Cisco Secure Access — Architecture & Configuration Reference
Low Level Design — Configuration Reference
| Parameter | SAML App 1 — Zero Trust Access | SAML App 2 — VPN |
|---|---|---|
| Purpose | ZTNA + SWG + Internet Access | Remote Access VPN (AnyConnect) |
| Entity ID (IdP side) | saml.fg.id.sse.cisco.com | https://<orgname>.vpn.sse.cisco.com/saml/sp/metadata/<profile> |
| ACS URL | https://fg.id.sse.cisco.com/gw/auth/acs/response | https://<orgname>.vpn.sse.cisco.com/+CSCOE+/saml/sp/acs?tgname=<profile> |
| Sign On URL | From IdP metadata XML | From IdP metadata XML |
| Name ID Format | emailAddress | emailAddress |
| Attribute: email | user.mail | user.mail |
| Attribute: groups | user.groups (optional) | user.groups (optional) |
| SCIM required | Yes — for group sync | Optional |
2. Provisioning > Automatic
3. Tenant URL: from CSA dashboard
4. Secret Token: from CSA dashboard
5. Test Connection → Save
6. Map attributes: email, displayName, groups
7. Set scope: Assigned users only or All
2. Enable SCIM 2.0
3. Base URL: from CSA dashboard
4. API Token: from CSA dashboard
5. Push Groups: enable
6. Import Groups from CSA
7. Assign users/groups to app
2. Requirements: Windows Server 2012+ (2012/2012R2/2016/2019/2022/2025), domain-joined
3. Service account: Read + Replicating Directory Changes permission
4. Configure sync: OUs, groups
5. Sync interval: default 5 min
6. LDAP port 389 / LDAPS 636
7. No inbound firewall rules required
Cisco Duo ingår automatiskt via Cisco Security Cloud Sign On (SCSO). Du behöver inte skaffa ett separat Duo-konto eller konfigurera det manuellt — det aktiveras när du aktiverar Cisco Secure Access.
Duo skyddar admin-inloggningen till CSA-dashboarden (sse.cisco.com) med MFA direkt. Slutanvändarautentisering (ZTNA, VPN) hanteras via din IdP (Entra ID / Okta) med deras egna MFA-mekanismer (Entra MFA, Okta Verify, etc.).
| Scenario | MFA-metod | Konfiguration krävs |
|---|---|---|
| Admin-login till sse.cisco.com | Cisco Duo (via SCSO) | Ingår — ingen setup |
| Slutanvändare ZTNA / SWG | IdP MFA (Entra / Okta) | Konfigureras i IdP (Conditional Access / Okta policies) |
| Slutanvändare VPN | IdP MFA via SAML | Konfigureras i IdP |
| Cisco Secure Client enrollment | SAML + IdP MFA | Sker automatiskt vid första inloggning |
Demo-tips:
- Logga in på sse.cisco.com live — visa Duo Push-notifikationen automatiskt utan extra konfiguration
- Påpeka: "MFA för admins ingår från dag ett — ingen extra licens, ingen setup"
- För slutanvändare: MFA styr du via din befintliga IdP — Cisco lägger sig inte i det flödet
Both apps must be created in the IdP before configuring CSA. Upload the IdP metadata XML into CSA for each app separately.
SCIM is required for group-based access policies. Without SCIM, only user-level policies are possible.
For Entra ID: ensure the enterprise app has User.Read and GroupMember.Read.All API permissions if using group attribute mapping.
| Parameter | Minimum | Recommended |
|---|---|---|
| vCPU | 2 | 4 |
| RAM | 4 GB | 8 GB |
| Disk | 8 GB | 20 GB |
| OS | Linux (auto-managed) | — |
| Network | Outbound HTTPS 443 | Dedicated NIC |
| DNS | Must resolve internal hostnames | Internal DNS server |
| HA | 1 connector | Minimum 2 per site |
# 1. Download setup script from CSA dashboard:
# Connect > Network Connections > Connector Groups > Add Connector
# 2. Copy provisioning key from the dashboard
# Run Cisco's setup script
sudo ./setup_connector.sh
# Launch connector with provisioning key
sudo /opt/connector/install/connector.sh launch \
--name dc-connector-01 \
--key YOUR_PROVISIONING_KEY
# Verify connector is online
sudo /opt/connector/install/connector.sh status
# Status "Connected" should appear within 60 seconds
Deploy minimum 2 connectors per site. CSA automatically load-balances and failovers between connectors in the same Connector Group.
Connector Groups are logical groupings — one group per datacenter or network segment is the recommended design. Assign each Private Resource to a specific Connector Group.
| Parameter | Value | Notes |
|---|---|---|
| IKE Version | IKEv2 | IKEv1 not supported |
| Encryption | AES-256-GCM | Or AES-256-CBC as fallback |
| Integrity (PRF) | SHA-256 | SHA-1 also supported |
| DH Group | Group 20 (P-384) — default | Group 19 (P-256), 15, 14 also supported |
| Lifetime | 86400 seconds (24h) | Default, configurable |
| Auth Method | Pre-Shared Key (PSK) | Certificates also supported |
| Dead Peer Detection | Enabled | Interval: 10s, Retry: 3 |
| Parameter | Value | Notes |
|---|---|---|
| Protocol | ESP | Encapsulating Security Payload |
| Encryption | AES-256-GCM | AEAD — no separate integrity needed |
| Lifetime | 3600 seconds (1h) | Default |
| PFS | Group 20 | Perfect Forward Secrecy enabled |
| Mode | Tunnel | Transport mode not used |
! IKEv2 Proposal
crypto ikev2 proposal CSA-PROPOSAL
encryption aes-cbc-256
integrity sha384
group 20
! IKEv2 Policy
crypto ikev2 policy CSA-POLICY
proposal CSA-PROPOSAL
! IKEv2 Keyring (PSK)
crypto ikev2 keyring CSA-KEYRING
peer CSA-PEER
address CISCO_SSE_CLOUD_IP
pre-shared-key YOUR_PSK_HERE
! IKEv2 Profile
crypto ikev2 profile CSA-PROFILE
match identity remote address CISCO_SSE_CLOUD_IP 255.255.255.255
authentication remote pre-share
authentication local pre-share
keyring local CSA-KEYRING
! IPsec Transform Set
crypto ipsec transform-set CSA-TS esp-aes 256 esp-sha-hmac
mode tunnel
! Crypto Map
crypto map CSA-MAP 10 ipsec-isakmp
set peer CISCO_SSE_CLOUD_IP
set transform-set CSA-TS
set ikev2-profile CSA-PROFILE
match address CSA-ACL
! ACL for interesting traffic
ip access-list extended CSA-ACL
permit ip 10.0.0.0 0.255.255.255 any
! Apply to WAN interface
interface GigabitEthernet0/0/0
crypto map CSA-MAP
| Method | Use Case | Notes |
|---|---|---|
| Static Routes | Simple single-site | Add static route pointing to tunnel interface |
| BGP | Multi-site, dynamic failover | CSA supports BGP over IPsec. ASN range: private 64512-65534 |
| Policy-Based | Selective traffic steering | Use crypto ACL to define interesting traffic |
The RA-VPN headend is fully cloud-hosted in Cisco's SSE infrastructure. No on-prem ASA, FTD, or VPN concentrator required. Users connect using Cisco Secure Client (AnyConnect) to <orgname>.vpn.sse.cisco.com.
