Document
Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.0

Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.0

A Firepower Threat Defense (FTD) device is a Next Generation Firewall (NGFW) that provides secure gateway capabilities similar

Related articles

London Clear Sky Chart Best VPNs Reviewed By Experts: Top Services for 2024 Cloud Forest : 5 reasons to revisit Top 10 Best Cloud VPN Providers in 2024 Configure Microsoft Defender for Endpoint on iOS features

A Firepower Threat Defense (FTD) device is a Next Generation Firewall (NGFW) that provides secure gateway capabilities similar
to the ASA. FTD devices support Remote Access VPN (RA VPN) using the AnyConnect Secure Mobility Client only, no other clients,
or clientless VPN access is supported. Tunnel establishment and connectivity are done with IPsec IKEv2 or SSL. IKEv1 is not
supported when connecting to an FTD device.

Windows, macOS, and Linux AnyConnect clients are configured on the FTD headend and deployed upon
connectivity; giving remote users the benefits of an SSL or IKEv2 IPsec VPN client
without the need for client software installation and configuration. In the case of a
previously installed client, when the user authenticates, the FTD headend examines the
revision of the client, and upgrades the client as necessary.

Without a previously installed client, remote users enter the IP address of an interface configured to download and install
the AnyConnect client. The FTD headend downloads and installs the client that matches the operating system of the remote computer,
and establishes a secure connection.

AnyConnect apps Apple iOS Android devices installed platform app store . They is require require minimum configuration
establish connectivity FTD headend . headend devices environments , alternative deployment methods ,
described chapter , distribute AnyConnect software .

Currently, only the core AnyConnect VPN module and the AnyConnect VPN Profile can be configured on the FTD and distributed
to endpoints. A Remote Access VPN Policy wizard in the Firepower Management Center (FMC) quickly and easily sets up these
basic VPN capabilities.

Guidelines Limitations AnyConnect FTD

  • The only supported VPN client is the Cisco AnyConnect Secure Mobility Client. No other clients or native VPNs are supported.
    Clientless VPN is not supported as its own entity; it is only used to deploy the AnyConnect Client.

  • Using AnyConnect with FTD requires version 4.0 or later of AnyConnect, and version 6.2.1 or later of the FMC.

  • There is no inherent support for the AnyConnect Profile Editor in the FMC; you must configure the VPN profiles independently.
    The VPN Profile and AnyConnect VPN package are added as File Objects in the FMC, which become part of the RA VPN configuration.

  • Secure Mobility, Network Access Management, and all the other AnyConnect modules and their profiles beyond the core VPN capabilities
    are not currently supported.

  • VPN Load balancing is not supported.

  • Browser Proxy is not supported.

  • All posture variants (HostScan, Endpoint Posture Assessment, and ISE) and Dynamic Access Policies based on the client posture
    are not supported.

  • The Firepower Threat Defense device does not configure or deploy the files necessary to customize or localize AnyConnect.

  • Features requiring Custom Attributes AnyConnect Client supported FTD : Deferred Upgrade desktop
    clients – App VPN mobile clients .

  • Authentication cannot be done on the FTD headend locally; therefore, configured users are not available for remote connections,
    and the FTD cannot act as a Certificate Authority. Also, the following authentication features are not supported:

    • Secondary or double authentication

    • Single Sign-on using SAML 2.0

    • TACACS , Kerberos ( KCD Authentication ) RSA SDI

    • LDAP Authorization (LDAP Attribute Map)

    • RADIUS CoA