Always On Anyconnect



-->

Always On VPN can natively define one or more DNS suffixes as part of the VPN connection and IP address assignment process, including corporate resource name resolution for short names, FQDNs, or entire DNS namespaces. Always On VPN also supports the use of Name Resolution Policy Tables to provide namespace-specific resolution granularity. .Texas A&M Health VPN Note: If you are accessing the Texas A&M Health VPN only, follow the instructions for connecting through the Texas A&M Health Virtual Private Network for either Windows or macOS using the Cisco AnyConnect client.

Applies To: Windows Server (Semi-Annual Channel), Windows Server 2016, Windows 10

In this topic, you learn about the features and functionalities of Always On VPN. The following table is not an exhaustive list, however, it does include some of the most common features and functionalities used in remote access solutions.

Tip

Always

If you currently use DirectAccess, we recommend that you investigate the Always On VPN functionality carefully to determine if it addresses all of your remote access needs before migrating from DirectAccess to Always On VPN.

Functional areaAlways On VPN
Seamless, transparent connectivity to the corporate network.You can configure Always On VPN to support auto-triggering based on application launch or namespace resolution requests.

Define using:
VPNv2/ProfileName/AlwaysOn
VPNv2/ProfileName/AppTriggerList
VPNv2/ProfileName/DomainNameInformationList/AutoTrigger

Use of a dedicated Infrastructure Tunnel to provide connectivity for users not signed into the corporate network.You can achieve this functionality by using the Device Tunnel feature in the VPN profile.

Note:
Device Tunnel can only be configured on domain-joined devices using IKEv2 with computer certificate authentication.

Define using:
VPNv2/ProfileName/DeviceTunnel

Use of manage-out to allow remote connectivity to clients from management systems located on the corporate network.You can achieve this functionality by using the Device Tunnel feature in the VPN profile combined with configuring the VPN connection to dynamically register the IP addresses assigned to the VPN interface with internal DNS services.

Note:
If you turn on traffic filters in the Device Tunnel profile, then the Device Tunnel denies inbound traffic (from the corporate network to the client).

Define using:
VPNv2/ProfileName/DeviceTunnel
VPNv2/ProfileName/RegisterDNS

Fall back when clients are behind firewalls or proxy servers.You can configure to fall back to SSTP (from IKEv2) by using the automatic tunnel/protocol type within the VPN profile.

Note:
User Tunnel supports SSTP and IKEv2, and Device Tunnel supports IKEv2 only with no support for SSTP fallback.

Define using:
VPNv2/ProfileName/NativeProfile/NativeProtocolType

Support for end-to-edge access mode.Always On VPN provides connectivity to corporate resources by using tunnel policies that require authentication and encryption until they reach the VPN gateway. By default, the tunnel sessions terminate at the VPN gateway, which also functions as the IKEv2 gateway, providing end-to-edge security.
Support for machine certificate authentication.The IKEv2 protocol type available as part of the Always On VPN platform specifically supports the use of machine or computer certificates for VPN authentication.

Note:
IKEv2 is the only supported protocol for Device Tunnel and there is no support option for SSTP fallback.

Define using:
VPNv2/ProfileName/NativeProfile/Authentication/MachineMethod

Use security groups to limit remote access functionality to specific clients.You can configure Always On VPN to support granular authorization when using RADIUS, which includes the use of security groups to control VPN access.
Support for servers behind an edge firewall or NAT device.Always On VPN gives you the ability to use protocols like IKEv2 and SSTP that fully support the use of a VPN gateway that is behind a NAT device or edge firewall.

Note:
User Tunnel supports SSTP and IKEv2, and Device Tunnel supports IKEv2 only with no support for SSTP fallback.

Ability to determine intranet connectivity when connected to the corporate network.Trusted network detection provides the capability to detect corporate network connections, and it is based on an assessment of the connection-specific DNS suffix assigned to network interfaces and network profile.

Define using:
VPNv2/ProfileName/TrustedNetworkDetection

Compliance using Network Access Protection (NAP).The Always On VPN client can integrate with Azure conditional access to enforce MFA, device compliance, or a combination of both. When compliant with conditional access policies, Azure AD issues a short-lived (by default, 60 minutes) IPsec authentication certificate that the client can then use to authenticate to the VPN gateway. Device compliance takes advantage of Configuration Manager/Intune compliance policies, which can include the device health attestation state. At this time, Azure VPN conditional access provides the closest replacement to the existing NAP solution, although there is no form of remediation service or quarantine network capabilities. For more details, see VPN and conditional access.