Authentication is via SAML App 2. User experience is identical to classic AnyConnect — same client, same UX — but the headend is in the cloud.
| Mode | Behavior | Use Case | Internet via |
|---|---|---|---|
| Full Tunnel | All traffic through VPN | High-security environments | VPN / CSA Cloud |
| Split Include | Only specified subnets via VPN | Performance-conscious, defined resources | Local breakout |
| Split Exclude | All traffic via VPN except listed | Exclude cloud/SaaS traffic | Local breakout |
| Dynamic Split | Decision per-domain/app (FQDN-based) | Modern, SaaS-aware deployment | Dynamic per destination |
| Parameter | Value / Notes |
|---|---|
| VPN FQDN | <orgname>.vpn.sse.cisco.com (auto-assigned by Cisco) |
| Protocol | SSL/TLS (443) primary, IPsec/IKEv2 (4500) fallback |
| IP Pool | Configured in CSA — RFC1918 ranges, non-overlapping with internal subnets |
| DNS Servers | Push internal DNS for split DNS, or CSA resolver for full tunnel |
| Auth Method | SAML App 2 (mandatory for cloud headend) |
| MFA | Enforced via IdP (Entra Conditional Access / Okta MFA) |
| OS Support | Windows, macOS, Linux, iOS, Android |
| Client Version | Cisco Secure Client 5.x (formerly AnyConnect) |
| Dimension | Traditional VPN | ZTNA (CSA) |
|---|---|---|
| Access Model | Network-level access (broad subnet) | Per-application micro-tunnel |
| Tunnel | Full network tunnel — all traffic | Per-app tunnel — only authorized apps |
| Authentication | Username + password (often) | SAML + MFA + device posture |
| Posture Enforcement | Optional, often add-on | Built-in, continuous, per-session |
| Lateral Movement Risk | High — full network access post-auth | None — isolated per-app sessions |
| User Experience | Manual connect, full-tunnel overhead | Always-on, transparent, fast |
Cisco Secure Client on endpoint. Always-on — auto-connects when accessing private apps. Creates per-app encrypted micro-tunnel.
Supports: TCP/UDP, SSH, RDP, databases, thick clients, any port.
Trust evaluated: user identity (SAML) + device posture (real-time).
No client agent required. Access via standard web browser. Suitable for BYOD, contractors, unmanaged devices.
Supports: HTTP/HTTPS web apps, plus browser-based SSH and RDP (intranet portals, web GUIs, Kibana, Grafana, remote servers).
Trust evaluated: user identity (SAML). No device posture (unmanaged).
Access is granted only when all three trust signals pass:
1. User Identity — authenticated via SAML IdP with MFA. Group membership verified.
2. Device Posture — matched against assigned Posture Profile. Fails = deny or limited access.
3. Continuous Re-evaluation — posture is checked throughout the session, not only at login.
| Field | Example | Notes |
|---|---|---|
| Name | ERP-Internal | Display name in CSA |
| Domain / IP | erp.corp.local or 10.10.1.50 | FQDN preferred. Wildcard: *.corp.local |
| Ports | 443, 8080-8090, 22,3389 | Ranges and comma-separated supported |
| Protocol | TCP / UDP / Both | Select based on app requirements |
| Access Method | Client ZTNA / Browser ZTNA / VPN / All | Controls which clients can access |
| Connector Group | DC-Stockholm | Assign to site-specific connector group |
| Tags | production, finance | Used for policy grouping |
| Method | Protocol | Agent Required | Best For |
|---|---|---|---|
| Client ZTNA | Any TCP/UDP | Yes (Secure Client) | Managed devices, any app type |
| Browser ZTNA | HTTP/HTTPS + SSH/RDP | No | BYOD, contractors, web apps |
| VPN | Any TCP/UDP | Yes (Secure Client) | Legacy apps, full subnet access needed |
| All | Any | Depends | Maximum flexibility |
Wildcard domains: *.corp.local matches all subdomains. Useful for covering entire internal DNS zones.
Multi-port: Specify as comma-separated (22,80,443) or ranges (8000-8999). Combining both is supported.
IP ranges: CIDR notation (10.10.1.0/24) is supported for covering subnets without enumerating hosts.
Denna panel täcker SWG (Secure Web Gateway) och FWaaS (Firewall as a Service). Båda konfigureras under Internet Access Policy i CSA-dashboarden.
| Action | Behavior | Use Case |
|---|---|---|
| Allow | Traffic permitted, optionally logged | Trusted sites, business applications |
| Block | Traffic denied, block page shown | Malware, adult content, prohibited categories |
| Warn | Warning page — user can proceed | Social media, streaming — policy awareness |
| Isolate (RBI) | Rendered in cloud browser, no local execution | Risky/uncategorized sites, contractors |
| # | Name | Source | Destination | Action |
|---|---|---|---|---|
| 1 | Block Malware | All users | Category: Malware, Phishing, C2 | Block |
| 2 | Security Team Bypass | Group: SecOps | Any | Allow |
| 3 | Isolate Uncategorized | All users | Category: Uncategorized | Isolate |
| 4 | Block Adult Content | All users | Category: Adult, Gambling | Block |
| 5 | Warn Social Media | Group: Employees | Category: Social Media | Warn |
| 6 | Allow Business Apps | All users | App: M365, Salesforce, Slack | Allow |
| 7 | Default Allow | All users | Any | Allow |
TLS-inspektion (SSL Inspection / HTTPS Decryption) innebär att CSA bryter upp den krypterade TLS-sessionen, inspekterar trafiken för hot, DLP och policy — och återkrypterar den innan den skickas vidare. Utan TLS-inspektion är ~90% av webbtrafiken en blind fläck.
