Prerequisites
- Full Admin user role. For more information, see Manage Accounts.
- Gather IP or CIDR addresses for your private resources.
- If you will specify resource addresses using domain names (FQDNs), you must add at least one internal DNS server that can route traffic to your resource. For more information, see Add DNS Servers.
- For each resource, you must choose connection options. For descriptions of the options, see the topics under Manage Connections to Private Destinations.
- If you will enable Zero Trust Access for the resource:
- Meet the requirements in Requirements for Zero Trust Access.
- To allow client-based Zero Trust Access and inspect traffic using the Intrusion Prevention (IPS), file inspection, and file type blocking features, you must provide the resource's certificate to Secure Access so that Secure Access can display it to end-user devices.
- Cisco recommends using a certificate signed by a publicly recognized certificate authority (CA).
- If you will enable browser-based zero trust access using SSH or Remote Desktop (RDP), see Allow SSH and RDP Access to Private Resources.
-
Plan your private resource configurations to avoid configuration conflicts such as unintentional duplicate or overlapping addresses.
For example, if a resource can be reached using multiple addresses, decide in advance whether you will create a single resource with multiple addresses or multiple resources. For more information about this particular scenario, see Private Resource Configuration Examples.