Deploy Anyconnect
Deploy Anyconnect
Deploy Anyconnect
When you deploy AnyConnect, you can include optional modules that enable extra features, and client profiles
that configure the VPN and optional features.
Refer to the AnyConnect release notes for system, management, and endpoint requirements for ASA, IOS,
Microsoft Windows, Linux, and macOS.
Deploy AnyConnect
1
Deploy AnyConnect
Preparing the Endpoint for AnyConnect
Web Deploy
• Web Deploying from an ASA or FTD device—User connects to the AnyConnect clientless portal on the
headend device, and selects to download AnyConnect. The ASA downloads the AnyConnect Downloader.
The AnyConnect Downloader downloads the client, installs the client, and starts a VPN connection.
• Web Deploying from ISE—User connects to the Network Access Device (NAD), such as an ASA,
wireless controller, or switch. The NAD authorizes the user, and redirects the user to the ISE portal. The
AnyConnect Downloader is installed on the client to manage the package extraction and installation, but
does not start a VPN connection.
Pre-Deploy
• Using an Enterprise software management system (SMS), for example, Windows transforms.
• Manually distributing an AnyConnect file archive, with instructions for the user about how to install.
File archive formats are ISO for Windows, DMG for macOS, and gzip for Linux.
For system requirements and licensing dependencies, refer to the AnyConnect Secure Mobility Client Features,
License, and OS Guide.
Note If you are using AnyConnect Posture (HostScan) to perform root privilege activities on a Mac or Linux
platform, we recommend that you pre-deploy AnyConnect Posture.
Deploy AnyConnect
2
Deploy AnyConnect
Add the ASA to the List of Internet Explorer Trusted Sites on Windows
If you choose LAN adapter auto connect, set the preference to NDIS mode. NDIS is an always on connection
where you can stay connected even when the VZAccess Manager is closed. The VZAccess Manager shows
an autoconnect LAN adapter as the device connection preference when it is ready for AnyConnect installation.
When an AnyConnect interface is detected, the 3G manager drops the interface and allows the AnyConnect
connection.
When you move to a higher priority connection—wired networks are the highest priority, followed by WiFi,
and then mobile broadband—AnyConnect makes the new connection before breaking the old one.
Add the ASA to the List of Internet Explorer Trusted Sites on Windows
An Active Directory administrator can use a group policy to add the ASA to the list of trusted sites in Internet
Explorer. This procedure is different from the way a local user adds trusted sites in Internet Explorer.
Procedure
Step 1 On the Windows Domain server, log in as a member of the Domain Administrators group.
Step 2 Open the Active Directory Users and Computers MMC snap-in.
Step 3 Right-click the Domain or Organizational Unit where you want to create the Group Policy Object and click
Properties.
Step 4 Select the Group Policy tab and click New.
Step 5 Type a name for the new Group Policy Object and press Enter.
Step 6 To prevent this new policy from being applied to some users or groups, click Properties. Select the Security
tab. Add the user or group that you want to prevent from having this policy, and then clear the Read and the
Apply Group Policy check boxes in the Allow column. Click OK.
Step 7 Click Edit and choose User Configuration > Windows Settings > Internet Explorer Maintenance >
Security.
Step 8 Right-click Security Zones and Content Ratings in the right pane, and then click Properties.
Step 9 Select Import the current security zones and privacy settings. If prompted, click Continue.
Step 10 Click Modify Settings, select Trusted Sites, and click Sites.
Step 11 Type the URL for the Security Appliance that you want to add to the list of trusted sites and click Add. The
format can contain a hostname (https://vpn.mycompany.com) or IP address (https://192.168.1.100). It can be
an exact match (https://vpn.mycompany.com) or a wildcard (https://*.mycompany.com).
Step 12 Click Close and click OK continually until all dialog boxes close.
Step 13 Allow sufficient time for the policy to propagate throughout the domain or forest.
Step 14 Click OK in the Internet Options window.
Deploy AnyConnect
3
Deploy AnyConnect
Configure How AnyConnect Treats Windows RDP Sessions
Procedure
Step 1 In ASDM go to Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
Step 2 Select a group policy and click Edit or Add a new group policy.
Step 3 In the navigation pane, go to Advanced > Browser Proxy. The Proxy Server Policy pane displays.
Step 4 Click Proxy Lockdown to display more proxy settings.