CSA agerar som en transparent man-in-the-middle proxy. Endpoint trust etableras via ett Root CA-certifikat som pushas till endpoints via MDM eller GPO.
| Steg | Åtgärd | Detaljer |
|---|---|---|
| 1 | Aktivera TLS Decryption | Secure > TLS Decryption > Enable. Välj Inspect mode. |
| 2 | Välj Root CA | Använd Ciscos inbyggda CA eller ladda upp eget Root CA (rekommenderat för enterprise) |
| 3 | Distribuera Root CA-cert | Via Intune / GPO / MDM till alla managed endpoints. Utan detta visas cert-varning. |
| 4 | Konfigurera bypass-lista | Lägg till cert-pinnade appar, banktjänster, MDM-agenter, OS-uppdateringar |
| 5 | Koppla till Security Profile | TLS Decryption aktiveras per Security Profile — gäller sedan i Internet Access Policy |
Cisco underhåller en lista med kända cert-pinnade appar som automatiskt bypassas:
- Microsoft services (delar av M365)
- Apple APNs / OS-uppdateringar
- Antivirus update channels
- MDM-agenter (Intune, Jamf)
Anpassade bypass-regler per domän, kategori eller applikation:
- Banktjänster (e.g.
*.handelsbanken.se) - HR/lönesystem med strikt cert-pinning
- Custom business apps
- Specifika URL-kategorier (Financial, Health)
| Trafiktyp | Rekommendation | Anledning |
|---|---|---|
| Generell webbtrafik | Inspektera | Maximal hotsynlighet och DLP-täckning |
| SaaS-appar (M365, Google) | Selektivt | Använd CASB API-mode för M365/Google för bättre täckning utan TLS-brott |
| Cert-pinnade appar | Bypass | Teknisk nödvändighet — bryt ej |
| Banktjänster / finans | Bypass | Regulatoriskt + cert-pinning vanligt |
| MDM / AV / OS-updates | Bypass | Funktionskritiskt — aldrig inspektera |
Fördelar: Noll setup, aktiveras direkt.
Nackdelar: Måste distribuera Ciscos Root CA-cert till alla endpoints. Fungerar inte för BYOD utan MDM.
Bäst för: Snabb PoC / pilot.
Fördelar: Endpoints litar redan på ditt CA via Active Directory. Noll extra cert-distribution.
Nackdelar: Kräver access till intern CA-infrastruktur för att generera signeringscert.
Bäst för: Produktion, enterprise-miljöer med AD.
| Läge | Hur | Styrkor | Begränsningar |
|---|---|---|---|
| Inline | Trafik proxyas via CSA cloud | Realtidsblock/warn, DLP vid upload/download | Inspekterar enbart proxyadtrafik |
| API | Direktintegration med SaaS-API | Retroaktiv skanning, historisk data, hittar delade filer | Ingen realtidsblock |
| Steg | Plats | Åtgärd |
|---|---|---|
| 1 | Secure > Application Discovery | Visa alla detekterade appar sorterade per riskvärde |
| 2 | Filtrera | Filtrera per kategori (File Sharing, Social Media, AI Tools), riskvärde, antal användare |
| 3 | Klassificera | Markera appar som Sanctioned / Unsanctioned / Restricted |
| 4 | Policy | Skapa regel: Unsanctioned apps → Block eller Warn |
- Gå till Secure > Application Settings > Tenant Restrictions
- Lägg till tillåtna tenant-ID:n (företagets M365-tenant)
- Aktivera "Block personal accounts"
- Resultat:
@personal.com-konton blockeras från M365 — enbart@foretaget.comfungerar
- Visa Shadow IT-discovery live — "Vi ser att era användare använder 340 osanktionerade appar, inklusive Dropbox och WhatsApp Web"
- Visa tenant restrictions live — försök logga in med personligt Google-konto → blockerat
- Visa DLP som triggas vid filuppladdning till Google Drive med känslig data
| Component | Function | Key Settings |
|---|---|---|
| Threat Protection | Talos-powered malware / IPS scanning of all traffic | Block / Alert / Monitor. AV scanning, IPS rules, sandboxing |
| Content Analysis | File type filtering, archive inspection, executables | Block file types (EXE, SCR, etc.), max file size |
| DLP | Inline data loss prevention on uploads/downloads | Select DLP policies (see DLP tab) |
| RBI | Remote Browser Isolation trigger | Enable for specific categories (Uncategorized, Risky, etc.) |
| DNS Security | Umbrella-powered DNS filtering | Block DNS requests to malicious/C2 domains |
| Detector | Covers | Example Pattern |
|---|---|---|
| PII — Personal Information | Names, addresses, date of birth | Structured personal data combinations |
| Credit Card Numbers (PCI) | Visa, Mastercard, Amex, Discover | Luhn-validated 16-digit sequences |
| Social Security Numbers | US SSN format | XXX-XX-XXXX |
| Swedish Personnummer | Swedish personal identity number | YYYYMMDD-XXXX |
| IBAN / Bank Account | European bank account numbers | ISO 13616 format |
| Healthcare (PHI/HIPAA) | Medical record identifiers, diagnoses | HL7/FHIR patterns |
| Source Code | Code files, IP protection | Language-specific signatures |
| Custom Regex | Any pattern (internal IDs, contracts) | User-defined regular expression |
| Action | Behavior | Notes |
|---|---|---|
| Block | Upload/download stopped, user notified | Hard enforcement — use for critical data |
| Warn | Warning shown — user can override with justification | Awareness + audit trail |
| Log Only | Permitted but event recorded | Visibility first, before enforcement |
File inspection: DLP inspects files up to 50MB. Archives (ZIP, RAR) are decompressed for inspection. Password-protected archives can be blocked.
Channels inspected: HTTP/HTTPS uploads (web, email, cloud storage), API uploads, and downloads based on policy direction setting.
Remote Browser Isolation renders risky or uncategorized websites inside a cloud-hosted browser powered by Menlo Security's Isolation Platform (MSIP). The user sees a live visual stream — no web content actually executes locally on the endpoint.
This eliminates drive-by downloads, malicious scripts, and zero-day browser exploits from affecting the endpoint, regardless of what the site contains.
