Software Secure Access
Activity Manage

Cisco Secure Access Help Manage Network Tunnel Groups Add a Network Tunnel Group What to do Next

Last updated: Aug 07, 2025

What to do Next

Configure Tunnels on a Network Device

  1. Follow the steps in one of the network device guides to deploy an IPsec tunnel with Secure Access. For more information see Network Tunnel Configuration.
  2. For redundancy, the network device must connect to both the primary and secondary tunnel. For more information, see Throughput and Multiple Tunnels and Failover for Branch Connections in Secure Access Data Centers.

Verify Tunnel Traffic in Secure Access

After you add a tunnel to Cisco Secure Access and deploy a network tunnel with a compatible network device, check that Secure Access receives and logs traffic from the tunnel.

  1. Navigate to Overview and find your configured tunnel. Verify that the status of the tunnel is Active. For more information, see Secure Access Overview.