Step 3 - Configure End User Connectivity
The Get Started with Secure Access workflow guides you through the tasks in the Configure End User Connectivity step—configure DNS servers, internet security, virtual private networks (VPNs), and Zero Trust (ZT) access for user devices.
Table of Contents
- Prerequisites
- Task 1 – Configure Zero Trust
- Task 2 – Configure Virtual Private Networks
- Task 3 - Configure Internet Security
- Configure Endpoints and Networks
Prerequisites
- Full Admin user role. For more information, see Manage Accounts.
Task 1 – Configure Zero Trust
Configure connections to private resources from user devices.
Task 2 – Configure Virtual Private Networks
Set up virtual private networks (VPNs) settings.
Task 3 – Configure Internet Security
Add DNS servers, add domains to internal domains list, configure internet security settings for the Cisco Secure Client.
Configure Endpoints and Networks
Step 2 – Configure Access to Resources < Step 3 – Configure End User Connectivity > Step 4 – Configure Endpoints and Network Sources
Updated 8 months ago