CISCO-logo

CISCO Secure Client Including Any Connect

CISCO-Secure-Client-Including-Any-Connect-product-image

Product Information

Specifications

  • Product Name: Cisco Secure Client
  • Release Version: 5.x
  • First Published: 2025-03-31

Cisco Secure Client (including AnyConnect) Features, License, and OSs, Release 5.x
This document identifies the Cisco Secure Client release 5.1 features, license requirements, and endpoint operating systems that are supported in the Secure Client (including AnyConnect). It also includes supported crytographic algorithms and accessibility recommendations.

Supported Operating Systems

Cisco Secure Client 5.1 supports the following operating systems.

Windows

  • Windows 11 (64-bit)
  • Microsoft-supported versions of Windows 11 for ARM64-based PCs (Supported only in VPN client, DART, Secure Firewall Posture, Network Visibility Module, Umbrella Module, ISE Posture, and Zero Trust Access Module)
  • Windows 10 x86(32-bit) and x64 (64-bit)

macOS (64-bit only)

  • macOS 15 Sequoia
  • macOS 14 Sonoma
  • macOS 13 Ventura

Linux

  • Red Hat: 9.x and 8.x (except ISE Posture Module, which only supports 8.1 (and later)
  • Ubuntu: 24.04, 22.04, and 20.04
  • SUSE (SLES)
    • VPN: Limited support. Used only to install ISE Posture.
    • Not supported for Secure Firewall Posture or Network Visibility Module.
    • ISE Posture: 12.3 (and later) and 15.0 (and later)
  • See the Release Notes for Cisco Secure Client for OS requirements and support notes. See the Offer Descriptions and Supplemental Terms for licensing terms and conditions, and a breakdown of orderability and the specific terms and conditions of the various licenses.
  • See the Feature Matrix below for license information and operating system limitations that apply to Cisco Secure Client modules and features.

Supported Cryptographic Algorithms

The following table lists the cryptographic algorithms supported by Cisco Secure Client. The cryptographic algorithms and cipher suites are shown in the order of preference, most to least. This preference order is dictated by Cisco’s Product Security Baseline to which all Cisco products must comply. Note that the PSB requirements change from time to time so the cryptographical algorithms supported by subsequent versions of Secure Client will change accordingly.

TLS 1.3, 1.2, and DTLS 1.2 Cipher Suites (VPN)

Standard RFC Naming ConventionOpenSSL Naming Convention
TLS_AES_128_GCM_SHA256TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384TLS_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384ECDHA-RSA-AES256-GCM-SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384ECDHE-ECDSA-AES256-GCM-SHA384
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384ECDHE-RSA-AES256-SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384ECDHE-ECDSA-AES256-SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384DHE-RSA-AES256-GCM-SHA384
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256DHE-RSA-AES256-SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384AES256-GCM-SHA384
TLS_RSA_WITH_AES_256_CBC_SHA256AES256-SHA256
TLS_RSA_WITH_AES_256_CBC_SHAAES256-SHA
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256ECDHE-RSA-AES128-GCM-SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256ECDHE-RSA-AES128-SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256ECDHE-ECDSA-AES128-SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256DHE-RSA-AES128-GCM-SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHADHE-RSA-AES128-SHA
TLS_RSA_WITH_AES_128_GCM_SHA256AES128-GCM-SHA256
Standard RFC Naming ConventionOpenSSL Naming Convention
TLS_RSA_WITH_AES_128_CBC_SHA256AES128-SHA256
TLS_RSA_WITH_AES_128_CBC_SHAAES128-SHA

TLS 1.2 Cipher Suites (Network Access Manager)

Standard RFC Naming ConventionOpenSSL Naming Convention
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHAECDHE-RSA-AES256-SHA
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHAECDHE-ECDSA-AES256-SHA
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384DHE-DSS-AES256-GCM-SHA384
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256DHE-DSS-AES256-SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHADHE-RSA-AES256-SHA
TLS_DHE_DSS_WITH_AES_256_CBC_SHADHE-DSS-AES256-SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHAECDHE-RSA-AES128-SHA
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHAECDHE-ECDSA-AES128-SHA
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256DHE-DSS-AES128-GCM-SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256DHE-DSS-AES128-SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHADHE-DSS-AES128-SHA
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHAECDHE-RSA-DES-CBC3-SHA
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHAECDHE-ECDSA-DES-CBC3-SHA
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHAEDH-RSA-DES-CBC3-SHA
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHAEDH-DSS-DES-CBC3-SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHADES-CBC3-SHA

