Limitations and Range Limits
Secure Access sets limitations by component and defines the amount of time that your data is available on our system. These general limitations affect how you configure, deploy, and interact with Secure Access.
Table of Contents
- Internet Protocol Versions
- Users and Groups
- Data Retention
- Reports
- Access Policy
- Resource Connectors and Resource Connector Groups
Internet Protocol Versions
Feature | Limit |
---|---|
IPv4 | Supported by all services. |
IPv6 | Supported by DNS. |
Users and Groups
- You can import no more than 200 Groups into a Secure Access organization.
- For access to private applications, configure the user and private applications to use the same data center.
Data Retention
- DNS logs—Summary data (such as queries per identity or domain) is available for one calendar year.
- DNS, Web proxy, firewall logs—Data retained for 30 days.
Reports
Feature | Limit |
---|---|
| Data available for one calendar year. |
| Data retained for 30 days. |
| Data retained for one calendar year. |
| Data retained for one calendar year. You can access data in 90-day increments. |
Scheduled Report (email attachment) | Accepts up to 10,000 rows of data. |
Exported Report (CSV export) | Exports no more than 1,000,000 rows of data. |
Access Policy
- The Secure Access Unified Policy Framework supports 5000 rules.
Resource Connectors and Resource Connector Groups
Feature | Limit |
---|---|
Maximum number of connector groups per organization | 50 |
Maximum number of connectors per connector group | 50 |
Cisco Secure Client
- Secure Access checks the Cisco Secure Client Zero Trust Access (ZTA) posture profile every 30 minutes.
- Secure Access applies private application configuration changes to the Cisco Secure Client every 30 minutes.
Quickstart – Bring Your Own Device with Zero Trust > Limitations and Range Limits > Network Requirements for Secure Access
Updated 5 months ago