Configure Secure Client Modules on a Threat Defense using Cisco Secure Firewall Management Center

Introduction

Cisco Secure Client can integrate with various Cisco endpoint security solutions and offer enhanced security using different Secure Client modules.

You can use the managed headend threat defense to distribute and manage Secure Client modules to the endpoints. When a user connects to the threat defense, it downloads and installs Secure Client and the required modules on the endpoint.

Benefits

Using a threat defense to distribute and manage Secure Client modules to the endpoints offers significant benefits, as it eliminates the need for the following manual actions for managing your organization's network:

  • Download or upgrade Secure Client on each endpoint.

  • Distribute and manage Secure Client modules and profiles on each endpoint.

Is this Guide for You?

This use case is for network administrators who use the management center to configure Secure Client modules for remote workers connecting to their organization’s network using remote access VPN.

System Requirements

The table below shows the supported platforms for this feature.

Product

Version

Version used in this document

Cisco Secure Firewall Threat Defense (formerly Firepower Threat Defense/FTD)

6.3 and later

7.3

Cisco Secure Firewall Management Center (formerly Firepower Management Center/FMC)

6.7 and later

7.3

Cisco Secure Client (formerly AnyConnect)

4.0 and later

5.0


Note


In FMC versions 6.4 to 6.6, you can enable these modules and profiles on an FTD using FlexConfig. For more information, see Configure AnyConnect Modules and Profiles Using FlexConfig.


How to Install Secure Client Modules using a Managed Threat Defense

  1. The administrator creates profiles for the required Secure Client modules.

  2. The administrator uses the management center to:

    1. Configure the modules and add the profiles in the RA VPN group policy.

    2. Deploy the configuration on the threat defense.

  3. The user uses Secure Client to initiate a VPN connection to the threat defense.

  4. The threat defense authenticates the user.

  5. The Secure Client checks for updates.

  6. The threat defense distributes the Secure Client modules and the profiles on the endpoint.

What are the Different Secure Client Modules?

Module

Description

AMP Enabler

Deploys Cisco Secure Endpoint, formerly AMP for Endpoints, on endpoints.

It detects potential malware threats in the network, removes these threats, and protects the enterprise.

ISE Posture

Performs posture checks using Cisco Identity Services Engine (ISE) to assess an endpoint's compliance.

Network Visibility

Monitors endpoint application usage.

You can share the usage data with NetFlow analysis tools.

Umbrella Roaming Security

Provides DNS-layer security using the Cisco Umbrella Roaming Security service.

Network Access Manager

Provides a secure layer 2 network and performs device authentication to access wired and wireless networks.

Start Before Login (SBL)

Allows users to establish their VPN connection to the enterprise infrastructure before logging onto Windows.

Web Security

Routes HTTP traffic to a Cisco Cloud Web Security scanning proxy.

Diagnostics and Reporting Tool (DART)

Collates system logs and other diagnostic information to troubleshoot Secure Client installation and connection problems.

Feedback

Provides information about the features and modules that you use and enable.

This information allows Cisco to improve the quality, reliability, performance, and user experience of Cisco Secure Client.

For more information about these modules, see the Cisco Secure Client (including AnyConnect) Administrator Guide, Release 5.

Prerequisites

  • Configure the associated products depending on the module that you are going to use.

  • Download the following Secure Client-related packages from the Cisco Software Download Center to your local host.

    • Cisco Secure Client Headend Deployment Package for the required platforms.

      This package is for the headend and contains all the Secure Client modules. For Windows, the filename is cisco-secure-client-win-5.0.03076-webdeploy-k9.pkg.

    • Profile Editor: Create profiles for the modules that require profiles.

      Secure Client needs a Secure Client profile for some of the modules. A profile contains configurations to enable the modules and connect to the corresponding security services. The profile editor supports only Windows.

      The following table lists if the modules require a client profile:

      Secure Client Module

      Requires a Client Profile

      AMP Enabler

      Yes

      ISE Posture

      Yes

      Network Access Manager

      Yes

      Network Visibility Module

      Yes

      Umbrella Roaming Secure Module

      Yes

      Feedback

      Yes

      DART

      No

      Start Before Login

      No

Licences

  • You need one of the following Secure Client licenses: Secure Client Premier, Secure Client Advantage, or Secure Client VPN Only.

  • Your management center Essentials (formerly Base) license must allow export-controlled functionality.

    Choose System > Licenses > Smart Licenses to verify this functionality in the management center.

Guidelines, Best Practices, and Limitations

  • Different modules support profiles with different file extensions.

    Ensure that you choose the correct file extensions as shown in the following table:

    Module Name

    File Extensions

    AMP Enabler

    *.xml, *.asp

    Customer Experience Feedback

    *.xml

    ISE Posture

    *.xml, *.isp

    Network Access Manager

    *.xml, *.nsp

    Network Visibility

    *.xml, *.nvmsp

    Umbrella Roaming Security

    *.xml, *.json

    Web Security

    *.xml, *.wsp, *.wso

  • Use DART to collate troubleshooting data and logs, and share it with Cisco TAC, if required.

    By default, DART is not enabled in new remote access VPN group policies for 6.7 and later versions. In 6.6 and earlier versions, DART is enabled by default.

  • If you use the ISE posture module on a Windows OS, you must install Network Access Manager before you use the ISE posture module.

  • Cisco ISE 3.0 and later support agentless posture.