Step 5 Uncheck Inherit and select either:
• Yes to enable proxy lockdown and hide the Internet Explorer Connections tab during the AnyConnect
session.
• No to disable proxy lockdown and expose the Internet Explorer Connections tab during the AnyConnect
session.
Deploy AnyConnect
4
Deploy AnyConnect
Configure How AnyConnect Treats Windows RDP Sessions
Deploy AnyConnect
5
Deploy AnyConnect
DES-Only SSL Encryption on Windows
See AnyConnect VPN Connectivity Options for additional VPN session connectivity options.
Pre-Deploying AnyConnect
AnyConnect can be pre-deployed by using an SMS, manually by distributing files for end users to install, or
making an AnyConnect file archive available for users to connect to.
When you create a file archive to install AnyConnect, the directory structure of the archive must match the
directory structure of the files installed on the client, as described in Locations to Pre-Deploy the AnyConnect
Profiles, on page 8
Procedure
Windows anyconnect-win-version-pre-deploy-k9.iso
macOS anyconnect-macosx-i386-version-k9.dmg
Note Network Visibility Module is not available in the Linux operating system.
Step 2 Create client profiles: some modules and features require a client profile.
The following modules require a client profile:
• AnyConnect VPN
• AnyConnect Network Access Manager
• AnyConnect Web Security
Deploy AnyConnect
6
Deploy AnyConnect
AnyConnect Module Executables for Pre-Deploy and Web-Deploy
You can create client profiles in ASDM, and copy those files to your PC. Or, you can use the stand-alone
profile editor on a Windows PC. See About the Profile Editor for more information about the Windows
stand-alone editor.
Step 3 Optionally, Customize and Localize the AnyConnect Client and Installer.
Step 4 Prepare the files for distribution. The directory structure of the files is described in Locations to Pre-Deploy
the AnyConnect Profiles .
Step 5 After you have created all the files for AnyConnect installation, you can distribute them in an archive file, or
copy the files to the client. Make sure that the same AnyConnect files are also on the headends you plan to
connect to, ASA and ISE.
Note If you have a Windows 2008R2 server, you may experience installation errors when attempting to install
AnyConnect Network Access Manager. The WLAN service is not installed by default on the server operating
system, so you must install it and reboot the PC.
Deploy AnyConnect
7
Deploy AnyConnect
Locations to Pre-Deploy the AnyConnect Profiles
File Description
OPSWAT %PROGRAMFILES%\Cisco\Cisco
AnyConnect Secure Mobility
Client\opswat
Deploy AnyConnect
8
Deploy AnyConnect
Pre-Deploying AnyConnect Modules as Stand-Alone Applications
Binaries /opt/cisco/anyconnect/bin
OPSWAT /opt/cisco/anyconnect/lib/opswat
Libraries /opt/cisco/anyconnect/lib
UI Resources /Applications/Cisco/Cisco
AnyConnect Secure Mobility
Client.app/Contents/Resources/
Procedure
Step 1 Disable VPN functionality by configuring your software management system (SMS) to set the MSI property
PRE_DEPLOY_DISABLE_VPN=1. For example:
msiexec /package anyconnect-win-ver-pre-deploy-k9.msi /norestart /passive
PRE_DEPLOY_DISABLE_VPN=1 /lvx* <log_file_name>
The MSI copies the VPNDisable_ServiceProfile.xml file embedded in the MSI to the directory specified for
profiles for VPN functionality.
Step 2 Install the module. For example, the following CLI command installs web security:
msiexec /package anyconnect-websecurity-win-<version>-pre-deploy-k9.msi /norestart /passive
/lvx* c:\test.log
Step 4 Save a copy of the obfuscated Web Security client profile to the proper Windows folder.
Deploy AnyConnect
9
Deploy AnyConnect
Deploying AnyConnect Modules as Stand-Alone Applications
Step 5 Restart the Cisco AnyConnect Web Security Agent windows service.
Requirements
The VPNDisable_ServiceProfile.xml file must also be the only AnyConnect profile in the VPN client profile
directory.
Note If a previous installation of Network Access Manager did not exist on the computer, the user must reboot the
computer to complete the Network Access Manager installation. Also, if the installation is an upgrade that
required upgrading some of the system files, the user must reboot.
Procedure
Step 1 Instruct users to check the AnyConnect Network Access Manager or AnyConnect Web Security Module.
Step 2 Instruct users to uncheck Cisco AnyConnect VPN Module.