RBI is triggered by policy based on URL category. It is transparent to the user — the site still loads and is fully interactive.
| Trigger Category | Rationale |
|---|---|
| Uncategorized | Unknown sites — cannot assess risk, isolate by default |
| Newly Registered Domains | High risk — often used for phishing and malware delivery |
| Personal Email (Gmail, Yahoo) | Exfiltration risk — isolate and disable upload/download |
| File Sharing (WeTransfer, etc.) | DLP bypass risk — control with isolated browser |
| Contractor / BYOD access | Unmanaged devices — full isolation for web apps |
Within an isolated session, you can configure:
- Upload/Download: Block file transfers to/from the isolated site
- Copy/Paste: Restrict clipboard between isolated site and local device
- Print: Block printing from isolated sessions
- Watermarking: Overlay user identity watermark on isolated content
| Check | What It Verifies | Platform |
|---|---|---|
| OS Version | Minimum OS version (e.g. Windows 11 22H2+, macOS 14+) | Win, Mac, Linux |
| Antivirus / EDR | AV present, running, definitions current (e.g. CrowdStrike, Defender) | Win, Mac |
| Disk Encryption | BitLocker (Windows), FileVault (Mac) enabled and active | Win, Mac |
| Firewall | Host-based firewall enabled and active | Win, Mac, Linux |
| System Password | System password / screen lock configured | Win, Mac |
| Certificate | Specific machine certificate present in cert store | Win, Mac |
| Browser | Browser version and security settings check | Win, Mac |
| Registry / File / Process | Windows Registry key, file exists, process running | Win, Mac, Linux |
| Obs: Jailbreak/root-detektion och MDM-compliance är ej nativa CSA-posture-attribut. Kräver ISE eller IdP-integration (Entra Conditional Access / Intune compliance). | ||
- OS: min Windows 11 21H2 / macOS 13
- AV/EDR: required (any major vendor)
- Disk encryption: required
- Firewall: required
- MDM compliance: required
- TPM 2.0: required
Fail action: Deny access entirely
- OS: min Windows 10 / macOS 12
- AV: recommended, warn if missing
- Disk encryption: recommended
- Firewall: required
- MDM: not required
- Screen lock: required
Fail action: Restrict to browser ZTNA only
- OS: any supported version
- AV: not checked
- Disk encryption: not checked
- No MDM check
- Certificate check: machine cert required
- Screen lock: required
Fail action: Internet-only, no private resources
| Feature | What It Measures | Data Source |
|---|---|---|
| User Health Score | Composite score (0-100) per user: network, endpoint, app health | Secure Client telemetry |
| Application Performance | Latency, jitter, packet loss to SaaS apps (M365, Salesforce, Zoom) | Synthetic probes from client |
| Network Path Analysis | Hop-by-hop visibility from client to app. Identifies bottleneck (ISP, CSA, app) | Traceroute + latency probes |
| Endpoint Diagnostics | CPU, RAM, NIC utilization on endpoint. Isolates device vs network issues | Secure Client system metrics |
| ISP Performance | Measures ISP quality from user location | Aggregate client telemetry |
| Symptom | Check in DEM | Likely Cause |
|---|---|---|
| "App is slow for one user" | User Health Score > Network Path Analysis | ISP latency, endpoint resource exhaustion, local Wi-Fi |
| "All users slow to M365" | App Performance > Microsoft 365 metrics | CSA PoP congestion, M365 service degradation, DNS issue |
| "User can't connect to private app" | Network Path Analysis > private app path | Resource Connector offline, DNS resolution failure, firewall |
| "VPN connection drops" | User Health Score > connectivity events | ISP instability, DPD timeout, MTU mismatch |
| Log Type | Contains | Key Fields |
|---|---|---|
| Web Activity | All HTTP/HTTPS requests from all users | user, URL, category, action, bytes, app, policy |
| DNS Activity | All DNS queries processed by CSA | user, query, response, category, action, resolver |
| Firewall | L3/L4 traffic from IPsec tunnels and VPN | src IP, dst IP, port, protocol, bytes, action |
| Private Access | ZTNA and VPN session events | user, resource, connector, duration, bytes, status |
| DLP Events | DLP policy matches and actions | user, file, detector, action, destination, bytes |
| Auth Events | User login, logout, SAML events | user, event, IdP, timestamp, IP, result |
| Admin Audit | All changes made in CSA dashboard | admin, action, object, before/after, timestamp |
| Method | Format | Use Case | Notes |
|---|---|---|---|
| CSV Export | CSV | Ad-hoc analysis, incident investigation | From dashboard UI, filtered time range |
| Syslog CEF | CEF (Common Event Format) | Splunk, QRadar, ArcSight | Real-time, TCP/UDP 514 or 6514 (TLS) |
| Syslog LEEF | LEEF (Log Event Extended Format) | IBM QRadar primary format | Real-time stream |
| Amazon S3 | CSV gzip | Long-term archive, data lake, Athena | Batch export, configurable interval |
| REST API | JSON | Custom SIEM, automation, scripting | Paginated, requires API key |
| Funktion | Beskrivning | Exempel-prompt |
|---|---|---|
| Regelförslag | Skapar access policies från naturligt språk | "Block social media for all users except Marketing" |
| Policygranskning | Analyserar befintliga regler, hittar luckor | "Review my internet access policies for gaps" |
| Felsökning | Diagnostiserar varför en användare inte når en app | "Why can't user john.doe access app SAP?" |
| Best practice | Rekommenderar konfiguration baserat på bransch | "What DLP rules do you recommend for a healthcare company?" |
| Konfigguide | Steg-för-steg för specifika integrationer | "How do I set up IPsec tunnel with Fortinet FortiGate?" |
| Loganalys | Analyserar loggdata och ger insikter | "Summarize security events from the last 7 days" |
- Öppna valfri dashboardsida
- Klicka på chatbot-ikonen (nere till höger)
- Skriv på engelska (enda språket som stöds för närvarande)
- AI skapar policy-utkast → klicka "Apply" för att driftsätta direkt
Starta med: "What policies should I create for a new deployment?"
Visar proaktiv vägledning — AI:n ger en fullständig checklista för en ny driftsättning.
Sedan: "Create a policy blocking gambling and adult content for all users"
Visar omedelbar policyskapning — regeln visas färdig att appliceras.
Sedan: "Why was user [name] blocked from [app]?"
Visar AI-assisterad felsökning med exakt policyträff och rekommendation.
