Cellular iPad models, not Wi‑Fi‑only versions. Availability of eSIM can also vary by country or region (for example, eSIM on iPad is not offered in mainland China). Below you’ll find a simple model matrix, essential pre‑checks, and three install methods (QR code, activation code, and link). We’ll also share practical hotspot tips, how to switch or remove plans, and troubleshooting steps if something doesn’t behave.When you’re ready to pick a plan, explore region and country options on our global Destinations, including popular picks such as Esim United States, Esim France, Esim Italy, Esim Spain, Esim Western Europe and Esim North America.Quick check: does your iPad support eSIM?Only Wi‑Fi + Cellular models support any mobile plan (physical SIM or eSIM).eSIM support starts from specific generations (see lists below).Mainland China: iPad models with eSIM are not offered; availability in Hong Kong and Macao depends on local carriers.To confirm your model: Settings > General > About > Model Name and Model Number.iPad models that support eSIM (Wi‑Fi + Cellular)If your iPad is one of the following, it supports eSIM in most regions outside mainland China:iPad Pro12.9‑inch (3rd generation and later: 2018, 2020, 2021, 2022 and newer)11‑inch (1st generation and later: 2018, 2020, 2021, 2022 and newer)iPad AiriPad Air (3rd generation, 2019)iPad Air (4th generation, 2020)iPad Air (5th generation, 2022) and lateriPad miniiPad mini (5th generation, 2019)iPad mini (6th generation, 2021) and lateriPad (standard)iPad (7th generation, 2019)iPad (8th generation, 2020)iPad (9th generation, 2021)iPad (10th generation, 2022) and laterTip: Even on eSIM‑capable iPads, there may also be a physical nano‑SIM tray. You can use either a physical SIM or eSIM (one active plan at a time).Models without eSIM (Apple SIM or physical SIM only)These iPads do not support eSIM. Some include Apple SIM (removable or embedded), which Apple discontinued for new activations. You’ll need a physical SIM if you’re using these models.iPad Pro 12.9‑inch (1st and 2nd gen: 2015, 2017)iPad Pro 10.5‑inch (2017)iPad Pro 9.7‑inch (2016)iPad Air 2 (2014), iPad Air (1st gen, 2013)iPad (5th gen, 2017; 6th gen, 2018)iPad mini 3 (2014), iPad mini 4 (2015)Note on Apple SIM: Apple ended remote provisioning for Apple SIM in 2022. If you relied on Apple SIM for travel data, upgrade to an eSIM‑capable iPad or use a physical SIM from a local carrier.What you need before you startA Wi‑Fi + Cellular iPad that supports eSIM (see lists above)A stable Wi‑Fi connection for activationiPadOS updated (Settings > General > Software Update)An unlocked device (or a plan compatible with your iPad’s lock status)Your eSIM details from your provider:A QR code to scan; orAn activation code (SM‑DP+ address + Activation Code); orAn install link you can open on the iPadEnough battery or a charger nearbyPro tip: Travelling to multiple countries? Consider regional plans like Esim Western Europe or Esim North America so you don’t have to swap or re‑install between borders.iPad eSIM setup: three easy methodsOn iPad, the menu is “Mobile Data” (instead of “Cellular” on iPhone). Depending on iPadOS version, wording may be “Add eSIM” or “Add Data Plan”.Method 1: Scan a QR code (fastest)Connect the iPad to Wi‑Fi.Go to Settings > Mobile Data.Tap Add eSIM or Add Data Plan.Choose Use QR Code. Aim the camera at the QR code.When the plan appears, tap Continue, then Add Data Plan.If prompted, label the plan (e.g., “Trip Europe”).Let the activation complete, then follow any on‑screen prompts.If the camera can’t read the code, ensure good lighting and a steady hand. If it still fails, use Method 2 with the manual SM‑DP+ details.Method 2: Install via activation code (SM‑DP+ address)Connect to Wi‑Fi and open Settings > Mobile Data.Tap Add eSIM or Add Data Plan.Select Enter Details Manually.Enter the SM‑DP+ Address and Activation Code exactly as provided. Leave Confirmation Code blank unless your provider gave one.Tap Next and wait for the plan to download.Add the plan and assign a label when prompted.Tip: These fields are case‑sensitive. Copy/paste if possible to avoid typos.Method 3: Install via linkWith Wi‑Fi on, open the install link provided by