Doing so disables the VPN functionality of the core client, and the Install Utility installs Network Access
Manager or Web Security as stand-alone applications with no VPN functionality.
Step 3 (Optional) Check the Lock Down Component Services check box. The lockdown component service prevents
users from switching off or stopping the Windows service.
Step 4 Instruct users to run the installers for the optional modules, which can use the AnyConnect GUI without the
VPN service. When the user clicks the Install Selected button, the following happens:
a) A pop-up dialog box confirms the selection of the stand-alone Network Access Manager and/or the
stand-alone Web Security module.
b) When the user clicks OK, the Install Utility invokes the AnyConnect core installer with a setting of
PRE_DEPLOY_DISABLE_VPN=1.
c) The Install Utility removes any existing VPN profiles and then installs VPNDisable_ServiceProfile.xml.
d) The Install Utility invokes the Network Access Manager installer or the Web Security installer.
e) The Network Access Manager or Web Security Module is enabled without VPN service on the computer.
Deploy AnyConnect
10
Deploy AnyConnect
Pre-Deploying to Windows
Pre-Deploying to Windows
Distributing AnyConnect Using the ISO
The ISO package file contains the Install Utility, a selector menu program to launch the individual component
installers, and the MSIs for the core and optional AnyConnect modules. When you make the ISO package
file available to users, they run the setup program (setup.exe). The program displays the Install Utility menu,
from which users choose which AnyConnect modules to install. You probably do not want your users to chose
which modules to load. So if you decide to distribute using an ISO, edit the ISO to remove the modules you
do not want to use, and edit the HTA file.
One way to distribute an ISO is by using virtual CD mount software, such as SlySoft or PowerIS.
Deploy AnyConnect
11
Deploy AnyConnect
Distributing AnyConnect Using an SMS
Requirements
• When installing AnyConnect onto Windows, you must disable either the AlwaysInstallElevated or the
Windows User Account Control (UAC) group policy setting. If you do not, the AnyConnect installers
may not be able to access some directories required for installation.
• Microsoft Internet Explorer (MSIE) users should add the headend to the list of trusted sites or install
Java. Adding to the list of trusted sites enables the ActiveX control to install with minimal interaction
from the user.
Deploy AnyConnect
12
Deploy AnyConnect
Windows Pre-Deployment Security Options
Deploy AnyConnect
13
Deploy AnyConnect
AnyConnect Module Installation and Removal Order on Windows
Procedure
Deploy AnyConnect
14
Deploy AnyConnect
Pre-Deploying to macOS
Pre-Deploying to macOS
Install and Uninstall AnyConnect on macOS
AnyConnect for macOS is distributed in a DMG file, which includes all the AnyConnect modules. When
users open the DMG file, and then run the AnyConnect.pkg file, an installation dialog starts, which guides
the user through installation. On the Installation Type screen, the user is able to select which packages (modules)
to install.
To remove any of the AnyConnect modules from your distribution, use the Apple pkgutil tool, and sign the
package after modifying it. You can also modify the installer with ACTransforms.xml. You can customize
the language and appearance and change some other install actions, which is described in the Customization
chapter: Customize Installer Behavior on macOS with ACTransforms.xml.
Procedure
Step 1 Download the Cisco AnyConnect Secure Mobility Client DMG package from Cisco.com.
Step 2 Open the file to access the installer. Note that the downloaded image is a read-only file.
Step 3 Make the installer image writable by either running the Disk Utility or using the Terminal application, as
follows:
hdiutil convert <source dmg> -format UDRW -o <output dmg>
Step 4 Install the stand-alone Profile Editor on a computer running a Windows operating system. You must select
the AnyConnect modules you want as part of a Custom installation or a Complete installation. They are not
installed by default.
Step 5 Start the profile editor and create a profile.
Step 6 Save the profile appropriately as WebSecurity_ServiceProfile.xml.
Step 7 For these modules, the profile editor creates an additional obfuscated version of the profile, such as
WebSecurity_ServiceProfile.wso for web security and saves it to the same location as you saved
the file, such as WebSecurity_ServiceProfile.xml for web security. Follow these steps to complete
the obfuscation:
a) Copy the specified .wso file from the Windows machine to the macOS installer package in the appropriate
folder path, such as AnyConnect x.x.x/Profiles/websecurity for web security. Or, use the
Terminal application, as shown below for web security instance:
Deploy AnyConnect
15
Deploy AnyConnect
Restrict Applications on macOS
b) In the macOS installer, go to the AnyConnect x.x.x/Profiles directory and open the
ACTransforms.xml file in TextEdit for editing. Set the <DisableVPN> element to true to ensure that
VPN functionality is not installed:
<ACTransforms>
<DisableVPN>true</DisableVPN>
</ACTransforms>
The default setting is Mac App Store and identified developers (signed applications).