Avsluta med: "Are there any security gaps in my current configuration?"
Visar AI-driven säkerhetsanalys av hela konfigurationen.
Demo Flow — Cisco Secure Access
- Walk through each nav section and what lives there
- Point out the AI Assistant icon bottom-right
- Show the global search and recent alerts
- Note that all config changes are logged in Admin Audit
- Explain why two apps are needed — different endpoints/use cases
- Show the metadata XML import process
- Point out the Entity ID and ACS URL values
- Note that this integrates with Entra ID, Okta, or on-prem AD
- Show the SCIM endpoint URL and secret token
- Show a list of synced groups — these are used in policies
- Explain that without SCIM you can still do user-based policies, not group-based
- Explain outbound-only connectivity — no inbound firewall rules
- Show the provisioning key generation process
- Show Docker deployment command or OVA download
- Show HA: two connectors in same group, auto load-balance
- Point to the green "Connected" status indicator
- Show tunnel configuration wizard — point out IKEv2 defaults
- Show the cloud-side IP/FQDN for the tunnel endpoint (provided by Cisco)
- Explain that any router/firewall supporting IKEv2 can connect
- Show "Connected" status with uptime counter
- Note BGP peering option for dynamic routing
- Browse to a website from a device behind the tunnel — show it in logs
- Show that the source is the tunnel's subnet, not the cloud egress IP
- Demonstrate policy applied (Allow/Block) based on category
- Explain that site traffic now benefits from full CSA security stack
- Use a real-looking example: "ERP-Internal" at erp.corp.local, port 443, ZTNA
- Show that the resource is linked to a connector group (DC connector)
- Show wildcard support: *.internal.corp.com
- Point out Browser ZTNA vs Client ZTNA options
- Open Secure Client, select VPN profile, click Connect
- Browser opens for SAML auth — show IdP login and MFA
- Show "Connected" status in client
- Show IP address assigned from VPN pool
- Show resulting connection in Monitor > Logs > Private Access
- Disconnect VPN — access private app — it still works (ZTNA)
- Show the per-app tunnel created automatically in Secure Client
- Show that only that specific app is accessible — no broad network
- Show posture status in client — green check marks
- VPN = network access. ZTNA = application access. That's the core difference.
- Lateral movement with VPN: compromised device = full network. ZTNA: compromised device = one app, one session.
- Posture is continuous in ZTNA. VPN checks once at connect and then trusts indefinitely.
- Recommend: ZTNA as default, VPN as fallback for legacy apps needing full subnet
- Create rule: Source = All Users, Category = Gambling, Action = Block
- Save and immediately test from browser
- Show the Cisco block page — customizable with company logo and message
- Show the block event in Monitor > Logs > Web Activity
- Pre-create a test file: "test-data.txt" with fake Visa numbers (use known-invalid test CCNs)
- Configure DLP rule: Credit Card Numbers, Block, upload to Cloud Storage
- Try to upload via browser — upload blocked, user sees notification
- Show DLP event in Monitor > Logs > DLP Events — user, file, detector, action
- Show posture profile config: OS version, AV, disk encryption, firewall requirements
- Show the "Compliant" status in Secure Client
- Disable Windows Firewall — show client detects violation in real-time
- Show that private app access is blocked or restricted as per fail action
- Internet rule: Finance group, block Streaming and Social Media, apply Security Profile: Corporate-Strict
- Private access rule: HR group, allow ERPInternal resource, require posture: Corporate-Strict
- Drag-and-drop rule reordering — show priority
- Show User Health Score — overall and per-dimension
- Click on a specific user — show their path to M365 or another SaaS app
- Identify where latency is: ISP, CSA PoP, or destination
- Show endpoint diagnostics — CPU, RAM, NIC at time of issue
- Filter: specific user, last 24 hours — show their full web activity
- Click a log entry — show all fields (URL, category, action, bytes, app, policy name)
- Export: show CSV download and S3 export config option
- Show syslog/CEF config — server IP, port, format, log types to stream
- Use prompt: "Create a policy that blocks social media for all employees and warns about streaming sites"
- AI generates the rule config — review with customer
- Apply directly from chat or copy the config
- Ask for a policy review: "Are there any gaps in my current internet policy?"
- Summarize: "One platform — ZTNA, VPN, SWG, DLP, posture, DEM. All managed from one dashboard."
- Confirm next steps: POC scope, environment details, timeline
- Offer a POC: 30-day evaluation with Cisco SE support
Quick Reference
| Port/Protokoll | Riktning | Syfte | Komponent |
|---|---|---|---|
TCP 443 (HTTPS) | Outbound från endpoint | Secure Client tunnel, Resource Connector registrering | Alla komponenter |
UDP 500 | Outbound från site/DC | IKEv2 IPsec phase 1 | IPsec-tunnlar |
UDP 4500 | Outbound från site/DC | IKEv2 IPsec NAT-T, phase 2 | IPsec-tunnlar |
TCP 443 | Outbound från Resource Connector | Connector → CSA cloud (utgående, ingen inbound krävs) | Resource Connectors |
TCP/UDP 53 | Outbound från endpoint | DNS-queries till Umbrella resolver | DNS Security |
TCP 389 | DC → AD | LDAP — AD Connector läser AD | AD Connector |
TCP 636 | DC → AD | LDAPS (krypterad) — AD Connector | AD Connector |
TCP 443 | Outbound | SCIM-provisioning (Entra ID → CSA) | Identity/SCIM |
TCP 443 | Outbound | Secure Client → SAML IdP-autentisering | Identity/SAML |
Objection Handling
VPN gives network access. That's the problem, not the solution.
When a user VPNs in, they get access to your entire network — or a large subnet of it. If that device is compromised, the attacker gets the same access. Lateral movement is trivial.
ZTNA flips this: users get access to one specific app per authenticated session. No broader network. No lateral movement. Posture is verified before every session and continuously during it.
VPN and ZTNA aren't mutually exclusive. Cisco Secure Access gives you both — VPN for legacy apps that need full subnet, ZTNA for everything else. You migrate at your own pace. Zero disruption.
Complexity lives in the planning, not the platform.
The typical ZTNA pilot — 10 private resources, 50 users — takes 2-3 days end to end. Resource Connectors deploy in under an hour (Docker pull, provisioning key, done). Private resource definitions take under a minute each. The SAML setup with Entra ID or Okta is guided and well-documented.
The real complexity is IP access control lists and firewall rules in your current VPN setup. CSA eliminates that entirely — apps, not subnets.
