Configure Application-Based (Per App VPN) Remote Access VPN on Mobile Devices Using Cisco Secure Firewall Management Center (2024)

First Published: July 31, 2023

About Per App VPN

When a remote user establishes a VPN connection from a mobile device using Secure Client, all the traffic including traffic from personal applications is routed through the VPN.

For mobile devices that run on Android or iOS, you can restrict the applications that traverse the VPN tunnel. This application-based remote access VPN is called Per App VPN.

To use Per App VPN, you must perform the following actions:

  1. Install and configure a third-party Mobile Device Manager (MDM) server.

  2. Define the list of approved applications that can go over the VPN tunnel in the MDM server.

  3. Deploy the Per App configurations from the MDM server to the mobile devices.

  4. Configure Per App VPN on the managed headend threat defense.

When an MDM-managed mobile device connects to the VPN using Secure Client, the client validates the applications before tunneling the traffic. The Per App policy configured on the threat defense performs this validation.

The following illustration shows an example of Per App VPN using the threat defense:

Configure Application-Based (Per App VPN) Remote Access VPN on Mobile Devices Using Cisco Secure Firewall Management Center (1)

Benefits

  • Limit VPN traffic over the corporate network and free up resources of the VPN headend. You can prevent:

    • Applications such as Netflix, Facebook, and YouTube over the VPN.

    • Trusted cloud applications such as Outlook, and Webex over the VPN.

  • Optimize traffic.

  • Minimize latency.

  • Protect the corporate VPN tunnel from unapproved malicious applications on the mobile device.

Is this Guide for You?

This use case is for network administrators who use the management center to configure Per App VPN for remote workers connecting to their organization’s network using remote access VPN.

In versions 6.4 to 6.7, you can enable Per App VPN on an FTD using FlexConfig. For more information, see Configure Application-Based (Per App) Remote Access VPN on Mobile Devices. In version 7.0 and later, you can enable Per App VPN on the threat defense using the management center UI.

System Requirements

The table below shows the supported platforms for this feature.

Product

Version

Version used in this document

Cisco Secure Firewall Threat Defense (formerly Firepower Threat Defense/FTD)

7.0 and later

7.3

Cisco Secure Firewall Management Center (formerly Firepower Management Center/FMC)

7.0 and later

7.3

Cisco Secure Client (formerly AnyConnect)

4.0 and later

5.0

Android Devices

Android 5.0 and later

-

Apple iOS devices

Apple iOS 8.3 and later

-

Prerequisites for Configuring Per App VPN Tunnels

Ensure that you have:

  • Configured a remote access VPN policy in the management center.

  • Set up an MDM server and enrolled each mobile device to the MDM server.

    For more information, see the MDM documentation.

    We recommend that you configure the applications that can traverse the VPN tunnel in the MDM server. This configuration simplifies the headend configuration.

  • Downloaded and installed the Cisco AnyConnect Enterprise Application Selector from the Cisco Software Download Center to your local host.

    You need this tool to define the Per App VPN policy.

Licenses:

  • You need one of the following Secure Client licenses:

    Secure Client Premier or Secure Client Advantage.

  • Your management center Essentials license must allow export-controlled functionality.

    Choose System > Licenses > Smart Licenses to verify this functionality in the management center.

How to Configure Per App VPN Using Management Center

Step

Do This

More Info

1

Ensure that you meet the prerequisites.

Prerequisites for Configuring Per App VPN Tunnels

2

Determine which applications should be allowed in the tunnel.

-

3

Determine the application IDs for the mobile applications.

Determine the Application IDs for Mobile Applications

4

Define a Per App VPN policy for Android and Apple iOS devices.

Define a Per App VPN Policy for Android and Apple iOS Devices

5

Assign the Per App VPN policy to a remote access VPN in the management center.

Assign the Per App VPN Policy to a Remote Access VPN in the Management Center

6

Deploy the configuration on the threat defense.

On the management center menu bar, click Deploy and then select Deployment.

Determine the Application IDs for Mobile Applications

If you decide to configure the list of allowed applications on the headend, you must determine the application IDs for each application on each type of endpoint.

Configure Application-Based (Per App VPN) Remote Access VPN on Mobile Devices Using Cisco Secure Firewall Management Center (2)

Note

We recommend that you configure the Per App policy in the MDM server. This configuration simplifies the headend configuration.

The application ID, or the bundle ID in iOS, is a reverse DNS name. You can use an asterisk as a wildcard. For example, *.* indicates all applications, com.cisco.* indicates all Cisco applications.

To determine the application IDs:

Once you have your list of application IDs, you can define the policy for the mobile device as explained in the procedure below.

Define a Per App VPN Policy for Android and Apple iOS Devices

Use the Cisco AnyConnect Enterprise Application Selector to define the Per App VPN policy.

We recommend that you create a simple ‘Allow All’ policy, and define the allowed applications in the MDM. However, you can specify a list of applications to allow and control the list from the headend. If you want to include specific applications, create a separate rule for each application, using a unique name and the application’s app ID.