DTLS 1.0 Cipher Suites (VPN)

Standard RFC Naming ConventionOpenSSL Naming Convention
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384DHE-RSA-AES256-GCM-SHA384
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256DHE-RSA-AES256-SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256DHE-RSA-AES128-GCM-SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256DHE-RSA-AES128-SHA256
Standard RFC Naming ConventionOpenSSL Naming Convention
TLS_DHE_RSA_WITH_AES_128_CBC_SHADHE-RSA-AES128-SHA
TLS_RSA_WITH_AES_256_CBC_SHAAES256-SHA
TLS_RSA_WITH_AES_128_CBC_SHAAES128-SHA

IKEv2/IPsec Algorithms

Encryption

  • ENCR_AES_GCM_256
  • ENCR_AES_GCM_192
  • ENCR_AES_GCM_128
  • ENCR_AES_CBC_256
  • ENCR_AES_CBC_192
  • ENCR_AES_CBC_128

Pseudo Random Function

  • PRF_HMAC_SHA2_256
  • PRF_HMAC_SHA2_384
  • PRF_HMAC_SHA2_512
  • PRF_HMAC_SHA1

Diffie-Hellman Groups

  • DH_GROUP_256_ECP – Group 19
  • DH_GROUP_384_ECP – Group 20
  • DH_GROUP_521_ECP – Group 21
  • DH_GROUP_3072_MODP – Group 15
  • DH_GROUP_4096_MODP – Group 16

Integrity

  • AUTH_HMAC_SHA2_256_128
  • AUTH_HMAC_SHA2_384_192
  • AUTH_HMAC_SHA1_96
  • AUTH_HMAC_SHA2_512_256

License Options

  • Use of the Cisco Secure Client 5.1 requires that you purchase either a Premier or Advantage license. The license(s) required depends on the Secure Client features that you plan to use, and the number of sessions that you want to support. These user-based licenses include access to support, and software updates that align with general BYOD trends.
  • Secure Client 5.1 licenses are used with Cisco Secure Firewall Adaptive Security Appliances (ASA), Integrated Services Routers (ISR), Cloud Services Routers (CSR), and Aggregated Services Routers (ASR), as well as other non-VPN headend such as Identity Services Engine (ISE). A consistent model is used regardless of the headend, so there is no impact when headend migrations occur.

One or more of the following Cisco Secure licenses may be required for your deployment:

LicenseDescription
AdvantageSupports basic Secure Client features such as VPN functionality for PC and mobile platforms (Secure Client and standards-based IPsec IKEv2 software clients), FIPS, basic endpoint context collection, and 802.1x Windows supplicant.
PremierSupports all basic Secure Client Advantage features in addition to advanced features such as Network Visibility Module, clientless VPN, VPN posture agent, unified posture agent, Next Generation Encryption/Suite B, SAML, all plus services and flex licenses.
VPN Only (Perpetual)Supports VPN functionality for PC and mobile platforms, clientless (browser-based) VPN termination on Secure Firewall ASA, VPN-only compliance and posture agent in conjunction with ASA, FIPS compliance, and next-generation encryption (Suite B) with Secure Client and third-party IKEv2 VPN clients. VPN only licenses are most applicable to environments wanting to use Secure Client exclusively for remote access VPN services but with high or unpredictable total user counts. No other Secure Client function or service (such as Cisco Umbrella Roaming, ISE Posture, Network Visibility module, or Network Access Manager) is available with this license.

Advantage and Premier License

  • From the Cisco Commerce Workspace website, choose the service tier (Advantage or Premier) and the length of term (1, 3, or 5 year). The number of licenses that are needed is based on the number of unique or authorized users that will make use of Secure Client. Secure Client is not licensed based on simultaneous connections. You can mix Advantage and Premier licenses in the same environment, and only one license is required for each user.
  • Cisco Secure 5.1 licensed customers are also entitled to earlier AnyConnect releases.

