Limitations and Range Limits

Secure Access sets limitations by component and defines the amount of time that your data is available on our system. These general limitations affect how you configure, deploy, and interact with Secure Access.

Table of Contents

Internet Protocol Versions

Feature

Limit

IPv4Supported by all services.
IPv6Supported by DNS.

Users and Groups

  • You can import no more than 200 Groups into a Secure Access organization.
  • For access to private applications, configure the user and private applications to use the same data center.

Data Retention

  • DNS logs—Summary data (such as queries per identity or domain) is available for one calendar year.
  • DNS, Web proxy, firewall logs—Data retained for 30 days.

Reports

Feature

Limit

  • Total Requests
  • Top Destinations
  • Top Categories
  • Top Identities
Data available for one calendar year.
  • Activity Search
  • Security Activity
Data retained for 30 days.
  • Activity Volume
Data retained for one calendar year.
  • Admin Audit Log
Data retained for one calendar year. You can access data in 90-day increments.
Scheduled Report (email attachment)Accepts up to 10,000 rows of data.
Exported Report (CSV export)Exports no more than 1,000,000 rows of data.

Access Policy

  • The Secure Access Unified Policy Framework supports 5000 rules.

Resource Connectors and Resource Connector Groups

FeatureLimit
Maximum number of connector groups per organization50
Maximum number of connectors per connector group

50

Cisco Secure Client

  • Secure Access checks the Cisco Secure Client Zero Trust Access (ZTA) posture profile every 30 minutes.
  • Secure Access applies private application configuration changes to the Cisco Secure Client every 30 minutes.

Quickstart – Bring Your Own Device with Zero Trust > Limitations and Range Limits > Network Requirements for Secure Access