The current version of AnyConnect is signed application using an Apple certificate. If Gatekeeper is configured
for Mac App Store (only), then you must either select the Anywhere setting or control-click to bypass the
selected setting to install and run AnyConnect from a pre-deployed installation. For more information see:
http://www.apple.com/macosx/mountain-lion/security.html.
Predeploying to Linux
Installing Modules for Linux
You can break out the individual installers for Linux and distribute them manually. Each installer in the
predeploy package can run individually. Use a compressed file utility to view and extract the files in the tar.gz
file.
Procedure
Step 1 Install the AnyConnect core client module, which installs the GUI and VPN capability (both SSL and IPsec).
Step 2 Install the DART module, which provides useful diagnostic information about the AnyConnect core client
installation.
Step 3 Install the posture module or ISE compliance module.
Deploy AnyConnect
16
Deploy AnyConnect
Initializing Server Certificate Verification with Firefox
Procedure
Note If you choose to activate lockdown to the VPN installer, you will consequently be locking down AMP Enabler
as well.
Deploy AnyConnect
17
Deploy AnyConnect
Web-Deploying AnyConnect
Web-Deploying AnyConnect
Web Deployment refers to the AnyConnect Downloader on the client system getting AnyConnect software
from a headend, or to using the portal on the headend to install or update AnyConnect. As an alternative to
our traditional web launch which relied too heavily on browser support (and Java and ActiveX requirements),
we improved the flow of auto web deploy, which is presented at initial download and upon launch from a
clientless page.
Deploy AnyConnect
18
Deploy AnyConnect
Configuring Web Deployment on the ASA
• The ISE server can only be discovered by the AnyConnect ISE Posture agent if that agent is configured
in the ISE Client Provisioning Policy. The ISE administrator configures either the NAC Agent or the
AnyConnect ISE Posture module under Agent Configuration > Policy > Client Provisioning.
Note Although versions other than those listed above may work, Cisco has not performed full testing on any version
other than those listed.
Note Web launch works on all browsers that support NPAPI (Netscape Plugin Application Programming Interface)
plugins.
AnyConnect 4.3 (and later) has moved to the Visual Studio (VS) 2015 build environment and requires VS
redistributable files for its Network Access Manager module functionality. These files are installed as part of
the install package. You can use the .msi files to upgrade the Network Access Manager module to 4.3 (and
later), but the AnyConnect Secure Mobility Client must be upgraded first and running release 4.3 (and later).
Also, with the addition of the AnyConnect Umbrella Roaming Security Module, Microsoft .NET 4.0 is
required.
Deploy AnyConnect
19
Deploy AnyConnect
Download the AnyConnect Package
Windows anyconnect-win-version-k9.pkg
macOS anyconnect-macosx-i386-version-k9.pkg
Note You should not have different versions for the same operating system on the ASA.
Procedure
Step 1 Navigate to Configuration > Remote Access > VPN > Network (Client) Access > AnyConnect Client
Software . The AnyConnect Client Images panel displays the AnyConnect images currently loaded on the
ASA. The order in which the images appear is the order the ASA downloads them to remote computers.
Step 2 To add an AnyConnect image, click Add.
• Click Browse Flash to select an AnyConnect image you have already uploaded to the ASA.
• Click Upload to browse to an AnyConnect image you have stored locally on your computer.
Note If you choose Start Before Logon, you must also enable this feature in the AnyConnect client profile.
Procedure
Step 1 In ASDM go to Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
Step 2 Select a group policy and click Edit or Add a new group policy.
Deploy AnyConnect
20
Deploy AnyConnect
Create a Client Profile in ASDM
Step 3 In the navigation pane, select VPN Policy > AnyConnect Client. At Client Modules to Download, click
Add and choose each module you want to add to this group policy. The modules that are available are the
ones you added or uploaded to the ASA.
Step 4 Click Apply and save your changes to the group policy.
Procedure
Step 1 Navigate to Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Client Profile.
Step 2 Select the client profile you want to associate with a group and click Change Group Policy.