Define using:
VPNv2/ProfileName/DeviceCompliance

Ability to define which management servers are accessible before user sign-in.You can achieve this functionality in Always On VPN by using the Device Tunnel feature (available in version 1709 – for IKEv2 only) in the VPN profile combined with traffic filters to control which management systems on the corporate network are accessible through the Device Tunnel.

Note:
If you turn on traffic filters in the Device Tunnel profile, then the Device Tunnel denies inbound traffic (from the corporate network to the client).

Define using:
VPNv2/ProfileName/DeviceTunnel
VPNv2/ProfileName/TrafficFilterList

Additional functionalities

Each item in this section is a use case scenario or commonly used remote access functionality for which Always On VPN has improved functionality—either through an expansion of functionality or elimination of a previous limitation.

Cisco Asa Always On Vpn

Functional areaAlways On VPN
Domain-joined devices with Enterprise SKUs requirement.Always On VPN supports domain-joined, nondomain-joined (workgroup), or Azure AD–joined devices to allow for both enterprise and BYOD scenarios. Always On VPN is available in all Windows editions, and the platform features are available to third parties by way of UWP VPN plug-in support.

Note:
Device Tunnel can only be configured on domain-joined devices running Windows 10 Enterprise or Education version 1709 or later. There is no support for third-party control of the Device Tunnel.

Support for both IPv4 and IPv6.With Always On VPN, users can access both IPv4 and IPv6 resources on the corporate network. The Always On VPN client uses a dual-stack approach that doesn't specifically depend on IPv6 or the need for the VPN gateway to provide NAT64 or DNS64 translation services.
Support for two-factor or OTP authentication.The Always On VPN platform natively supports EAP, which allows for the use of diverse Microsoft and third-party EAP types as part of the authentication workflow. Always On VPN specifically supports smart card (both physical and virtual) and Windows Hello for Business certificates to satisfy two-factor authentication requirements. Also, Always On VPN supports OTP through MFA (not supported natively, only supported on third-party plugins) by way of EAP RADIUS integration.

Define using:
VPNv2/ProfileName/NativeProfile/Authentication

Support for multiple domains and forests.The Always On VPN platform has no dependency on Active Directory Domain Services (AD DS) forests or domain topology (or associated functional/schema levels) because it doesn't require the VPN client to be domain joined to function. Group Policy is therefore not a dependency to define VPN profile settings because you do not use it during client configuration. Where Active Directory authorization integration is required, you can achieve it through RADIUS as part of the EAP authentication and authorization process.
Support for both split and force tunnel for internet/intranet traffic separation.You can configure Always On VPN to support both force tunnel (the default operating mode) and split tunnel natively. Always On VPN provides additional granularity for application-specific routing policies.

Note:
Force Tunnel is supported by User Tunnel only. No other VPN Tunnels can be active in parallel to a Force Tunnel User Tunnel.

Define using:

VPNv2/ProfileName/NativeProfile/RoutingPolicyType
VPNv2/ProfileName/TrafficFilterList/App/RoutingPolicyType

Multiple protocol support.Always On VPN can be configured to support SSTP natively if Secure Sockets Layer fallback from IKEv2 is required.

Note:
User Tunnel supports SSTP and IKEv2, and Device Tunnel supports IKEv2 only with no support for SSTP fallback.

Connectivity Assistant to provide corporate connectivity status.Always On VPN is fully integrated with the native Network Connectivity Assistant and provides connectivity status from the View All Networks interface. With the advent of Windows 10 Creators Update (version 1703), VPN connection status and VPN connection control for User Tunnel are now available through the Network flyout (for the Windows built-in VPN client), as well.
Name resolution of corporate resources using short-name, fully qualified domain name (FQDN), and DNS suffix.Always On VPN can natively define one or more DNS suffixes as part of the VPN connection and IP address assignment process, including corporate resource name resolution for short names, FQDNs, or entire DNS namespaces. Always On VPN also supports the use of Name Resolution Policy Tables to provide namespace-specific resolution granularity.

Note:
Avoid the use of Global Suffixes as they interfere with shortname resolution when using Name Resolution Policy tables.