your eSIM seller directly on the iPad.Tap Allow when iPad prompts to add a mobile data plan.Follow the on‑screen steps to add and label the plan.If you received the link on another device, email it to yourself or open it in a synced note on the iPad.Configure data, roaming and Personal HotspotOnce your plan is installed, configure it for travel.Set your data plan and enable roamingSettings > Mobile Data.Under Mobile Data, ensure your new plan is selected for data.Tap Mobile Data Options > Data Roaming and turn it on if you’re using the plan outside its home country.If your provider gave APN settings, tap Mobile Data Network and enter the APN, Username and Password as instructed. Most travel eSIMs auto‑configure.Pro tip: If you also have a physical SIM inserted, choose which plan provides data to avoid accidental roaming fees on the other plan.Turn on Personal HotspotSettings > Personal Hotspot (or Settings > Mobile Data > Personal Hotspot).Toggle Allow Others to Join.Set a strong Wi‑Fi password.Optional: turn on Maximise Compatibility (makes the hotspot more compatible with older devices by using 2.4 GHz; slightly reduces top speeds).Hotspot travel tips: - Keep the iPad charging when tethering for long periods. - Place the iPad near a window for better signal. - If speeds drop, toggle Airplane Mode off/on or briefly turn the hotspot off/on to refresh the session. - Some plans restrict tethering; check your plan terms if the hotspot toggle is missing or won’t stay on.Switching, pausing or removing eSIM plansTemporarily turn a plan off: Settings > Mobile Data > tap the plan > turn off Turn On This Line.Switch data between plans: Settings > Mobile Data > Mobile Data (select the plan for data).Rename a plan: Settings > Mobile Data > tap the plan label > Change Label.Remove a plan: Settings > Mobile Data > tap the plan > Remove Data Plan. Removing deletes the eSIM profile from your iPad. Keep your QR/activation details if you might need to reinstall (reinstallability depends on your provider’s policy).Storage: iPad can store multiple eSIM profiles, but only one can provide data at a time.Troubleshooting and pro tipsIf something isn’t working, run through these checks:“Add eSIM” is missingEnsure you’re on a Wi‑Fi + Cellular model that supports eSIM.Update iPadOS and restart.If your iPad was bought in a region that restricts eSIM, the option may be unavailable.QR code won’t scanClean the camera lens; brighten the screen showing the code.Zoom the code on another device or print it larger.Use manual entry via SM‑DP+ and Activation Code.“Activation code invalid” or “Can’t add plan”Confirm the SM‑DP+ address and Activation Code are entered exactly.Check that your plan hasn’t already been installed on another device.Try again on a stronger Wi‑Fi network.“No Service” after installSettings > Mobile Data > ensure the new plan is On and selected for data.Turn on Data Roaming if abroad.Check Mobile Data Network for custom APN details (if provided).Update Carrier Settings: Settings > General > About (wait for any prompt).Toggle Airplane Mode for 10 seconds; restart the iPad.Hotspot won’t workVerify your plan includes tethering.Turn Personal Hotspot off/on; change the password.On the device connecting, “Forget” the hotspot network and reconnect.Use Maximise Compatibility for older laptops or cameras.Still stuck?Reset Network Settings: Settings > General > Transfer or Reset iPad > Reset > Reset Network Settings (you’ll need to rejoin Wi‑Fi).Reinstall the eSIM with the original QR/activation details.Pro tip for work trips: If you manage multiple iPads for a team, our For Business solutions simplify bulk eSIM delivery and spend control. Partners and resellers can onboard via the Partner Hub.Travel picks for your iPadChoose a plan by country or region to match your itinerary:Country focus:USA: see Esim United StatesFrance: see Esim FranceItaly: see Esim ItalySpain: see Esim SpainMulti‑country:Western Europe: see Esim Western EuropeNorth America: see Esim North AmericaOr browse all Destinations for more regions and data sizes.Tip: For road trips across borders, regional plans reduce SIM swaps and keep your iPad’s hotspot stable for your laptop and camera.FAQCan I use an