Step 3 In the Change Policy for Profile policy name window, choose a group policy from the Available Group Policies
field and click the right arrow to move it to the Policies field.
Step 4 Click OK.
Step 5 In the AnyConnect Client Profile page, click Apply.
Step 6 Click Save.
Step 7 When you have finished with the configuration, click OK.
Deploy AnyConnect
21
Deploy AnyConnect
Prepare AnyConnect Files for ISE Upload
Note Because AnyConnect ISE posture module does not support web proxy based redirection in discovery, Cisco
recommends that you use non-redirection based discovery. You can find further information in the Client
Provisioning Without URL Redirection for Different Networks section of the Cisco Identity Services Engine
Administrator Guide.
• Localization files
• AnyConnect gettext translations for message localizations
• Windows Installer Transforms
Note With ASA, installation happens with the VPN downloader. With the download,
the ISE posture profile is pushed via ASA, and the discovery host needed for
later provisioning the profile is available before the ISE posture module contacts
ISE. Whereas with ISE, the ISE posture module will get the profile only after
ISE is discovered, which could result in errors. Therefore, ASA is recommended
to push the ISE posture module when connected to a VPN.
• Create profiles for the modules you plan to deploy. At a minimum, create an AnyConnect ISE Posture
profile.
• Combine customization and localization resources into a ZIP archive, which is called a bundle in ISE.
A bundle can contain:
Deploy AnyConnect
22
Deploy AnyConnect
Configure ISE to Deploy AnyConnect
• AnyConnect UI resources
• VPN Connection Scripts
• Help file(s)
• Installer Transforms
Creating ISE bundles is described in Prepare AnyConnect Customizations and Localizations for ISE Deployment
.
Note When configuring the AnyConnect Configuration object in ISE, unchecking the VPN module under AnyConnect
Module Selection does not disable the VPN on the deployed/provisioned client. You must configure
VPNDisable_ServiceProfile.xml to disable the VPN tile on AnyConnect GUI. VPNDisable_ServiceProfile.xml
is on CCO with the other AnyConnect files.
1. In ISE, select Policy > Policy Elements > results > . Expand Client Provisioning to show Resources,
and select Resources.
2. Select Add > Agent resources from local disk, and upload the AnyConnect package file. Repeat adding
agent resources from local disk for any other AnyConnect resources that you plan to deploy.
3. Select Add > AnyConnect Configuration > . This AnyConnect Configuration configures modules,
profiles, customization/language packages, and the OPSWAT package, as described in the following
table.
The AnyConnect ISE Posture profile can be created and edited in ISE, on the ASA, or in the Windows
AnyConnect Profile Editor. The following table describes the name of each AnyConnect resource, and
the name of the resource type in ISE.
Deploy AnyConnect
23
Deploy AnyConnect
Configure Web-Deployment on FTD
4. Create a Role or OS-based client provisioning policy. AnyConnect and the ISE legacy NAC/MAC agent
can be selected for Client provisioning posture agents. Each CP policy can only provision one agent, either
the AnyConnect agent or the legacy NAC/MAC agent. When configuring the AnyConnect agent, select
one AnyConnect Configuration created in step 2.
Deploy AnyConnect
24
Deploy AnyConnect
Updating AnyConnect Software and Profiles
• There is no inherent support for the AnyConnect Profile Editor in the FMC; you must configure the VPN
profiles independently. The VPN Profile and AnyConnect VPN package are added as File Objects in the
FMC, which become part of the RA VPN configuration.
• Secure Mobility, Network Access Management, and all the other AnyConnect modules and their profiles
beyond the core VPN capabilities are not currently supported.
• VPN Load balancing is not supported.
• Browser Proxy is not supported.
• All posture variants (HostScan, Endpoint Posture Assessment, and ISE) and Dynamic Access Policies
based on the client posture are not supported.
• The Firepower Threat Defense device does not configure or deploy the files necessary to customize or
localize AnyConnect.
• Features requiring Custom Attributes on the AnyConnect Client are not supported on FTD such as:
Deferred Upgrade on desktop clients and Per-App VPN on mobile clients.
