VPN - Cisco Secure Client offers various options for automatically connecting, reconnecting, or disconnecting VPN sessions. These options make it convenient for users to connect to your VPN while supporting your network security needs. An always-on intelligent VPN allows client devices to automatically select the best network access point and adapt its tunneling protocol to the most efficient method. This can include the Datagram Transport Layer Security (DTLS) protocol for latency-sensitive traffic.
VPN Management Tunnel - Management VPN tunnel provides connectivity to the corporate network whenever the client system is powered up, not just when the end-user establishes a VPN connection. Endpoint OS login scripts requiring corporate network connectivity will also benefit from this feature.
Zero Trust Access module - Zero Trust Access reduces the attack surface by hiding applications, and expands your level of knowing, understanding, and controlling who and what is on your network. Beyond the traditional VPN, Zero Trust Access offers more granular control and a secure user experience for a comprehensive network solution. Unlike VPNs, which may trust any entity that passes network control, the Zero Trust Access approach does not trust any user or device until it is verified. No one is automatically trusted; once verified, users are granted limited access and are subject to continuous re-verification.
ZTNA Support - Currently supported by the Cisco Secure Access solution.
Cloud Management Module - Stand-alone Cisco Secure Client Cloud Management enables administrators to create cloud managed deployments of Cisco Secure Client. This deployment configuration offers the option to download a lightweight bootstrapper, containing only the necessary information for the endpoint to connect to the cloud and receive the specified Cisco Secure Client and modules along with their associated profiles. A full installer is also available. In either case, administrators distribute the installers to the endpoints using their preferred software distribution method.
Secure Endpoint Module - Secure Client also integrates optional Secure Endpoint functions, significantly expanding endpoint threat protection. Cisco Secure Endpoint is licensed separately.
Umbrella Roaming Security module - Umbrella Roaming Security provides DNS-layer security when no VPN is active and adds an Intelligent Proxy. Automatically block malware, phishing, and C2 callbacks on roaming devices.
ISE Posture module - Perform endpoint posture assessment on any endpoint that fails to satisfy all mandatory requirements and is deemed non-compliant. ISE Posture conducts a client-side evaluation. The client receives the posture requirement policy from the headend, gathers the necessary posture data, compares the results against the policy, and sends the assessment results back to the headend. Although ISE ultimately determines the endpoint’s compliance status, it depends on the endpoint’s own evaluation of the policy.
Secure Firewall Posture (formerly HostScan) - Secure Firewall Posture is the application that gathers what operating system, antivirus, antispyware, and software is installed on the host. Based on the result of the policy’s evaluation, you can control which hosts are allowed to create a remote access connection to the security appliance. The following posture checks are supported in Secure Firewall Posture : Hostname, IP address, MAC address, port numbers, OPSWAT version, BIOS serial number, and certificate field attributes. Note that Secure Firewall Posture is not supported on mobile devices such as Android, iOS, ChromeOS, or UWP.
Network Visibility Module - The Network Visibility Module delivers a continuous feed of high-value endpoint telemetry, which allows organizations to see endpoint and user behaviors on their networks. It collects flow from endpoints on and off-premises and valuable contexts like users, applications, devices, locations, and destinations. It caches this data and sends it to the Network Visibility Module Collector when it is on a trusted network (the corporate network on-prem or through VPN).
Network Access Manager - Network Access Manager is client software exclusively for Windows that ensures a secure Layer 2 network in line with its policies. It detects and selects the optimal Layer 2 access network and performs device authentication for access to both wired and wireless networks. Network Access Manager handles user and device identity as well as the network access protocols necessary for secure access. It operates intelligently to prevent end users from making connections that violate administrator-defined policies.
ThousandEyes - The ThousandEyes Endpoint Agent is an application that gathers network and application-layer performance data when users access specific websites from within monitored networks. It enhances customers' ability to gain a comprehensive view of their application health, enabling them to make better-informed decisions and resolve issues more quickly. When ThousandEyes is installed within Secure Client, its version is displayed in the Secure Client About box upon detection. The ThousandEyes agent, as part of Cisco Secure Client, is installed using the pre-deployment method.
