Skip to main content
Cisco Meraki Documentation

Cisco Secure Connect - Zero Trust Access Policies

Configuring Zero Trust Access Policies  

Edit section

Once all prerequisites are met, follow the Application configuration and Access Policy creation process outlined below. Zero trust Access policy is found at Secure Connect -> Policies -> Zero Trust Access.

clipboard_e1a9ffdb04975b48885b9dbe846046f5e.png

Related Pages

Example Zero Trust Access Policy

clipboard_ecab63b8fbdb5ab698895477e5e21b774.png

Step 1: Application configuration 

To configure an application for ZTNA access, please follow the steps outlined here

Step 2: Posture Profile configuration: 

Please follow the steps outlined here to configure a posture profile for browser access policies. 

Step 3: Zero Trust Access Policy:   

  1. Navigate to Secure Connect->Policies-> Zero Trust Access
  2. In the upper right corner, click +Add Rule
  3. In the Name window, type a Name for the rule
  4. Select an Action, Allow or Deny
  5. Select Group and/or Users

clipboard_e5f4949e72864b31461216969a4df7a4b.png

  1. Choose the Resource and/or Resource Groups evaluated with this policy.

clipboard_eeb95e7ea11228b5287b7caf25d77371e.png

  1. (Optional) Select a Posture Profile for client and/or browser-based ZTNA

clipboard_eb72c897c69a4784f664bbcd5b357ae78.png

  1. Click Save