Feature Matrix

Cisco Secure 5.1 modules and features, with their minimum release requirements, license requirements, and supported operating systems are listed in the following sections:

Cisco Secure Client Deployment and Configuration

FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Deferred UpgradesASA 9.0

ASDM 7.0

Advantageyesyesyes
Windows Services LockdownASA 8.0(4)

ASDM 6.4(1)

Advantageyesnono
Update Policy, Software and Profile LockASA 8.0(4)

ASDM 6.4(1)

Advantageyesyesyes
Auto UpdateASA 8.0(4)

ASDM 6.3(1)

Advantageyesyesyes
Pre-deploymentASA 8.0(4)

ASDM 6.3(1)

Advantageyesyesyes
Auto Update Client ProfilesASA 8.0(4)

ASDM 6.4(1)

Advantageyesyesyes
Cisco Secure Client Profile EditorASA 8.4(1)

ASDM 6.4(1)

Advantageyesyesyes
User Controllable FeaturesASA 8.0(4)

ASDM 6.3(1)

Advantageyesyesyes*

* Ability to minimize Secure Client on VPN connect, or block connections to untrusted servers

AnyConnect VPN Core Features

FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
SSL (TLS & DTLS), includingASA 8.0(4)Advantageyesyesyes
Per App VPNASDM 6.3(1)
SNI (TLS & DTLS)n/aAdvantageyesyesyes
FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
TLS CompressionASA 8.0(4)

ASDM 6.3(1)

Advantageyesyesyes
DTLS fallback to TLSASA 8.4.2.8

ASDM 6.3(1)

Advantageyesyesyes
IPsec/IKEv2ASA 8.4(1)

ASDM 6.4(1)

Advantageyesyesyes
Split tunnelingASA 8.0(x)

ASDM 6.3(1)

Advantageyesyesyes
Dynamic Split TunnelingASA 9.0Advantage, Premier, or VPN-onlyyesyesno
Enhanced Dynamic Split TunnelingASA 9.0Advantageyesyesno
Both dynamic exclusion from and dynamic inclusion into a tunnelASA 9.0Advantageyesyesno
Split DNSASA 8.0(4)

ASDM 6.3(1)

AdvantageYesYesNo
Ignore Browser ProxyASA 8.3(1)

ASDM 6.3(1)

Advantageyesyesno
Proxy Auto Config (PAC) file generationASA 8.0(4)

ASDM 6.3(1)

Advantageyesnono
Internet Explorer Connections tab lockdownASA 8.0(4)

ASDM 6.3(1)

Advantageyesnono
Optimal Gateway SelectionASA 8.0(4)

ASDM 6.3(1)

Advantageyesyesno
Global Site Selector (GSS) compatibilityASA 8.0(4)

ASDM 6.4(1)

Advantageyesyesyes
Local LAN AccessASA 8.0(4)

ASDM 6.3(1)

Advantageyesyesyes
FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Tethered device access via client firewall rules, for synchronizationASA 8.3(1)

ASDM 6.3(1)

Advantageyesyesyes
Local printer access via client firewall rulesASA 8.3(1)

ASDM 6.3(1)

Advantageyesyesyes
IPv6ASA 9.0

ASDM 7.0

Advantageyesyesno
Further IPv6 implementationASA 9.7.1

ASDM 7.7.1

Advantageyesyesyes
Certificate Pinningno dependencyAdvantageyesyesyes
Management VPN tunnelASA 9.0

ASDM 7.10.1

Premieryesyesno

Connect and Disconnect Features

FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Fast User Switchingn/an/ayesnono
SimultaneousASA8.0(4)PremierYesYesYes
Clientless &