eSIM on a Wi‑Fi‑only iPad?No. Only Wi‑Fi + Cellular iPads support any mobile data plan (physical SIM or eSIM).Will my iPad get a phone number with an eSIM?Travel eSIMs for iPad are typically data‑only. You won’t get voice calls or regular SMS. Use apps like FaceTime, WhatsApp, or Teams over data.How many eSIMs can I store on an iPad?Several, depending on model and iPadOS. Only one can be active for data at a time, but you can switch in Settings without re‑scanning the QR, provided the provider permits re‑activation.Can I move an eSIM from my iPad to an iPhone (or another iPad)?Not directly. You’ll usually need to install the eSIM fresh on the new device using the original QR/activation details, or request a transfer from your provider if supported.Does Personal Hotspot work with an eSIM?Yes, if your plan allows tethering. Enable it in Settings > Personal Hotspot and share the password with your other devices.Is eSIM supported everywhere?eSIM on iPad is not offered in mainland China, and local carrier support varies by market. Check coverage and compatibility for your destination before you travel.Next step: Pick your plan by country or region on our global Destinations page and install your eSIM in minutes.

Secure Your Hotspot: Share eSIM Data Safely with Laptops & Tablets

Secure Your Hotspot: Share eSIM Data Safely with Laptops & Tablets

Travellers rely on eSIM data and mobile hotspots to keep laptops and tablets online at airports, cafés, hotels and in vehicles. It’s convenient—but it also opens a door to your data if you don’t lock it down. A secure mobile hotspot protects the Wi‑Fi link between your phone and your devices, reduces the chance of freeloaders consuming your data, and limits exposure if someone nearby tries to connect. In this guide you’ll harden your hotspot for real-world travel: use WPA3 where possible, set strong passwords, avoid common myths like hiding the SSID, choose safer tethering modes (USB/Bluetooth) when appropriate, configure device limits and timeouts, and layer in smart VPN practices. You’ll also learn how carrier “tethering keys” and APN settings affect hotspot reliability on eSIM plans—so you can prevent frustrating “hotspot not available” surprises. Whether you’re heading to the US, touring Europe, or managing a team on the road, this is a practical, step-by-step approach you can apply before you fly.Why your mobile hotspot needs hardeningYour phone’s hotspot is a tiny Wi‑Fi router. In busy environments, nearby devices can see it, attempt to connect, and—even if they fail—probe it for weaknesses. Risks include:Guessable passwords enabling freeloading or eavesdroppingOlder security modes (WPA/WEP) exposing the connection to sniffingExposed device services (file sharing, AirDrop, SMB, printer services)Data overuse from unknown clients or background sync on connected laptopsRogue configuration profiles changing APN or DNS without your consentGood news: a handful of settings sharply reduce those risks without slowing you down.The golden rules (fast checklist)Use WPA3 (or WPA3/WPA2 transition) if available; otherwise WPA2‑PSK only. Never open, WEP or WPA.Create a 16–24 character password with letters (upper/lower), numbers and symbols. Avoid words and patterns.Keep SSID broadcast on; choose a neutral name (no personal info or device model).Limit connections to the minimum necessary (often 1–3) and enable auto‑turn‑off when idle.Prefer USB tethering for a single laptop when possible; it reduces the Wi‑Fi attack surface.Keep “Maximise Compatibility” OFF (iPhone) unless an older device can’t connect.Use a reputable VPN with a kill switch on laptops/tablets for sensitive work.Don’t install unknown carrier or APN profiles to “unlock” tethering—use plans that include hotspot.Pro tip: Before your trip, test your hotspot with all devices you plan to use. Fixing compatibility at home beats doing it at a gate with 3% battery.How to set up a secure mobile hotspotiPhone/iPad (iOS/iPadOS 16/17/18)Open Settings > Personal Hotspot.Toggle Allow Others to Join ON when you need the hotspot; otherwise keep it OFF.Tap Wi‑Fi Password and set a 16+ character passphrase. Use a password manager to generate/store.Keep Maximise Compatibility