Managed iOS Cisco Security Connector: Secure Access Setup Guide Requirements

Last updated: Aug 22, 2025

Requirements

For the Cisco Security Connector:

  • iOS device must be running iOS 15.0 or higher OR must be running in supervised mode with iOS 13.2 or higher.
  • iOS device must be managed by a Mobile Device Manager (MDM) system and use one of the following Apple device managers:
    • Apple School Manager
    • Apple Business Manager
  • Five MB free space.

One of the following MDM systems:

  • Meraki System Manager (SM) with API access enabled

     
    Only System Manager and Combined network types are supported.
  • Apple Configurator 2.5 or higher
  • IBM MaaS360
  • Intune
  • Jamf
  • MobiConnect
  • MobileIron Enterprise Mobility Management (EMM) On-Prem and Cloud versions 9.4 or higher
  • Workspace ONE
  • Generic—Other MDMs may be used to manage your organization-owned iOS mobile device; however, success results may vary. For more information, see Register an iOS Device Through a Generic MDM System.

    For information about configuring your specific MDM system, see your MDM system's documentation or contact your MDM's support team.

You will also need:

  • Cisco Secure Access account.
  • Direct access to the IPv4 IP addresses 208.67.222.222 or 208.67.220.220 is required for IPv4 DNS protection on ports 53 and 443.
  • Direct access to the IPv6 IP addresses 2620:119:35::35 or 2620:119:53::53, or access to IPv4 addresses on ports 53 and 443 through NAT64/DNS64 translation is required for IPv6 DNS protection.

     
    If DNS protection fails to engage, DNS traffic is not encrypted.
  • The device must be able to communicate with registration.polaris.qq.opendns.com for registration and validation purposes at least once a day—when actively used—otherwise, the device cannot be protected.
  • Depending on the MDM, you may also require each device's serial number.