Step 3 - Configure End User Connectivity

The Get Started with Secure Access workflow guides you through the tasks in the Configure End User Connectivity step—configure DNS servers, internet security, virtual private networks (VPNs), and Zero Trust (ZT) access for user devices.

Table of Contents


Task 1 – Configure Zero Trust

Configure connections to private resources from user devices.

Task 2 – Configure Virtual Private Networks

Set up virtual private networks (VPNs) settings.

Task 3 – Configure Internet Security

Add DNS servers, add domains to internal domains list, configure internet security settings for the Cisco Secure Client.

Configure Endpoints and Networks

Step 2 – Configure Access to Resources < Step 3 – Configure End User Connectivity > Step 4 – Configure Endpoints and Network Sources