<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Loading Cisco Secure Client on FTD firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/loading-cisco-secure-client-on-ftd-firewall/m-p/5133636#M1113635</link>
    <description>&lt;P&gt;You always use the pkg file on the VPN headend. As &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1481123"&gt;@ccieexpert&lt;/a&gt; noted, the group policy associated with the VPN connection controls where any modules beyond the default (Core and VPN) are downloaded, as well as their associated profiles (if any).&lt;/P&gt;</description>
    <pubDate>Wed, 19 Jun 2024 13:03:55 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2024-06-19T13:03:55Z</dc:date>
    <item>
      <title>Loading Cisco Secure Client on FTD firewall</title>
      <link>https://community.cisco.com/t5/network-security/loading-cisco-secure-client-on-ftd-firewall/m-p/5133415#M1113622</link>
      <description>&lt;P&gt;I would like to install the new cisco secure client 5.1.4-74, which will auto update when remote users log in. However I would only like to install the vpn client, and not the rest of the msi's that are loaded in the&amp;nbsp;cisco-secure-client-win-5.1.4.74-webdeploy-k9.pkg. Is there a way to, strip out the other MSI's and just install the vpn client?&lt;/P&gt;&lt;P&gt;When trying to load the client through FMC, with file type of Secure Client Image, the default extension is listed as .pkg(see attached pic.)&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 23:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/loading-cisco-secure-client-on-ftd-firewall/m-p/5133415#M1113622</guid>
      <dc:creator>DEENA VERAPPAN</dc:creator>
      <dc:date>2024-06-18T23:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Loading Cisco Secure Client on FTD firewall</title>
      <link>https://community.cisco.com/t5/network-security/loading-cisco-secure-client-on-ftd-firewall/m-p/5133422#M1113623</link>
      <description>&lt;P&gt;Why do you want to strip out the other modules ? you control from FMC group policy what modules you want pushed to the client.. i dont see a valid reason to remove it from the package.. The package is a compressed archive format, and can be opened using 7zip etc.. and i was able to remove executables... but i am not sure if Cisco checks the hash etc of the pkg with something inside or some other method... i dont have a fmc handy to test it out... but would like to hear from you on the use case before we dig into further ?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 23:35:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/loading-cisco-secure-client-on-ftd-firewall/m-p/5133422#M1113623</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-06-18T23:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: Loading Cisco Secure Client on FTD firewall</title>
      <link>https://community.cisco.com/t5/network-security/loading-cisco-secure-client-on-ftd-firewall/m-p/5133636#M1113635</link>
      <description>&lt;P&gt;You always use the pkg file on the VPN headend. As &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1481123"&gt;@ccieexpert&lt;/a&gt; noted, the group policy associated with the VPN connection controls where any modules beyond the default (Core and VPN) are downloaded, as well as their associated profiles (if any).&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 13:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/loading-cisco-secure-client-on-ftd-firewall/m-p/5133636#M1113635</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-06-19T13:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: Loading Cisco Secure Client on FTD firewall</title>
      <link>https://community.cisco.com/t5/network-security/loading-cisco-secure-client-on-ftd-firewall/m-p/5133777#M1113650</link>
      <description>&lt;P&gt;Thank you for the feedback. I wasn't expecting to see all the other modules as part of the package. Looking at the Group Policy, I could see where I'm able to select the modules to be implemented.&lt;/P&gt;&lt;P&gt;Thank you again, appreciate the support.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 22:25:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/loading-cisco-secure-client-on-ftd-firewall/m-p/5133777#M1113650</guid>
      <dc:creator>DEENA VERAPPAN</dc:creator>
      <dc:date>2024-06-19T22:25:25Z</dc:date>
    </item>
  </channel>
</rss>