• Authentication cannot be done on the FTD headend locally; therefore, configured users are not available
for remote connections, and the FTD cannot act as a Certificate Authority. Also, the following
authentication features are not supported:
• Secondary or double authentication
• Single Sign-on using SAML 2.0
• TACACS, Kerberos (KCD Authentication) and RSA SDI
• LDAP Authorization (LDAP Attribute Map)
• RADIUS CoA
For details on configuring and deploying AnyConnect on an FTD, see the Firepower Threat Defense Remote
Access VPN chapter in the appropriate release of the Firepower Management Center Configuration Guide,
Release 6.2.1 or later.
Deploy AnyConnect
25
Deploy AnyConnect
Updating AnyConnect Software and Profiles
You can allow the end user to delay updates, and you can also prevent clients from updating even if you do
load updates to the headend.
Deploy AnyConnect
26
Deploy AnyConnect
Disabling AnyConnect Auto Update
Procedure
Step 1 In ASDM go to Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
Step 2 Select a group policy and click Edit or Add a new group policy.
Step 3 In the navigation pane, choose Advanced > AnyConnect Client > Login Settings. Uncheck the Inherit
check box, if necessary, and select a Post Login setting.
If you choose to prompt users, specify a timeout period and select a default action to take when that period
expires in the Default Post Login Selection area.
Step 4 Click OK and be sure to apply your changes to the group policy, then click Save.
Deploy AnyConnect
27
Deploy AnyConnect
Configure Deferred Update on an ASA
Deploy AnyConnect
28
Deploy AnyConnect
Configure Deferred Update in ISE
Procedure
Deploy AnyConnect
29
Deploy AnyConnect
Deferred Update GUI
Step 3 On Resources, add an AnyConnect Configuration using the AnyConnect package that you uploaded. The
AnyConnect Configuration has fields to configure Deferred Update.
Deploy AnyConnect
30
Deploy AnyConnect
Unauthorized Server Update Policy Behavior
• The version of the AnyConnect package on the headend is compared to the version on the client to
determine if the software should be updated.
• If the version of the AnyConnect package is older than the version on the client, no software updates
occur.
• If the version of the AnyConnect package is the same as the version on the client, only software
modules that are configured for download on the headend and not present on the client are
downloaded and installed.
• If the version of the AnyConnect package is newer than the version on the client, software modules
configured for download on the headend, as well as software modules already installed on the client,
are downloaded and installed.
• The VPN profile, ISE Posture profile, and each service profile on the headend is compared to that profile
on the client to determine if it should be updated:
• If the profile on the headend is the same as the profile on the client, it is not updated.
• If the profile on the headend is different than the profile on the client, it is downloaded.
Deploy AnyConnect
31
Deploy AnyConnect
Update Policy Guidelines
• The downloader creates a separate text log (UpdateHistory.log) that records the download history. This
log includes the time of the updates, the ASA that updated the client, the modules updated, and what
version was installed before and after the upgrade. This log file is stored here:
%AllUsers%\Application Data\Cisco\Cisco AnyConnect Secure Mobility
Client\Logs directory.
Deploy AnyConnect
32
Deploy AnyConnect
Update Policy Example
The following update sequence is possible when the client is currently running AnyConnect VPN and Network
Access Manager modules:
• The client connects to seattle.example.com, an authorized server configured with the same version of
AnyConnect. The Web Security software module is downloaded and installed, as well as the Web Security
profile, if available. If the VPN and Network Access Manager profiles are available for download and
different than the ones on the client, they will also be downloaded.
• The client then connects to newyork.example.com, an authorized ASA configured with a newer version
of AnyConnect. The VPN, Network Access Manager, and Web Security modules are downloaded and
installed. Profiles that are available for download and different than the ones on the client are also
downloaded.
• The client then connects to raleigh.example.com, an unauthorized ASA. Since software updates are
allowed, the VPN, Network Access Manager, Web Security, and Posture modules are all upgraded.
Because the VPN profile and service profile updates are not allowed, they are not downloaded. If the
VPN profile could have been updated (based on it being different), the connection will terminate.
Deploy AnyConnect
33
Deploy AnyConnect
AnyConnect Reference Information
Global C:\ProgramData\Cisco\Cisco
AnyConnect VPN Client\
preferences_global.xml
Global /opt/cisco/anyconnect/.anyconnect_global
Global /opt/cisco/anyconnect/.anyconnect_global
Deploy AnyConnect
34
Deploy AnyConnect
Port Used by AnyConnect and the Legacy VPN Client
Deploy AnyConnect
35
Deploy AnyConnect
Port Used by AnyConnect and the Legacy VPN Client
Deploy AnyConnect
36