• Introduction
  • Get Started
  • Manage Security Devices
  • Configure Devices And Services
    • Configure Cloud-delivered Firewall Management Center-Managed Secure Firewall Threat Defense
    • Configure Secure Firewall ASA Devices
    • Configure On-Premises Firewall Management Center-Managed Secure Firewall Threat Defense Devices
    • Configure Cisco Umbrella Tunnel Configuration
    • Configure Amazon Web Services Virtual Private Cloud
    • Configure Cisco Meraki
    • Configure Cisco IOS
    • Configure SSH Devices
    • Configure FDM-Managed Devices
      • Managing FDM-Managed Devices with Firewall in Security Cloud Control
      • Interfaces
      • Synchronizing Interfaces Added to a Firepower Device using FXOS
      • Routing
      • Manage Objects
      • Manage Security Policies in Security Cloud Control
      • FDM Policy Configuration
      • Configure Virtual Private Network Management
        • Introduction to Site-to-Site Virtual Private Network
        • Introduction to Remote Access Virtual Private Network
          • Introduction to Remote Access Virtual Private Network
      • Templates
      • Backing Up FDM-Managed Devices
      • FDM-Managed High Availability
      • FDM-Managed Device Settings
      • Create a REST API Macro
      • Update FDM-Managed Device Security Databases
    • Cisco Secure Dynamic Attributes Connector
  • Migrate Devices
  • Establish Secure Connections
  • Manage Device Configuration
  • Monitor and Analyze
  • Optimize Network Security and Efficiency with AI
  • Troubleshoot
  • Appendix

Introduction to Remote Access Virtual Private Network

Remote Access virtual Private Network (RA VPN) capability enables users to connect to your network from a location outside the physical office premises. This means that they can use a computer or a supported iOS/Android device that is connected to the internet and access your network resources securely. This feature is particularly useful for mobile workers who need to connect from their home network or a public Wi-Fi network while ensuring that their data remains safe and protected.

  • Introduction to Remote Access Virtual Private Network
Related Information:
  • Configure Remote Access Virtual Private Network for ASA

  • Configuring Remote Access VPN for an FTD


Copyright © 2025, Cisco Systems, Inc. All rights reserved.