Compare the full stack, not the license line item.
Price CSA against what you're currently running: VPN hardware + maintenance + support + web proxy + DNS filtering + DLP tools + a separate RBI solution. Add staff time to manage five separate consoles. Add the cost of a single security incident caused by lateral movement that ZTNA would have prevented.
CSA is a consolidation play. Most customers eliminate 3-5 separate products. The license cost is usually offset entirely by what they retire — and the security posture improves significantly.
You don't have to move everything. Start where the value is highest.
CSA doesn't require replacing your existing firewall or on-prem security stack. Add it alongside. Start with remote user protection — the highest-risk surface — and grow from there. Resource Connectors bridge your existing on-prem apps to the cloud security layer without touching your datacenter architecture.
The question isn't "are we ready?" It's "which users are highest risk today?" Start there. One deployment, 50 users, 30 days. Then decide.
Cloud security done right is faster than on-prem done badly.
Cisco operates global PoPs with anycast routing — user traffic goes to the nearest PoP, not across the globe. For most enterprise users, latency through CSA is lower than backhauling traffic to a central on-prem proxy through an MPLS network.
For internet-bound traffic specifically: local breakout through CSA is consistently faster than hairpinning through corporate DC. DEM (Experience Insights) gives you the proof — per-user latency data, ISP vs CSA vs destination breakdown.
If a customer has specific latency concerns, point them to the DEM capabilities and offer to run a measurement during the POC.
TLS inspection bypass lists are exactly what they're for.
CSA's TLS decryption policy includes a bypass list. Certificate-pinned applications — banking apps, MDM agents, Microsoft services (some), antivirus update channels — are added to the bypass list and their traffic flows through uninspected.
Cisco maintains a pre-built list of known cert-pinned apps to bypass. You can also add custom entries. TLS inspection is selective — not all-or-nothing. You get visibility where it matters and compatibility where it doesn't.
Then you're already sold on cloud-delivered SSE. The question is which platform delivers better value.
Zscaler: strong SWG, but no integrated VPN headend. ZTNA (ZPA) is a separate product, separate agent, separate console. DEM is limited. No built-in DEM for private app paths.
Palo Alto Prisma Access: good security, but complexity is high. Licensing is byzantine. Onboarding is long. Support can be slow.
CSA differentiators: single agent (Secure Client), single console, VPN + ZTNA in one platform, Talos threat intel (largest threat research team in the world), DEM built-in, AI Assistant, and a Cisco TAC that actually answers the phone. Ask them what their current support experience is like.
The same thing that happens when your on-prem VPN hardware fails — except Cisco's SLA is likely better than your hardware uptime.
Cisco Secure Access is built on a distributed, multi-region architecture. No single PoP or data center failure takes the service down. Cisco publishes a 99.999% uptime SLA for the SSE platform. That's under 6 minutes of downtime per year.
Compare that to your current VPN hardware: one device failure, one misconfigured upgrade, one power event — and you're down. With CSA, Cisco's operations team handles redundancy, patching, and failover automatically.
Which compliance requirement specifically? Most don't mandate on-prem infrastructure — they mandate controls.
CSA is compliant with SOC 2 Type II, ISO 27001, GDPR (EU data residency options available), PCI DSS (as a security control), and HIPAA. Data residency is configurable — traffic can be processed in EU-region PoPs only if required.
On-prem is an implementation choice, not a compliance requirement in most frameworks. The frameworks mandate encryption, access control, logging, and audit trails — all of which CSA provides, often more robustly than on-prem equivalents. Ask them to name the specific regulation or clause.
That's exactly the use case cloud SSE was designed for.
Cisco operates PoPs across North America, Europe, Asia-Pacific, and the Middle East. A user in Tokyo routes to the Tokyo PoP. A user in São Paulo routes to the nearest Brazilian PoP. Policy and security are identical regardless of location — no VPN backhauling to headquarters required.
VPN access in restrictive countries (China, UAE, Russia) requires specific configuration — UDP ports may be blocked. CSA supports SSL/TLS (port 443) fallback for VPN, which works in most restrictive environments. For ZTNA, port 443 is always used.
It integrates with all major SIEMs — out of the box.
CSA exports logs in CEF (Common Event Format) and LEEF (Log Event Extended Format) via real-time syslog stream. This is the native format for Splunk, IBM QRadar, Microsoft Sentinel, ArcSight, and most other enterprise SIEMs.
Additionally: S3 bucket export for data lake or batch ingestion, REST API for custom integrations, and Cisco also publishes pre-built Splunk dashboards and Sentinel workbooks. Whichever SIEM they're using, integration is a known, documented process — not a custom project.
Two VMs per datacenter. No maintenance overhead. Cisco manages the software.
Resource Connectors are containerized and self-updating. You deploy them (Docker or OVA, 30 minutes), they auto-register to CSA, and then Cisco manages the software lifecycle. You don't patch them. You don't update them. You just monitor their status in the dashboard — green means running.
Compare this to managing a traditional VPN concentrator: hardware refreshes, IOS upgrades, certificate renewals, HA failover testing. Connectors are a significant reduction in operational overhead, not an addition.
CSA is a per-user SaaS subscription — simpler than most.
Cisco Secure Access is licensed per user per year. There are typically two tiers — Essentials (SWG, CASB, ZTNA, RA-VPN) and Advantage (adds DLP, RBI, advanced DEM). No per-device licensing. No throughput tiers. No PoP fees. No connector licensing.
If they're thinking of Cisco's legacy product licensing complexity — EAs, SMARTnet, per-device registration — that's not CSA. This is a SaaS model. One SKU per tier, per user, per year. Clear, predictable, budgetable.
Good. CSA works alongside it. This isn't a replacement conversation — yet.
CSA doesn't replace your perimeter firewall. It secures your remote users and provides cloud-delivered access control — use cases where Fortinet and Palo Alto on-prem hardware isn't the right tool regardless of investment size.
The conversation to have now: protect your remote users and provide ZTNA for private apps. Your FortiGate/NGFW stays in place for datacenter perimeter and site-to-site traffic. When renewal comes up, you'll have real-world CSA data and a clearer picture of what you actually need from on-prem vs cloud.
CSA is designed to reduce management overhead, not add to it.
Unified dashboard: internet policy, private access, posture, DEM, logs — all in one place. No tool-switching. AI Assistant creates policies from natural language. Policy changes propagate globally in under 60 seconds — no deployment pipeline. Connectors self-update. SCIM keeps users in sync automatically.
