- *BASICS*
- The Knox Ecosystem
- White Paper
- Samsung Knox Portal
- Knox Cloud Services
- General Knox Support
- Knox Licenses
- *FOR IT ADMINS*
- Knox Admin Portal
- Knox Suite
- Knox Platform for Enterprise
- Introduction
- How-to videos
- Before you begin
- Get started with UEMs
- Introduction
- Blackberry UEM
- Citrix Endpoint Management
- FAMOC
- IBM MaaS360
- Microsoft Intune
- MobileIron Cloud
- MobileIron Core
- Samsung Knox Manage
- SOTI MobiControl
- VMware Workspace ONE UEM
- Knox Service Plugin
- Release notes
- Migrate to Android 11
- FAQs
- Troubleshoot
- KBAs
- Knox Mobile Enrollment
- Introduction
- How-to videos
- Get started
- Features
- Register resellers
- Add an admin
- Create profiles
- Google device owner support
- MDM compatibility matrices
- Device users
- Activity log
- Enroll and unenroll devices
- Configure devices
- Provide KME feedback
- Use the Knox Deployment App (KDA)
- Recover Google FRP locked devices using KME
- Role-based access control (RBAC)
- Release notes
- FAQs
- Troubleshoot
- KBAs
- On-Premise
- Knox Configure
- Mobile
- Wearables
- Shared Device
- KBAs
- Knox Capture
- Introduction
- How it works
- How-to videos
- IT admins: Get started
- Getting started with Knox Capture
- Step 1: Launch Knox Capture
- Step 2: Create a scanning profile
- Step 3: Select apps and activities
- Step 4: Configure the scanner
- Step 5: Set keystroke output rules
- Step 6: Test apps in your configuration
- Step 7: Share your configuration
- Step 8: Deploy Knox Capture in Managed mode
- End users: Get started
- Features
- Release notes
- FAQs
- Troubleshoot
- Knox Asset Intelligence
- Knox Manage
- Introduction
- How-to videos
- Get started
- Video: Getting started with Knox Manage
- Integration with Managed Service Provider
- Access Knox Manage
- Configure basic environments
- Create user accounts
- Create groups
- Create organization
- Set up devices and profiles
- Set up Knox Manage deployment with a Knox Suite license
- Manage Chromebooks
- Manage Android devices with the Android Management API
- Manage Shared iPads
- Configure
- Licenses
- Organization
- Users
- Sync user information
- Groups
- Devices
- Content
- Applications
- View applications
- Add applications
- Introduction
- Add internal Android and iOS applications
- Add internal Windows applications
- Add public applications using Google Play Store
- Add public applications using iOS App Store
- Add public applications using Managed Google Play
- Add public applications using Managed Google Play Private
- Add public applications using Managed Google Play Store Private Web
- Add public applications using Microsoft Store
- Add Chrome OS applications
- Assign applications
- Introduction
- Assign internal Android and iOS apps
- Assign iOS App Store applications
- Assign Google Play applications
- Assign Managed Google Play applications
- Assign Managed Google Play Private applications
- Assign Managed Google Play public web apps
- Assign Windows applications
- Assign Chrome OS applications
- Manage applications
- Volume Purchase Program for iOS
- Profile
- Knox E-FOTA
- Certificates
- Advanced settings
- Monitor
- Kiosk devices
- Knox Remote Support
- Active Directory
- Microsoft Exchange
- Mobile Admin
- Appendix
- Release notes
- Features
- FAQs
- KBAs
- Knox E-FOTA
- Introduction
- How-to videos
- Get started
- Features
- EMM integration
- Appendix
- Release notes
- FAQs
- KBAs
- Troubleshoot
- Knox E-FOTA On-Premises
- Legacy Knox E-FOTA products
- Knox Guard
- Introduction
- How-to video
- Get started
- Using Knox Guard
- Dashboard
- Manage devices
- Introduction
- Accept or reject devices
- Upload devices
- Delete devices
- Complete payment
- Send payment overdue notification
- Enable or disable SIM control
- Download devices as CSV
- View device log
- View device deletion log
- Start and stop blinking reminder
- Lock and unlock devices
- Update lock message
- Send relock timestamp
- Turn on/off relock reminder
- Manage policies
- Manage licenses
- Manage resellers
- Manage admins and roles
- Activity log
- Knox Deployment App
- Release notes
- FAQs
- KBAs
- Support
- Samsung Care+ for Business
- *FOR RESELLERS*
- Knox Deployment Program
- *FOR MANAGED SERVICE PROVIDERS*
- Knox MSP Program
How to configure the VPN profile uploaded to AnyConnect using KSP
Environment
- Knox Manage (KM)
- Android Enterprise (AE)
- Knox Service Plugin (KSP)
Overview
The following description is a guide on how to configure the VPN profile uploaded to the AnyConnect application using KSP.
The description describes the detailed steps in the points:
- Adding Cisco AnyConnect application
- Configuration of VPN profile in KSP
Adding Cisco AnyConnect application
Add AnyConnect apps to the managed apps within the Manage Google Play Store in Knox Manage.
More information on how to add, manage and assign applications can be found here.
Configuration of VPN profile in KSP
- Go to Profiles menu > Samsung Knox > Knox Service Plugin
In Knox Service Plugin, depending on the activation mode of Android Enterprise, select either Device-wide policies*, or Work profile policies.
*Note: Does not work in personal space for Android 11 devices using Work Profile On Company-Owned mode.
Follow the steps below to configure the VPN profile for Device Owner mode:
- Go to Device-wide policies > Enable Device policy controls change False button to True button
- Go to VPN (Premium) > Enable VPN controls change False button to True button. You choose Selected Apps (Per-app)
- Go to Manage list of apps that use VPN > Select apps in the main user enter the packed name web browser application. This example uses Chrome Browser:com.android.chrome
- Go to Name of VPN profile to use and enter the name of the profile that you will create later in the configuration. In this example it is ciscovpn
There is a similar configuration for the Work profile, in which case you must first select a policy for the settings Work profile policies (Profile Owner).
The following steps are a continuation of the VPN configuration for a particular VPN vendor.
- Go for VPN profiles (Premium)
- Go to Profile name - enter the profile name from the basic VPN setting. In the example, this is ciscovpn
- Vendor - select Cisco Any Connect
- Host - enter the address of the ASA Cisco server
- VPN connection type - select SSL or IPsec. In the example, the connection is of SSL type.
In this example, you do not use the Proxy configuration and leave the option as False. The last setting is the configuration for the AnyConnect client by connection type.
- Go to authentication - For SSL connection type, select EAP-AnyConnect
Depending on the configuration of the Cisco ASA, the others should be filled in according to the requirements of your company's VPN connection configuration. In the example configuration, the fields are blank.