<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure Access Always On in Secure Access Discussions</title>
    <link>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5551975#M189</link>
    <description>&lt;P&gt;check this article and sub chapters. these destinations should be exempted from VPN:&lt;BR /&gt;&lt;A href="https://securitydocs.cisco.com/docs/csa/olh/118928.dita" rel="noopener" target="_blank"&gt;Network Requirements for Secure Access&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 May 2026 06:38:32 GMT</pubDate>
    <dc:creator>cludwigd</dc:creator>
    <dc:date>2026-05-11T06:38:32Z</dc:date>
    <item>
      <title>Secure Access Always On</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5549076#M174</link>
      <description>&lt;P&gt;Hello everyone,&lt;BR /&gt;We are currently conducting an Always On Test in Secure Access. When the PC is turned on, all internet connectivity is blocked, and after enforcing SSL VPN, the internet becomes available once the VPN is connected.&lt;BR /&gt;In the VPN profile settings, we have verified that through auto VPN-related configurations, internet access is allowed on trusted networks, and blocked on untrusted networks.&lt;BR /&gt;However, when attempting to initiate VPN on an untrusted network, there is no internet connectivity, so DUO cannot perform SSO authentication. It seems like DUO SSO needs to be treated as an exception. Which setting should be configured for this?&lt;BR /&gt;Also, what is the purpose of the machine tunnel feature?&lt;BR /&gt;We would appreciate your expert advice.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 13:40:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5549076#M174</guid>
      <dc:creator>msbang</dc:creator>
      <dc:date>2026-04-29T13:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Access Always On</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5551711#M186</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;You can enable DUO SSO by registering the FQDN required for DUO SSO access in the “Accessible hosts with VPN disconnected” option of the VPN Profile.&lt;/P&gt;&lt;P&gt;For more information on “Accessible hosts with VPN disconnected,” please refer to the following link:&lt;BR /&gt;&lt;A href="https://securitydocs.cisco.com/docs/csa/olh/121141.dita" target="_blank"&gt;https://securitydocs.cisco.com/docs/csa/olh/121141.dita&lt;/A&gt;&lt;/P&gt;&lt;P&gt;For information on machine tunnels, please refer to the following link.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-access/223193-configure-machine-tunnel-on-cisco.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-access/223193-configure-machine-tunnel-on-cisco.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2026 01:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5551711#M186</guid>
      <dc:creator>nop-tk</dc:creator>
      <dc:date>2026-05-09T01:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Access Always On</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5551718#M187</link>
      <description>&lt;P&gt;Good infomartion for&amp;nbsp;&lt;SPAN&gt;DUO SSO by registering&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2026 04:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5551718#M187</guid>
      <dc:creator>iqbalfadjarudin93</dc:creator>
      <dc:date>2026-05-09T04:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Access Always On</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5551923#M188</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;Even after adding exceptions for Duo SSO, APIs, and related services, it still seems unable to retrieve the SSO authentication properly during testing.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Do you happen to know which specific domains, services, or traffic should be exempted so that SSL VPN can be enforced while the device is still offline from general internet access, but able to complete Duo SSO authentication successfully?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We would really appreciate your guidance and support on this.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 03:59:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5551923#M188</guid>
      <dc:creator>msbang</dc:creator>
      <dc:date>2026-05-11T03:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Access Always On</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5551975#M189</link>
      <description>&lt;P&gt;check this article and sub chapters. these destinations should be exempted from VPN:&lt;BR /&gt;&lt;A href="https://securitydocs.cisco.com/docs/csa/olh/118928.dita" rel="noopener" target="_blank"&gt;Network Requirements for Secure Access&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 06:38:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/secure-access-always-on/m-p/5551975#M189</guid>
      <dc:creator>cludwigd</dc:creator>
      <dc:date>2026-05-11T06:38:32Z</dc:date>
    </item>
  </channel>
</rss>

