cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
656
Views
1
Helpful
1
Comments
Venkat Tamilraj
Cisco Employee
Cisco Employee
We are excited to announce the General Availability (GA) of Trusted Network Detection (TND) for client based Zero Trust Access (ZTA) in Cisco Secure Access. This feature empowers administrators to configure Cisco Secure Client to automatically pause ZTA traffic steering and enforcement when an endpoint is connected to a trusted network. Once the endpoint leaves the trusted network, ZTA enforcement seamlessly resumes. TND settings can be independently managed for private and internet ZTA destinations, providing granular control for different network environments.
 
Packaging and Licensing
Trusted Network Detection is available as part of the Cisco Secure Access offering. No additional licensing is required for customers with active Secure Access subscriptions that include client-based ZTA functionality.
 
Key Benefits / Value Delivered
  • Optimized Performance and Reduced Latency: Temporarily pausing ZTA enforcement on trusted networks can improve network efficiency and create a smoother end-user experience.
  • Flexible Resource Utilization: Enables organizations to enforce local security policies on trusted networks while maintaining strict ZTA enforcement elsewhere.
  • Independent Configuration: Separate TND settings for private and internet destinations allow for tailored security and operational strategies.
 
Use Cases
  • Campus or Corporate Networks: Automatically suspend ZTA enforcement when users are within a highly secure corporate network, optimizing application performance and reducing authentication friction.
  • Remote and Hybrid Work: Ensure that ZTA protections are enforced only when users are outside trusted environments, balancing security with productivity for hybrid and remote users.
 
Getting Started
  1. Configuration: Define trusted network criteria and specify TND behavior for private and internet ZTA destinations.
  2. Monitor & Optimize: Review policy effectiveness and make adjustments as needed.
 
Best Practices
  • Test Before Rollout: Pilot the feature with a subset of users to ensure network policies align with your organization’s security posture.
  • Monitor Logs and Reports: Regularly review Secure Access logs to ensure that TND is functioning as expected and to identify opportunities for tuning.
  • Educate End Users: Communicate with users about the seamless experience and reinforce security awareness, especially when moving between networks.
 
Documentation and Resources
Comments
dazor
Level 1
Level 1

Can I define a Trusted Network with RFC1918 or a Public IP ?

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: