Configuring Secure Client Management VPN Tunnel on Threat Defense
Procedure
Step 1 | Create a remote access VPN policy configuration using the wizard: For information about configuring a remote access VPN, see Configuring a New Remote Access VPN Connection. | ||
Step 2 | Configure connection profile settings for management VPN tunnel:
For more information about connection profile settings, see Configure Connection Profile Settings. | ||
Step 3 | Create a management tunnel profile using the Secure Client profile editor:
For information about creating a management profile using the Profile Editor, see the Cisco Secure Client (including AnyConnect) Administrator Guide. | ||
Step 4 | Create a management tunnel object:
| ||
Step 5 | Associate a management profile with a group policy and configure group policy settings: You must add the management VPN profile to the group policy associated with the connection profile used for the management tunnel VPN connection. When the user connects, the management VPN profile is downloaded along with the user VPN profile already mapped to the group policy, enabling the management VPN tunnel feature.
| ||
Step 6 | Configure split tunneling in group policy:
Secure Client Custom Attribute Secure Client Management VPN tunnel requires split include tunneling configuration by default. If you are configuring Secure Client custom attribute in the group policy to deploy the management VPN tunnel with split tunneling to tunnel all, you can do so using FlexConfig because management center 6.7 web interface does not support Secure Client custom attribute. The following is an example command for Secure Client custom attribute:
| ||
Step 7 | Deploy, verify, and monitor the remote access VPN policy: |