Announcement: New Knowledge Base

4 June 2020: We are pleased to announce the launch of a new Knowledge Base, Changelogs for Business Security Products, where you can find more details, such as bugfixes or new features, about the most recent releases of our business-related products.

Cisco VPN client / F-secure Client security 9



One of my customers are currently using client security on hosts in their HQ. The firewall profile used by all their hosts is "Office" in Policy manager 9.


Now when they connect laptops using mobile broadband + VPN they cannot access any of their internal resources, all traffic seems to be blocked.


Would really appreciate if someone could "point me in the right direction" and explain how to configure this correctly.


I myself am using Citrix Access Gateway as VPN client + Client security and this works fine. The active profile used when I connect to my company, is "Office". Actually I don´t think it changes at all regardless of how I connect, it´s always "Office".


Am I correct assuming that when the customer connects via VPN, they should use the profile called "Mobile", or use a "customized office profile" as I think is the case with my PC?


If they should use "Mobile", must I edit this / add rules for it to allow the traffic needed for them to reach their resources, e.g. remote control (RDP), access to file shares and so on? Maybe using info from the action.log file which traffic has been blocked?



Thanks in advance!



Best Answer

  • JakeJake Posts: 77
    Accepted Answer



    Basically, both options work.

    Personally I would probably use "Security level autoselection" and define conditions for "Office" profile and then use the modified "Mobile" security as a fallback rule with both Methods set to Always.


This discussion has been closed.