Secure Client

ASDM 6.3(1)
connections
Start BeforeASA 8.0(4)Advantageyesnono
Logon (SBL)ASDM 6.3(1)
Run script onASA 8.0(4)Advantageyesyesyes
connect & disconnectASDM 6.3(1)
Minimize onASA 8.0(4)Advantageyesyesyes
connectASDM 6.3(1)
Auto connect onASA 8.0(4)Advantageyesyesyes
startASDM 6.3(1)
FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Auto reconnectASA 8.0(4)Advantageyesyesno
(disconnect on

system suspend,

ASDM 6.3(1)
reconnect on
system resume)
Remote UserASA 8.0(4)Advantageyesnono
VPN

Establishment

ASDM 6.3(1)
(permitted or
denied)
LogonASA 8.0(4)Advantageyesnono
Enforcement

(terminate VPN

ASDM 6.3(1)
session if
another user logs
in)
Retain VPNASA 8.0(4)Advantageyesnono
session (when

user logs off,

ASDM 6.3(1)
and then when
this or another
user logs in)
Trusted NetworkASA 8.0(4)Advantageyesyesyes
Detection (TND)ASDM 6.3(1)
Always on (VPNASA 8.0(4)Advantageyesyesno
must be

connected to

ASDM 6.3(1)
access network)
Always onASA 8.3(1)Advantageyesyesno
exemption via DAPASDM 6.3(1)
Connect FailureASA 8.0(4)Advantageyesyesno
Policy (Internet access allowedASDM 6.3(1)
or disallowed if
VPN connection
fails)
Captive PortalASA 8.0(4)Advantageyesyesyes
DetectionASDM 6.3(1)
FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Captive PortalASA 8.0(4)Advantageyesyesno
RemediationASDM 6.3(1)
Enhanced Captive Portal Remediationno dependencyAdvantageyesyesno
Dual-home Detectionno dependencyn/ayesyesyes

Authentication and Encryption Features

FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Certificate only authenticationASA 8.0(4)

ASDM 6.3(1)

Advantageyesyesyes
RSA SecurID /SoftID integrationno dependencyAdvantageyesnono
Smartcard supportno dependencyAdvantageyesyesno
SCEP (requires Posture Module if Machine ID is used)no dependencyAdvantageyesyesno
List & select certificatesno dependencyAdvantageyesnono
FIPSno dependencyAdvantageyesyesyes
SHA-2 for IPsec IKEv2 (Digital Signatures, Integrity, & PRF)ASA 8.0(4)

ASDM 6.4(1)

Advantageyesyesyes
Strong Encryption (AES-256 & 3des-168)no dependencyAdvantageYesYesYes
NSA Suite-B (IPsec only)ASA 9.0

ASDM 7.0

Premieryesyesyes
Enable CRL checkno dependencyPremieryesnono
SAML 2.0 SSOASA 9.7.1

ASDM 7.7.1

Premier or VPN onlyyesyesyes
FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Enhanced SAML 2.0ASA 9.7.1.24

ASA 9.8.2.28

ASA 9.9.2.1

Premier or VPN onlyyesyesyes
External Browser SAML Package for Enhanced Web AuthenticationASA 9.17.1

ASDM 7.17.1

Premier or VPN onlyyesyesyes
Multiple-certificate authenticationASA 9.7.1

ASDM 7.7.1

Advantage, Premier, or VPN onlyyesyesyes

Interfaces

FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
GUIASA 8.0(4)Advantageyesyesyes
Command LineASDM 6.3(1)n/ayesyesyes
APIno dependencyn/ayesyesyes
Microsoft Component Object Module (COM)no dependencyn/ayesnono
Localization of User Messagesno dependencyn/ayesyesyes
Custom MSI transformsno dependencyn/ayesnono
User-defined resource filesno dependencyn/ayesyesno
Client HelpASA 9.0

ASDM 7.0

n/ayesyesno

Secure Firewall Posture (Formerly HostScan) and Posture Assessment

FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Endpoint AssessmentASA 8.0(4)Premieryesyesyes
FeatureMinimum ASA/ASDM ReleaseLicense RequiredWindowsmacOSLinux
Endpoint RemediationASDM 6.3(1)Premieryesyesyes
Quarantineno dependencyPremieryesyesyes
Quarantine status & terminate messageASA 8.3(1)