(Unique Users)
Advantage subscription
[Formerly AnyConnect Plus]
Minimum 25 User
L-AC-PLS-LIC= (PID)
Available for 12 - 60 month
Support client VPNs only
Device or system VPN (including Cisco phone VPN)
Per-application VPN
IEEE 802.1X Windows supplicant.
Basic endpoint context collection
FIPS compliance.
(Unique Users)
Premier subscription
[Formerly AnyConnect Apex]
Minimum 25 User
Available for 12 - 60 month
L-AC-APX-LIC= (PID)
Everything that’s included in AnyConnect Plus.
The AnyConnect Apex licenses support either client or clientless VPNs and are subscription based only.
Clientless (browser-based) VPN termination on the Cisco ASA.
VPN Compliance/Posture agent in conjunction with the Cisco ASA.
Unified Compliance/Posture agent in conjunction with the Cisco ISE 1.3 or later.
Next Generation Encryption/Suite B.
Network Visibility Module
VPN Posture (HostScan)
SAML authentication
(Concurrent Connections)
VPN Only perpetual
[AnyConnect VPN Only perpetual]
AnyConnect VPN Only licenses are purchased per ASA headend device for a specific number of maximum concurrent connections.
L-AC-VPNO (PID)
VPN Only licenses are perpetual based, clientless, and may only be used on a single ASA.
VPN Only licenses do not support Web Security Module, Cisco Umbrella Roaming, ISE Posture, Network Visibility, or Network Access Manager.
SAML Authentication
Note: Cisco Software Support Service (SWSS) must be purchased and maintained separately for all software access and technical support.
Windows 11 (64-bit), current Microsoft supported versions of Windows 10 x86(32-bit) and x64(64-bit), and Windows 8
Microsoft-supported versions of Windows 11 for ARM64-based
Microsoft-supported versions of Windows 10 for ARM64-based PCs
Note: Initial CISCO SECURE CLIENT5.0 is Windows 10/11 Only. AnyConnect supports all the above. macOS 12, 11.2, 10.15, and 10.14 (all 64-bit)
Red Hat
Ubuntu
SUSE (SLES)
Pre-deploy—New installations and upgrades are done either by the end user, or by using an enterprise Software Management System (SMS).
Web Deploy—The Cisco Secure Client package is loaded on the headend, which is either a Secure Firewall ASA, Secure Firewall Threat Defense, or an ISE server. When the user connects to a firewall or to ISE, Cisco Secure Client is deployed to the client.
XDR and Cisco Secure Client Cloud Management: Cisco Secure Client 5.0 can be deployed from the cloud using customizable deployment options.
The VPN Management Tunnel ensures connectivity to the corporate network whenever the client is powered up, and not just when a VPN connection is established by the end-user. For this tunnel to be created without user interaction certificate-based authentication is used.
This facilitates things like
Patch management,
Upgrades,
Communication with Active Directory domain controllers,
Allows computers to process group policy on start up,
Automatically enables Desktop and Document folder redirection ,
Endpoint OS login scripts requiring corporate network connectivity will also benefit from this feature.
The Network Visibility Module (NVM) provides a continuous stream of high-value endpoint telemetry, enabling organizations to monitor endpoint and user behaviors on their networks. It gathers flow data from endpoints both on- and off-premises, along with essential context such as users, applications, devices, locations, and destinations. This data is cached and sent to the Network Visibility Module Collector when the endpoint is connected to a trusted network (either the corporate network on-premises or via VPN).
The Network Visibility Module Collector is a server that receives Internet Protocol Flow Information Export (IPFIX) data, optionally filters it, and then exports it to Cisco Secure Network Analytics Endpoint License, syslog, or collectors like Splunk for on-premises collection. It processes received messages that adhere to the nvzFlow protocol specification and sends flow information only when on a trusted network. By default, no data is collected; data is collected only when configured in the profile. If collection occurs on an untrusted network, the data is cached and sent once the endpoint connects to a trusted network.
NVM is a core component of Cisco XDR. By installing the XDR Default Deployment on your endpoints, you can send telemetry directly to Cisco XDR without the need for an on-premises collector. Cisco XDR uses this data to create new detections, correlate multiple events into a single incident, and fill visibility gaps in your network.