OFF for stronger security and 5 GHz performance. Only turn it ON if an older device cannot connect.Avoid Family Sharing unless you truly need it; it makes joining easier for family devices.When finished, turn Allow Others to Join OFF to shut the hotspot.Notes: - iOS negotiates modern security automatically. Leaving Maximise Compatibility OFF helps avoid falling back to older standards. - You can view connected devices in the status bar/Control Centre; toggling the hotspot off disconnects all clients.Android (12/13/14/15 — Pixel/Samsung/others)Menu names vary slightly, but the essentials are similar.Settings > Network & Internet (or Connections) > Hotspot & Tethering > Wi‑Fi Hotspot.Network name (SSID): choose a neutral name (e.g., “Trip‑WiFi‑A”), not your surname, hotel room, or phone model.Security: choose WPA3‑Personal, or WPA3/WPA2 if offered. If not available, choose WPA2‑PSK. Never choose “None.”Password: 16–24 characters. Avoid common substitutions (P@ssw0rd‑style).AP band: prefer 5 GHz for speed and less interference; fall back to 2.4 GHz only for older devices.Advanced: - Turn on Auto‑disable hotspot when no devices are connected. - Set Maximum connections to the smallest number you need (1–3). - If available, enable “Block clients from communicating” or “AP isolation.” - Ensure WPS is OFF (if your device exposes that option).Share via QR only with trusted people, then rotate the password afterwards if you won’t share again.Prefer USB or Bluetooth tethering when practicalUSB tethering (best for one laptop)Pros: No Wi‑Fi beacon to attack, stable speeds, charges your phone.How: Connect your phone via USB; on Android enable USB tethering. On iPhone, connect by USB and trust the computer; hotspot should appear as a network.Bluetooth tethering (lower bandwidth, very short range)Pros: Minimal radio footprint in crowded spaces.How: Pair your devices with a PIN, then enable Bluetooth tethering on the phone and choose the connection from your laptop’s Bluetooth menu.Use Wi‑Fi hotspot only when you need multiple devices or USB isn’t convenient.Strong passphrase strategy that travels wellLength beats complexity. Aim for 16–24 characters. Example: three random words plus numbers/symbols (not a quote or lyric).Avoid personal info (names, birthdays, destinations).Store in your password manager; share via QR for convenience, then rotate afterwards.Rotate the password if you’ve shared it with anyone outside your group or used it in a busy venue.Pro tip: If you often share with family, keep a “guest” hotspot name and password you rotate at the end of each trip.Hidden SSID: myth vs realityHiding your SSID sounds secure, but:Clients that have connected before will “probe” for the hidden network, leaking its name and aiding tracking.Attackers can still detect and target hidden networks.It complicates connecting and troubleshooting.Recommendation: leave SSID broadcast ON, use strong WPA3/WPA2 security, and choose a neutral SSID.eSIM, APN settings and “tethering keys”: what mattersHotspot availability depends on your plan and APN configuration:Many carriers enable tethering only on plans with hotspot allowed. Using the wrong APN or plan can block Personal Hotspot entirely.On iPhone, APN and tethering settings come from the eSIM profile; you generally can’t edit them. If Personal Hotspot is missing or greyed out, contact your provider.On Android, you can view Access Point Names (APN) under Settings > Mobile Network > Access Point Names. Your eSIM profile should auto‑populate APN, username, authentication (PAP/CHAP), and APN type.If your provider specifies it, APN type may include “dun” (tethering). Don’t add “dun” unless the provider instructs you; arbitrary changes can break data or violate terms.Avoid third‑party “unlock tethering” guides and unknown configuration profiles. They can introduce privacy risks and service instability.Before you travel, choose an eSIM that clearly includes hotspot/tethering. Browse country and regional options in Destinations or go directly to regional packs like Esim United States, Esim Western Europe, or Esim North America. Planning France, Italy or Spain? See Esim France, Esim Italy and Esim Spain.For teams, ensure your chosen