ASDM 6.3(1)

Premieryesyesyes
Secure Firewall Posture Package UpdateASA 8.4(1)

ASDM 6.4(1)

Premieryesyesyes
Host Emulation Detectionno dependencyPremieryesnono
OPSWAT v4ASA 9.9(1)

ASDM 7.9(1)

Premieryesyesyes
Disk EncryptionASA 9.17(1)

ASDM 7.17(1)

n/ayesyesyes
AutoDARTno dependencyn/ayesyesyes

ISE Posture

FeatureMinimum Secure Client ReleaseMinimum ASA/ASDM ReleaseMinimum ISE ReleaseLicense RequiredWindowsmacOSLinux
ISE Posture CLI5.0.01xxxno dependencyno dependencyn/ayesnono
Posture State Synchronization5.0no dependency3.1n/ayesyesyes
Change of Authorization (CoA)5.0ASA 9.2.1

ASDM 7.2.1

2.0Advantageyesyesyes
ISE Posture Profile Editor5.0ASA 9.2.1

ASDM 7.2.1

no dependencyPremieryesyesyes
AC Identity Extensions (ACIDex)5.0no dependency2.0Advantageyesyesyes
FeatureMinimum Secure Client ReleaseMinimum ASA/ASDM ReleaseMinimum ISE ReleaseLicense RequiredWindowsmacOSLinux
ISE Posture Module5.0no dependency2.0Premieryesyesyes
Detection of USB mass storage devices (v4 only)5.0no dependency2.1Premieryesnono
OPSWAT v45.0no dependency2.1Premieryesyesno
Stealth Agent for Posture5.0no dependency2.2Premieryesyesno
Continuous endpoint monitoring5.0no dependency2.2Premieryesyesno
Next-generation provisioning and discovery5.0no dependency2.2Premieryesyesno
Application kill and uninstall

capabilities

5.0no dependency2.2Premieryesyesno
Cisco Temporal Agent5.0no dependency2.3ISE

Premier

yesyesno
Enhanced SCCM approach5.0no dependency2.3Premier: Secure Client and ISEyesnono
Posture policy enhancements for optional mode5.0no dependency2.3Premier: Secure Client and ISEyesyesno
Periodic probe interval in profile editor5.0no dependency2.3Premier: Secure Client and ISEyesyesno
Visibility into hardware inventory5.0no dependency2.3Premier: Secure Client and ISEyesyesno
FeatureMinimum Secure Client ReleaseMinimum ASA/ASDM

Release

Minimum ISE ReleaseLicense RequiredWindowsmacOSLinux
Grace period for noncompliant devices5.0no dependency2.4Premier: Secure Client and ISEyesyesno
Posture rescan5.0no dependency2.4Premier: Secure Client and ISEyesyesno
Secure Client stealth mode notifications5.0no dependency2.4Premier: Secure Client and ISEyesyesno
Disabling UAC prompt5.0no dependency2.4Premier: Secure Client and ISEyesnono
Enhanced grace period5.0no dependency2.6Premier: Secure Client and ISEyesyesno
Custom notification controls and revamp of

remediation windows

5.0no dependency2.6Premier: Secure Client and ISEyesyesno
End-to-end agentless posture flow5.0no dependency3.0Premier: Secure Client and ISEyesyesno

Network Access Manager

FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
CoreASA 8.4(1)

ASDM 6.4(1)

Advantageyesnono
FeatureMinimum ASA/ASDM ReleaseLicense RequiredWindowsmacOSLinux
Wired support IEEE 802.3no dependencyn/ayesnono
Wireless support IEEE 802.11no dependencyn/ayesnono
Pre-logon & Single Sign on Authenticationno dependencyn/ayesnono
IEEE 802.1Xno dependencyn/ayesnono
IEEE 802.1AE MACsecno dependencyn/ayesnono
EAP methodsno dependencyn/ayesnono
FIPS 140-2 Level 1no dependencyn/ayesnono
Mobile Broadband supportASA 8.4(1)

ASDM 7.0

n/ayesnono
IPv6ASDM 9.0n/ayesnono
NGE and NSA Suite-BASDM 7.0n/ayesnono
TLS 1.2 for VPN

connectivity*

no dependencyn/ayesnono
WPA3 Enhanced Open (OWE) and WPA3

Personal (SAE) support

no dependencyn/ayesnono

*If you are using ISE as a RADIUS server, note the following guidelines.

