


Source of authentication that enables users to sign in to the client. To connect to services, Cisco Jabber requires the following information:


It helps to have an ASA handy to test your config statements and to have a good understanding of Firepower flex config. You have to figure out how to do it with flex config policies of you are using Firepower. You can find Cisco config examples for the ASA. Since Windows 10 will not query ISP resolver when connected to vpn, query is sent to internal resolvers which reply with nxdomain until you add the external records. Target is the public address of your expe. You have to apply a custom inspection type class and policy-map to the global policy using flex config.Īdd srv and A records for _collab-edge._ to internal domain controllers. The gateway has to filter the query but allow all others. Windows 10 machine will never query an ISP resolver if it can reach the Domain Controllers via vpn.įilter dns queries in the vpn gateway for_cisco-uds._. The problem is that the preferred dns setting in vpn group-policy has no effect for Windows domain members. I solved this very problem for a customer in December using a 1000 series Firepower appliance running 6.7 managed with FDM. This setup would allow staff to maintain an active call and stay registered even if the vpn drops for some reason. I read that you want to enable split tunnelling with tunnel-exclude enabled in the vpn group-policy to allow Jabber to bypass the tunnel and connect directly to your Expressway Edge using Expressway Mobile Remote Access (MRA).