  • If you enable the Umbrella Roaming Security module, ensure that you disable the Always send DNS requests over tunnel option under split tunneling in the RA VPN group policy.

  • You must enable the SBL in the Secure client VPN profile and add it to the RA VPN group policy in the management center.

    To add a Secure client VPN profile to the group policy:

    1. Edit a RA VPN group policy.

    2. Click the Secure Client tab and click Profile.

    3. Click + to add the Secure client VPN profile.

    4. Click Save.

Limitations

  • For a group policy, you can add only one entry per client module. You can edit or delete an entry for a module.

  • AMP Enabler is available only for macOS in Cisco Secure Client 5.0, as Cisco Secure Client for Windows offers full integration with Cisco Secure Endpoint.

  • Network Access Manager does not support macOS or Linux.

Configure a Remote Access VPN Group Policy with Secure Client Modules

Before you begin

Configure a remote access VPN policy in the management center.

Procedure


Step 1

Log in to your management center web interface.

Step 2

Choose Devices > Remote Access.

Step 3

Select a remote access VPN policy, and click Edit.

Step 4

Select a connection profile, and click Edit.

Step 5

Click Edit Group Policy.

Step 6

Click the Secure Client tab.

Step 7

Click Client Modules,and click +.

Step 8

Choose a module from the Client Module drop-down list.

Step 9

Choose a profile for the module from the Profile to download drop-down list or click + to add a profile.

Step 10

Check the Enable module download check box.

Step 11

Click Add.

Step 12

Click Save.


What to do next

  1. Deploy the configuration on the threat defense.

  2. Establish a VPN connection to the threat defense using the Secure Client.

  3. Verify the Secure Client configuration.

Verify Secure Client Modules Configurations

On the Threat Defense

Use the following commands on the threat defense CLI to view the Secure Client modules configuration:

Command

Description

show disk0:

View the profiles and their configuration.

show run webvpn

View details of the Secure Client configurations.

show run group-policy <group_policy_name>

View details of the RA VPN group policy for Secure Client.

show vpn-sessiondb anyconnect

View details of the active Secure Client VPN sessions.

On the Endpoint

  1. Establish a VPN connection to the threat defense using the Secure Client.

  2. Verify if the configured modules are downloaded and installed as part of the Secure Client.

  3. Verify if the profiles are available in the locations specified in Profile Locations for all Operating Systems.

On the Management Center

You can monitor active remote access VPN sessions on the management center using the Remote Access VPN Dashboard (Overview > Remote Access > VPN). You can determine problems related to user sessions and mitigate the problems for your network and users.

Examples of Configuring Secure Client Modules

Provide DNS Layer-security for Endpoint using Secure Client Umbrella Module and Management Center

Before you begin

Ensure that you have:

  • Access to an Umbrella dashboard.

  • Downloaded the Secure Client package to your local host.

  • Configured a remote access VPN on the management center.

  • A higher version of Secure Client on the management center than the version on the endpoint.

  • Disable the Always send DNS requests over tunnel option under split tunnelling in the RA VPN group policy.

Procedure

Step

Task

More Info

1

Download the Secure Client Umbrella module profile from the Umbrella dashboard to your local host.

Download Secure Client Umbrella Module Profile from the Umbrella Dashboard

2

Configure the Umbrella module and the profile in the remote access VPN group policy in the management center.

Configure a Remote Access VPN Group Policy with Secure Client Modules

3

Deploy the configuration on the threat defense.

On the management center menu bar, click Deploy and then select Deployment.

Download Secure Client Umbrella Module Profile from the Umbrella Dashboard

The Umbrella profile (OrgInfo.json) file contains specific information about your Cisco Umbrella service subscription that lets the Security Roaming module know where to report and which policies to enforce.

Procedure

Step 1

Log in to Cisco Umbrella.

Step 2

Choose Deployments > Roaming Computers.

Step 3

Click the Roaming Client icon.

Step 4

Click Download Module Profile.

An example of the OrgInfo.json file is given below:


Verify Umbrella Module Configuration

On the Threat Defense
  • Use the sh vpn-sessiondb anyconnect command to confirm a successful Secure Client connection.

  • Use the sh run group-policy command to view details of the remote access VPN group policy.

On the Endpoint
  1. Verify if the VPN connection is successful, and if Umbrella module has been downloaded on the endpoint.

  2. Click the Statistics icon, and click the Status Overview tab.

    The IPv4/IPv6 DNS Protection Status is “Protected”.

On the Cisco Umbrella

Choose Deployments > Roaming Computers.

The status of the endpoint is “Protected at the DNS Layer”.

Configure DART Module on an Endpoint

Procedure


Step 1

Download the Secure Client package to your local host, See Cisco Software Download Center.

Step 2

Configure a remote access VPN on the management center.

Step 3

Configure the DART module in the RA VPN group policy in the management center, See Configure a Remote Access VPN Group Policy with Secure Client Modules.

Step 4

Deploy the configuration on the threat defense.

On the management center menu bar, click Deploy and then select Deployment.


Verify DART Configuration

On the Endpoint
  1. Verify if the VPN connection is successful.

  2. Verify if the DART module has been downloaded on the endpoint.

  3. After a successful download, restart the AnyConnect Client.

  4. Click the Statistics icon.

  5. Click Diagnostics.

  6. Use the DART wizard to use the DART module.