Software Secure Access
Activity Manage

Procedure

Before you begin

  • Ensure your Chromebook is updated to Version 126 or later versions. For more information, look for the 'DEVICE_IP_ADDRESSES' term in the DnsOverHttpsTemplatesWithIdentifiersdocumentation.
  • Ensure that your Chromebooks are configured with a Managed Network as the 'DEVICE_IP_ADDRESSES' variable is supported only for Managed Networks. For more information on setting up Managed Networks, see the Set up networks for managed devices guide.

Procedure

1

From Secure Access, navigate to Connect > End User Connectivity.

2

On the End User Connectivity page, click the Internet Security tab.

3

In the Deployment options section, click the ChromeOS tab.

4

In the Chromebook Configuration section, click View.

5

In the Configure Chromebooks window, click Copy to take a copy of the necessary DoH template URL. Then, add the 'DEVICE_IP_ADDRESSES' placeholder into the DoH template as illustrated in the example URLs below:

Default DoH Template:

https://doh.sse.cisco.com/identity/v1/20292:4f444e53010000099997f7e840002147${USER_EMAIL}40002143${USER_EMAIL}${DEVICE_IP_ADDRESSES}/dns-query

Managed Guest/Public Session DoH Template:

https://doh.sse.cisco.com/identity/v1/20292:4f444e53010000099997f7e840002143${DEVICE_SERIAL_NUMBER}${DEVICE_IP_ADDRESSES}/dns-query

 

This is a sample URL. Use the actual DoH template from your organization's Secure Access dashboard, ensuring the DEVICE_IP_ADDRESSES placeholder is enclosed within ${} without any spaces.

6

In the Google Admin console, navigate to Devices > Chrome > Settings > Users & browser settings, choose the organizational unit (OU) on which you want to apply the template configuration, and select DNS-over-HTTPS with Identifiers.

7

Enter the updated DoH template to the OU.


 
We recommend that you test enabling reporting for Private IP Address of Chromebook with a separate test OU before deployment.

After updating the DoH template, your Chromebook device is configured to report their private IP addresses to Secure Access. For assistance, contact Contact Cisco Secure Access Support.