plan includes hotspot and document APN details for travellers. If you manage devices at scale, explore rollout options via For Business. Partners and resellers can coordinate provisioning through the Partner Hub.Client device hygiene: lock down the laptop/tablet tooYour hotspot encrypts the air. Your device still needs its own armour:Mark the network as Public (Windows) or disable file/printer sharing when on hotspot.Turn on the OS firewall and block inbound connections. Keep OS and browsers updated.Disable AirDrop/Nearby Share/SMB/AFP unless needed.Use randomised MAC addresses on client devices to reduce tracking; keep a note if you rely on MAC filters.Turn off Auto‑Join for older or untrusted SSIDs to avoid accidental connections when your hotspot is off.Pro tip: Enable client isolation on the hotspot if available. It prevents connected devices from seeing each other—useful when sharing with colleagues you don’t fully manage.VPN best practices over a hotspotUse a reputable VPN on laptops/tablets for work, banking and sensitive research. It protects you if apps fall back to unencrypted protocols and shields DNS lookups.Prefer protocols like WireGuard or modern OpenVPN with a kill switch. Turn on auto‑connect on untrusted networks.Choose an exit location close to your actual region for better latency and fewer geo‑blocking issues.Split tunnelling can preserve streaming/VC quality if your VPN slows some services.Corporate users: follow your company’s VPN policy—your IT may require always‑on VPN. See For Business for enterprise‑friendly eSIM options that work well with corporate VPNs.Remember: hotspot encryption protects the Wi‑Fi hop; a VPN protects end‑to‑end traffic.Monitoring, limits and battery awarenessWatch the connected device list. If an unexpected device appears, change the password immediately.Set a data warning/limit on your phone to avoid bill shock from laptop updates.Enable automatic hotspot timeout when idle.Carry a compact power bank; tethering drains the phone faster, especially on 5G. USB tethering helps by charging while connected.Pre‑trip hotspot security checklistUpdate phone OS and client device OS/browsers.Confirm your eSIM plan includes hotspot/tethering (see Destinations).Test hotspot with each device; verify WPA3/WPA2 connection.Set a strong 16–24 character password; store in your password manager.Configure device limits, auto‑timeout, and 5 GHz band.Install/verify VPN with auto‑connect and kill switch on client devices.Prepare a USB cable for tethering to your primary laptop.Pack a power bank; enable data warnings.FAQsQ: Should I hide my SSID? A: No. Hidden SSIDs don’t stop determined attackers and can make your devices broadcast the network name in probes. Keep SSID broadcast on, choose a neutral name, and rely on WPA3/WPA2 with a strong password.Q: Is Bluetooth or USB tethering safer than Wi‑Fi? A: USB is the safest for one laptop—no Wi‑Fi beacon, and it charges the phone. Bluetooth has a smaller footprint but lower speeds. Use Wi‑Fi hotspot when you need to connect multiple devices.Q: How strong should my hotspot password be? A: At least 16 characters mixing upper/lowercase, numbers and symbols. Avoid dictionary words or predictable patterns. Rotate it after sharing outside your group.Q: Do I need a VPN if I’m using my own hotspot? A: It’s still wise. Hotspot security encrypts the Wi‑Fi hop, not the full path to websites/services. A VPN protects against leaky apps, insecure sites and prying networks between your carrier and destination.Q: Why can’t my older laptop connect to my WPA3 hotspot? A: Older Wi‑Fi adapters don’t support WPA3. On iPhone, temporarily enable Maximise Compatibility; on Android, switch security to WPA3/WPA2 transition or WPA2. Revert to stronger settings afterwards.Q: Does tethering use more data? A: Laptops often download updates and sync in the background, so hotspot usage can spike. Set OS metered connection mode and disable large updates over mobile data. Add data warnings to your phone.Next step: Choose an eSIM plan with hotspot enabled for your route. Start with Destinations or pick a regional pass like Esim Western Europe or Esim North America and set up your secure hotspot before you travel.