The average CSA administrator spends 30-60 minutes per week on platform management after initial setup. If they're understaffed, the answer isn't "don't deploy better tools" — it's "deploy tools that do more with less manual effort." That's exactly what CSA is built for.
Sizing & Dimensionering
Plattformsgränser
| Parameter | Gräns | Källa |
|---|---|---|
| IPsec-tunnel throughput | 1 Gbps per tunnel (per riktning) | docs.sse.cisco.com |
| MTU | Max 1390 bytes (TCP MSS clampas till ≤1350) | docs.sse.cisco.com |
| RBI concurrent sessions | 25 per användare | Product Description 5.3(C) |
| RBI dataöverföring | 2 GB per användare per dag | Product Description 5.3(C) |
| SIA/SPA dataöverföring | 20 GB per användare per månad | Product Description 5.3(A) |
| DLP filskanning | Första 50 MB av varje fil | docs.sse.cisco.com |
| Malware Sandbox (Essentials) | 500 samples/dag | Ordering Guide |
| Malware Sandbox (Advantage) | Obegränsat | Ordering Guide |
| Multi-org deployments | Max 10 per kund | Product Description 5.3(D) |
| Browser SSH/RDP-sessioner | Begränsat till antal Advantage SPA-licenser | Ordering Guide |
| Investigate API (inkluderad) | 2 000 frågor/dag | Ordering Guide |
| RBI max filnedladdning | 5 GB | docs.sse.cisco.com |
| Tillgänglighets-SLA | 99.999% | Cisco SLA-dokument |
| Provisioneringstid | Upp till 72 timmar | Ordering Guide |
| Reserved IP-provisionering | 4–6 veckor | Ordering Guide |
Resource Connector — Krav
| Komponent | Specifikation |
|---|---|
| RAM per CPU-kärna | Minimum 512 MB |
| AD-integration | Max 400 AD-events/sek per domänkontrollant |
| Redundans | Minst 2 connectors per grupp rekommenderat |
| Protokoll | DTLS (primärt), TLS (fallback om UDP blockeras) |
| Deployment | AWS, Azure, VMware, Docker, Kubernetes |
| Skala | Lägg till fler connectors efter behov — ingen publicerad maxgräns |
Dimensioneringsguide
| Storlek | Användare | IPsec-tunnlar | Connectors | Rekommendation |
|---|---|---|---|---|
| S | 50–500 | 1–2 | 2 per sajt | Essentials räcker |
| M | 500–2 000 | 2–4 | 2–4 per sajt | Advantage rekommenderas |
| L | 2 000–10 000 | 4–8 | 4+ per sajt | Advantage + DLP + IPS |
| XL | 10 000+ | 8+ (multipla regioner) | 6+ per sajt | Advantage + Reserved IP + Multi-org |
API Rate Limits
| Tier | Gräns | Licens |
|---|---|---|
| Base (inkluderad) | 2 000 frågor/dag | Alla paket |
| Small (SA-INV-API-S) | 3 req/sek | Tilläggsköp |
| Medium (SA-INV-API-M) | 12 req/sek | Tilläggsköp |
| Large (SA-INV-API-L) | 48 req/sek | Tilläggsköp |
Licensmodell — Essentials vs Advantage
Feature-matris
| Funktion | Essentials | Advantage | Notering |
|---|---|---|---|
| ZTNA (klient + clientless HTTP/S) | Inkluderad | Inkluderad | Grundfunktion |
| ZTNA SSH/RDP (clientless) | Nej | Inkluderad | Advantage-exklusivt |
| SWG (proxy, URL-filtrering) | Grundläggande | Full L7 | Advantage har L7 appkontroll |
| CASB | Begränsad | Full + GenAI-kontroll | Advantage har AI-appkontroller |
| FWaaS L3/L4 | Inkluderad | Inkluderad | Grundnivå |
| FWaaS L7 + IPS | Nej | Inkluderad | Med TLS-inspektion |
| DLP | Tillägg (SA-DLP) | Inkluderad | Vanlig gotcha |
| RBI (riskfyllda sajter) | Tillägg (SA-RBIR) | Inkluderad | Borttagen 2026 |
| RBI (alla sajter) | Tillägg (SA-RBIA-ESS) | Inkluderad | Full isolation |
| DNS Security | Inkluderad | Inkluderad | Alla tiers |
| DEM / Experience Insights | Inkluderad | Inkluderad | ThousandEyes-baserad |
| Malware Sandbox | 500 samples/dag | Obegränsat + SMA | Essentials hårdkappad |
| VPNaaS | Inkluderad | Inkluderad | Cloud RA-VPN |
| IPS (Intrusion Prevention) | Nej | Inkluderad | Med TLS-inspektion |
| Talos Threat Intel | Inkluderad | Inkluderad | Alla tiers |
| AI Assistant | Inkluderad | Inkluderad | Policyautomation |
DNS Defense (separat tier)
| Funktion | DNS Essentials | DNS Advantage |
|---|---|---|
| DNS-lagersäkerhet | Inkluderad | Inkluderad |
| SaaS API DLP | Inkluderad | Avancerad |
| Cloud malware-skanning | Inkluderad | Inkluderad |
Licensmodell
Minimum: 50 användare per tier (SIA/SPA). DNS Defense: 1 användare.
Perioder: 12, 36 eller 60 månader.
Tiered pricing: Lägre pris vid högre volym (100, 1K, 5K, 10K, 25K+).
Auto-renewal: 12 månader om inte avbrutet 60 dagar före.
Secure Client: Inkluderad utan separat licens.
ThousandEyes endpoint agent: Inkluderad i SIA/SPA.
7 Vanliga Licensing-fallor
SKU-referens
| SKU | Beskrivning |
|---|---|
SA-SIA-ESS | Secure Internet Access Essentials |
SA-SIA-ADV-K9 | Secure Internet Access Advantage |
SA-SPA-ESS-K9 | Secure Private Access Essentials |
SA-SPA-ADV-K9 | Secure Private Access Advantage |
SA-DNS-ESS-K9 | DNS Defense Essentials |
SA-DNS-ADV-K9 | DNS Defense Advantage |
SA-DLP | DLP-tillägg (Essentials) |
SA-RBIR | RBI Risky-tillägg (Essentials) |
SA-RBIA-ESS | RBI Advanced-tillägg (Essentials) |
SA-MWARE | Extended Malware Analytics |
SA-THRT | Threat Defense-tillägg |
Migrationsguider
ASA/FTD + AnyConnect → Cisco Secure Access
show running-config). Dokumentera group policies, auth-metoder (SAML/RADIUS/LDAP), split-tunnel-inställningar. Exportera AnyConnect XML-profiler och certifikatkonfiguration. Identifiera IP-pool-överlappningar.