  • ISE started support for TLS 1.2 in release 2.0. Network Access Manager and ISE will negotiate to TLS 1.0 if you have Cisco Secure Client with TLS 1.2 and an ISE release prior to 2.0. Therefore, if you use Network Access Manager and EAP-FAST  with ISE 2.0 (or later) for RADIUS servers, you must upgrade to the appropriate release of ISE as well.
  • Incompatibility warning: If you are an ISE customer running 2.0 or higher, you must read this before proceeding!
  • The ISE RADIUS has supported TLS 1.2 since release 2.0, however there is a defect in the ISE implementation of EAP-FAST using TLS 1.2 tracked by CSCvm03681. The defect has been fixed in the 2.4p5 release of ISE.
  • If NAM is used to authenticate using EAP-FAST with any ISE releases that support TLS 1.2 prior to the above releases, the authentication will fail and the endpoint will not have access to the network.

AMP Enabler

FeatureMinimum ASA/ASDM

Release

Minimum ISE ReleaseLicenseWindowsmacOSLinux
AMP EnablerASDM 7.4.2

ASA 9.4.1

ISE 1.4Advantagen/ayesn/a

Network Visibility Module

FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Network Visibility ModuleASDM 7.5.1

ASA 9.5.1

Premieryesyesyes
Adjustment to the rate at which data is sentASDM 7.5.1

ASA 9.5.1

Premieryesyesyes
Customization of NVM timerASDM 7.5.1

ASA 9.5.1

Premieryesyesyes
Broadcast and multicast option for data collectionASDM 7.5.1

ASA 9.5.1

Premieryesyesyes
Creation of anonymization profilesASDM 7.5.1

ASA 9.5.1

Premieryesyesyes
Broader data collection and anonymization

with hashing

ASDM 7.7.1

ASA 9.7.1

Premieryesyesyes
Support for Java as a containerASDM 7.7.1

ASA 9.7.1

Premieryesyesyes
Configuration of cache to customizeASDM 7.7.1

ASA 9.7.1

Premieryesyesyes
Periodic flow reportingASDM 7.7.1

ASA 9.7.1

Premieryesyesyes
Flow filterno dependencyPremieryesyesyes
Standalone NVMno dependencyPremieryesyesyes
FeatureMinimum ASA/ASDM

Release

License RequiredWindowsmacOSLinux
Integration with Secure Cloud Analyticsno dependencyn/ayesnono
Process Tree Hierarchyno dependencyn/ayesyesyes

Secure Umbrella Module

Secure Umbrella ModuleMinimum ASA/ASDM

Release

Minimum ISE ReleaseLicense RequiredWindowsmacOSLinux
Secure UmbrellaASDM 7.6.2ISE 2.0Eitheryesyesno
ModuleASA 9.4.1Advantage or Premier
Umbrella
licensing is
mandatory
Umbrella Secure Web Gatewayno dependencyno dependencyn/ayesyesno
OpenDNS IPv6 supportno dependencyno dependencyn/ayesyesno

For information on Umbrella licensing, see https://www.opendns.com/enterprise-security/threat-enforcement/packages/

Thousand Eyes Endpoint Agent Module

FeatureMinimum ASA/ASDM ReleaseMinimum ISE ReleaseLicense RequiredWindowsmacOSLinux
Endpoint Agentno dependencyno dependencyn/ayesyesno

Customer Experience Feedback

FeatureMinimum ASA/ASDM ReleaseLicense RequiredWindowsmacOSLinux
Customer Experience FeedbackASA 8.4(1)

ASDM 7.0

Advantageyesyesno

Diagnostic and Report Tool (DART)