To create an Allow All policy (wildcard policy) that supports both Android and iOS platforms using the AnyConnect Enterprise Application Selector:

  1. Choose Android or iOS from the drop-down list as the platform type.

  2. Configure the following options:

    • Friendly Name—Enter a name for the policy. For example, Allow_All.

    • App ID—Enter *.* to match all possible applications.

    • Leave the other options.

      Configure Application-Based (Per App VPN) Remote Access VPN on Mobile Devices Using Cisco Secure Firewall Management Center (4)

  3. Choose Policy > View Policy to get the base64 encoded string for the policy. This string contains an encrypted XML file that allows the threat defense to see the policies. Copy this value. You need this string when you configure Per App VPN on the threat defense in the next step.

    Configure Application-Based (Per App VPN) Remote Access VPN on Mobile Devices Using Cisco Secure Firewall Management Center (5)

To create a policy for the Microsoft Remote Desktop application using the AnyConnect Enterprise Application Selector:

  1. Choose Android from the drop-down list as the platform type.

  2. Configure the following options:

    • Friendly Name—Enter the policy name.

    • App ID—For Android, enter com.microsoft.rdc.androidx.

    • Leave the other options.

      Configure Application-Based (Per App VPN) Remote Access VPN on Mobile Devices Using Cisco Secure Firewall Management Center (6)

  3. Choose Policy > View Policy to get the base64 encoded string for the policy.

Assign the Per App VPN Policy to a Remote Access VPN in the Management Center

Procedure

Step1

Choose Devices > Remote Access.

Step2

Select a remote access VPN policy and click Edit.

Step3

Select a connection profile and click Edit.

Step4

Click Edit Group Policy.

Step5

Click the Secure Client tab.

Step6

Click Custom Attributes and click +.

Step7

Choose Per App VPN from the Secure Client Attribute drop-down list.

Step8

Choose an object from the Custom Attribute Object drop-down list or click + to add an object.

When you add a new custom attribute object for Per App VPN:

  1. Enter the name, and description.

  2. In the Attribute Value field, specify the base64 encoded policy string from the Cisco AnyConnect Enterprise Application Selector.

    Configure Application-Based (Per App VPN) Remote Access VPN on Mobile Devices Using Cisco Secure Firewall Management Center (7)

Step9

Click Save and click Add.

Configure Application-Based (Per App VPN) Remote Access VPN on Mobile Devices Using Cisco Secure Firewall Management Center (8)

Step10

Click Save.

What to do next

  1. Deploy the configuration on the threat defense.

  2. Establish a VPN connection to the threat defense using the Secure Client.

  3. Verify the Per App VPN configuration.

Verify Per App VPN Configuration

On the Threat Defense

Use the following commands on the threat defense to verify the Per App configuration:

Command

Description

show run webvpn

View details of the Secure Client configurations.

show run group-policy <group_policy_name>

View details of the remote access VPN group policy for Secure Client.

show vpn-sessiondb anyconnect

View details of the active Secure Client VPN sessions.

show run anyconnect-custom-data

View details of the Per App configuration.

Sample output for sh run webvpn is given below:

firepower# sh run webvpn webvpn enable inside anyconnect-custom-attr perapp description Per-App Allow http-headers hsts-server enable max-age 31536000 include-sub-domains no preload hsts-client enable x-content-type-options x-xss-protection content-security-policy anyconnect image disk0:/csm/cisco-secure-client-win-5.0.03076-webdeploy-k9 1 regex "Windows" anyconnect enable tunnel-group-list enable cache no disable error-recovery disable

Sample output for sh run anyconnect-custom-data is given below:

firepower# sh run anyconnect-custom-data anyconnect-custom-data perapp PerAppPolicyeJw9kFtvgkAQhf8K2ae2GC+rqPFNgYjgBcUL2PRhCyuuZVlkuRv/

Sample output for sh running-config group-policy is given below:

firepower# sh running-config group-policy group-policy DfltGrpPolicy attributes vpn-tunnel-protocol ikev2 ssl-client user-authentication-idle-timeout none anyconnect-custom perapp value PerAppPolicy webvpn anyconnect keep-installer none anyconnect modules value none anyconnect ask none default anyconnect http-comp none activex-relay disable file-entry disable file-browsing disable url-entry disable deny-message none

On the Endpoint

After the endpoint establishes a VPN connection with the threat defense, click the Statistics icon of the Secure Client:

  • Tunnel Mode will be “Application Tunnel” instead of “Tunnel All Traffic.”

  • Tunneled Apps will list the applications you enabled for tunneling in the MDM.

Configure Application-Based (Per App VPN) Remote Access VPN on Mobile Devices Using Cisco Secure Firewall Management Center (2024)
Top Articles
Latest Posts
Article information

Author: Margart Wisoky

Last Updated:

Views: 6138

Rating: 4.8 / 5 (78 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Margart Wisoky

Birthday: 1993-05-13

Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

Phone: +25815234346805

Job: Central Developer

Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.