These are the facts that are currently known. Cato is also aware of these issues.
When using the Cato Client for SDP users on iOS, Always-on does not work as we would like.
A VPN configuration ”Cato Networks VPN” that the Cato Client creates locally supports all Cato communication, but this can be manually deleted by the user, and is a means to ensure that Always-on is bypassed.
In addition, in the case of using a client certificate as device authorization for SDP users, there are two profiles: a client certificate and VPN configuration profile distributed by MDM, and a VPN configuration created by Cato Client. Users can simply switch between the two available VPN profiles to disconnect the VPN and bypass Always-on communication.
This current specification could lead to serious security incidents.
Based on current knowledge, there is no workaround that can avoid this issue. The current device authorization using client certificates is not practical for implementation. At least for orgs that use MDM, it is best practice to distribute the device compliance key using AppConfig and the on-demand VPN configuration created locally by Cato Client from MDM, but to do this, Cato needs to prepare an MDM client such as Cato Client for EMM.
I think it would be fine to require MDM for Always-on use with SDP Cato Client.
I hope this issue can be resolved soon.
Thank you.
shiva-SBI