C:\ProgramData\Cisco\Cisco Secure Client\VPN\Profile. Aktivera Always-On VPN (ny kapabilitet vs legacy AnyConnect).
• Always-On VPN med machine tunnel (certifikatbaserat)
• Samma auth-metoder men konfigurerade i Secure Access-portal
• Split tunnel per VPN Profile (mer granulärt än ASA group policy)
Umbrella → Cisco Secure Access
2. Vänta 3–4 arbetsdagar på claim code
3. Logga in på Security Cloud Control (SCC)
4. Länka Umbrella org via claim code
5. Kör Upgrade Manager — policyer migreras automatiskt
6. Verifiera, stäng sedan Umbrella-org (OÅTERKALLELIGT)
Meraki MX → Secure Access + Meraki
192.0.2.3/32. Ladda ner CSV med tunnelkonfiguration.
IKE Version: IKEv2. Public IP: Primary DC IP från CSV. IPsec Policy: "Umbrella"-preset. Health Check:
http://service.sig.umbrella.com. Lägg till sekundär tunnel för HA.
| Funktion | Stannar på MX | Flyttar till Cloud |
|---|---|---|
| Brandvägg L3/L4 | Site-to-site-regler | Internet/app-regler |
| URL/App-filtrering | — | SWG |
| DLP | — | Secure Access DLP |
| SD-WAN/Routing | AutoVPN, routing | — |
| Hotskydd | Anti-malware (valfritt) | Cloud threat feeds |
Tredjepartsleverantör → Cisco Secure Access
| Aspekt | Zscaler ZPA/ZIA | Netskope | Palo Alto Prisma |
|---|---|---|---|
| Policymodell | URL-centrisk | Riskbaserad + regler | App-baserade regler |
| Migreringssvårighet | Medel | Svår (unik riskmodell) | Medel |
| IdP-migrering | Direkt (SAML) | Direkt (SAML) | Direkt (SAML) |
| DLP-migrering | Manuell | Manuell (ML-modell unik) | Manuell |
Tidsuppskattning
| Storlek | Tidsram |
|---|---|
| Liten (50–100 användare, <20 appar) | 2–3 månader |
| Medium (500+ användare, 50–100 appar) | 4–6 månader |
| Enterprise (10K+ användare, 200+ appar) | 9–12 månader + professional services |
Day 2 Operations
ZTNA — Användare kan inte nå privat app
logconfig.json med {"global": "DBG_TRACE"}Windows:
C:\ProgramData\Cisco\Cisco Secure Client\ZTAmacOS:
/opt/cisco/secureclient/ztaVanliga felkoder
| Fel | Orsak | Lösning |
|---|---|---|
NoActiveDHA | Device Health Agent posture-registrering misslyckades | Verifiera DHA-status, omregistrera enhet |
PostureRegistrationError | Posture-validering misslyckades | Kontrollera posture-krav mot enhetens status |
TLS_error 268435703 | "Wrong version number" — otillförlitligt cert | Installera Cisco Secure Access root cert |
268435581 | CERTIFICATE_VERIFY_FAILED | Inaktivera "Validate App Certificate" eller installera CA cert |
IPsec-tunnel — Diagnostik
show crypto ipsec sa
show crypto session
show bgp summary
show crypto ipsec sa | i peer|caps # verifiera encaps/decaps ökar
Policy-verifiering
https://policy.test.sse.cisco.com/ från skyddad endpoint. Visar: Organisation ID, deployment type, proxy-info, publik/privat IP.Experience Insights (DEM) — ThousandEyes-baserat
├── Endpoint Performance Map (geografisk vy)
├── Endpoints Summary Table
├── Network Test Results (latens, förlust, jitter)
├── SaaS Application Performance
└── User Dashboard (enskild enhet deep-dive)
SIEM-integration
Loggformat
| Loggtyp | Format | Innehåll |
|---|---|---|
| VPN-loggar | CSV | anyConnectVersion, eventType, userId, assignedIp, timestamp |
| Activity Search | REST API + Dashboard | Realtidshändelser, policy, källa, destination, hot |
| Syslog | CEF | Event type, user, resource, action, threat intel |
GET /api/v2/activity-searchTAC-eskalering
mycase.cloudapps.cisco.com2. Öppna nytt ärende → Produkt: "Cisco Secure Access"
3. Krävs: Organisation ID (från dashboard-URL)
Diagnostikdata att samla
| Typ | Metod |
|---|---|
| DART Bundle | Secure Client → Statistics → Details → Create bundle |
| ZTNA debug | logconfig.json med {"global": "DBG_TRACE"} |
| SWG debug | SWGConfigOverride.json med {"logLevel": "1"} |
| Resource Connector | rc-cli> diagnostic och rc-cli> techsupport |
| HAR-captures | Browser DevTools → Network → Save as HAR |
| Paketfångst | Wireshark / tcpdump |
Severity-nivåer
| Severity | Beskrivning |
|---|---|
| 1 | Produktion nere, ingen workaround |
| 2 | Produktion påverkad, delvis workaround |
| 3 | Mindre problem, workaround finns |
| 4 | Förbättringsförslag |
Certifikatrotation
| Certifikat | Rotationsintervall | Åtgärd |
|---|---|---|
| S3 Bucket Keys (AWS) | Var 90:e dag (OBLIGATORISKT) | Settings → AWS Integration → Rotate |
| SAML-certifikat | Årligen | Förnya före utgångsdatum, uppdatera IdP |
| TLS Inspection-cert | Vid behov | Generera nytt, ladda upp i dashboard |
Resource Connector CLI
rc-cli> techsupport # Version, tunnelstatus, CPU/minne/disk
rc-cli> tcpdump <host> # Paketfångst på RC-interface
Secure Client
Automatiska uppdateringar: Aktiverade som standard (stagad utrullning)
Resource Connectors: Over-the-air auto-update (sedan oktober 2025)
Plattformar: Windows 10+, macOS 10.15+, Linux, iOS, Android
Cisco Stack Integration
show sse all för verifiering.192.0.2.3/32.