Log TypeLicense RequiredWindowsmacOSLinux
VPNAdvantageyesyesyes
Cloud Managementn/ayesyesno
Duo Desktopn/ayesyesno
Endpoint Visibility Modulen/ayesnono
ISE PosturePremieryesyesyes
Network Access ManagerPremieryesnono
Network Visibility ModulePremieryesyesyes
Secure Firewall PosturePremieryesyesyes
Secure Endpointn/ayesyesno
ThousandEyesn/ayesyesno
Umbrellan/ayesyesno
Zero Trust Access Modulen/ayesyesno

Accessibility Recommendations
We are committed to enhancing accessibility and to providing a seamless experience for all users, by adhering to specific Voluntary Product Accessibility Template (VPAT) compliance standards. Our product is designed to integrate effectively with various accessibility tools, ensuring it is both user-friendly and accessible to individuals with specific needs.

JAWS Screen Reader
For Windows users, we recommend using the JAWS screen reader and its capabilities to assist those with disabilities. JAWS (Job Access with Speech) is a powerful screen reader that provides audio feedback and keyboard shortcuts for users with visual impairments. It allows users to navigate through applications and websites using speech output and braille displays. By integrating with JAWS, our product ensures that visually impaired users can efficiently access and interact with all features, enhancing their overall productivity and user experience.

Windows Operating System Accessibility Tools

Windows Magnifier
The Windows Magnifier tool allows users to enlarge on-screen content, improving visibility for those with low vision. Users can zoom in and out easily, ensuring that text and images are clear and readable.
On Windows, set your display resolution to at least 1280px x 1024px. You can zoom to 400% by changing the Scaling on Display setting and view one or two module tiles in Secure Client. To zoom in above 200%, the Secure Client Advanced Window contents may not be fully available (depending on your monitor size). We do not support Reflow, which is typically used on content-based web pages and publications and also known as Responsive Web Design.

Invert Colors
The invert colors feature provides contrast themes (aquatic, dusk, and night sky) and Windows custom themes. The user needs to change Contrast Theme in the Windows setting to apply high contrast mode to Secure Client and make it easier for those with certain visual impairments to read and interact with on-screen elements.

Keyboard Navigation Shortcuts
Because Secure Client is not a content-based web application, it has its own controls and graphics within its UI. For efficient navigation, Cisco Secure Client supports various keyboard shortcuts. By following the below recommendations and using the described tools and shortcuts, users can enhance their interaction with Secure Client, ensuring a more accessible and efficient experience:

  • Tab Navigation: Use the Tab key for individual panel navigation through the primary (tile) window, DART setup dialogs, and each module’s sub dialogs. The Spacebar or Enter trigger the action. An item in focus is indicated as dark blue, and the indication of a shift in focus is portrayed with a frame around the control.
  • Module Selection: Use the Up/Down arrow keys to navigate through specific modules on the left navigation bar.
  • Module Property Pages: Use the Left/Right arrow keys to navigate between individual settings tabs, and then use the Tab key for panel navigation.
  • Advanced Window: Use the Alt+Tab to choose it and Esc to close it.
  • Navigation of Group Table List: Use PgUp/PgDn or Spacebar/Enter to expand or collapse a specific group.
  • Minimize/Maximize the active Secure Client UI: Windows Logo key + Up/Down arrow.
  • About Dialog: Use the Tab key to navigate through this page, and use the Spacebar to launch any available hyperlinks.

Frequently Asked Questions

  • Q: What operating systems are supported by Cisco Secure Client?
    • A: Cisco Secure Client 5.1 supports Windows operating systems.
  • Q: How can I access licensing terms and conditions for Cisco Secure Client?
    • A: Refer to the Offer Descriptions and Supplemental Terms provided in the documentation for detailed licensing information.
  • Q: What cryptographic algorithms are supported by Cisco Secure Client?
    • A: The supported cryptographic algorithms include TLS 1.3, 1.2,and DTLS 1.2 Cipher Suites as well as TLS 1.2 Cipher Suites for Network Access Manager.

Documents / Resources

CISCO Secure Client Including Any Connect [pdf] User Guide
Release 5.1, Secure Client Including Any Connect, Client Including Any Connect, Including Any Connect, Any Connect

References

Leave a comment

Your email address will not be published. Required fields are marked *