Define using:
VPNv2/ProfileName/DnsSuffix
VPNv2/ProfileName/DomainNameInformationList

Next steps

-->

Applies to: Windows Server (Semi-Annual Channel), Windows Server 2016, Windows 10

Always On VPN has many benefits over the Windows VPN solutions of the past. The following key improvements align Always On VPN with Microsoft's cloud-first, mobile-first vision:

  • Platform Integration: Always On VPN has improved integration with the Windows operating system and third-party solutions to provide a robust platform for countless advanced connection scenarios.

  • Security: Always On VPN has new, advanced security capabilities to restrict the type of traffic, which applications can use the VPN connection, and which authentication methods you can use to initiate the connection. When the connection is active most of the time, it is especially important to secure the connection. For more details, see VPN authentication options.

  • VPN Connectivity: Always On VPN, with or without Device Tunnel provides auto-trigger capability. Before Always On VPN, the ability to trigger an automatic connection through either user or device authentication was not possible.

  • Networking control: Always On VPN allows administrators to specify routing policies at a more granular level—even down to the individual application—which is perfect for line-of-business (LOB) apps that require special remote access. Always On VPN is also fully compatible with both Internet Protocol version 4 (IPv4) and version 6 (IPv6). Unlike DirectAccess, there is no specific dependency on IPv6.

    Note

    Before you get started, make sure to enable IPv6 on the VPN server. Otherwise, a connection cannot be established and an error message displays.

  • Configuration and compatibility: Always On VPN can be deployed and managed several ways, which gives Always On VPN several advantages over the other VPN client software.

Platform integration

Anyconnect Always On Feature

Microsoft has introduced or improved the following integration capabilities in Always On VPN:

Key improvementDescription
Windows Information Protection (WIP)Integration with WIP allows network policy enforcement to determine whether traffic is permitted to go over the VPN. If the user profile is active and WIP policies are applied, Always On VPN is automatically triggered to connect. Also, when you use WIP, there's no need to specify AppTriggerList and TrafficFilterList rules separately in the VPN profile (unless you want more advanced configuration) because the WIP policies and application lists automatically take effect.
Windows Hello for BusinessAlways On VPN natively supports Windows Hello for Business (in certificate-based authentication mode) to provide a seamless single sign-on experience for both sign-in to the machine and connection to the VPN. Therefore, no secondary authentication (user credentials) is needed for the VPN connection, making it possible to use an Always On connection with Windows Hello for Business authentication.
Microsoft Azure conditional accessThe Always On VPN client can integrate with the Azure conditional access platform to enforce multifactor authentication (MFA), device compliance, or a combination of the two. When compliant with conditional access policies, Azure Active Directory (Azure AD) issues a short-lived (by default, 60 minutes) IP Security (IPsec) authentication certificate that can then be used to authenticate to the VPN gateway. Device compliance uses Configuration Manager/Intune compliance policies, which can include the device health attestation state as part of the connection compliance check.
Azure MFAWhen combined with Remote Authentication Dial-In User Service (RADIUS) services and the Network Policy Server (NPS) extension for Azure MFA, VPN authentication can use strong MFA.
Third-party VPN plug-inWith the Universal Windows Platform (UWP), third-party VPN providers can create a single application for the full range of Windows 10 devices. The UWP provides a guaranteed core API layer across devices, eliminating the complexity of and problems often associated with writing kernel-level drivers. Currently, Windows 10 UWP VPN plug-ins exist for Pulse Secure, F5 Access, Check Point Capsule VPN, FortiClient, SonicWall Mobile Connect, and GlobalProtect; no doubt, others will appear in the future.

Security

The primary improvements in security are in the following areas:

Key improvementDescription
Traffic filtersThrough traffic filters, you can specify client-side policies that determine which traffic is allowed into the corporate network. In this way, administrators can apply app or traffic restrictions on the VPN interface, limiting its use to specific sources, destination ports, and IP addresses. Two types of filtering rules are available:
  • App-based rules. App-based firewall rules are based on a list of specified applications so that only traffic originating from these apps are permitted to go over the VPN interface.
  • Traffic-based rules. Traffic-based firewall rules are based on network requirements like ports, addresses, and protocols. Use these rules only for traffic that matches these specific conditions are permitted to go over the VPN interface.

    Note:
    These rules apply only to traffic outbound from the device. Use of Traffic filters blocks inbound traffic from the corporate network to the client.

Per-App VPNPer-App VPN is like having an app-based traffic filter, but it goes farther to combine application triggers with an app-based traffic filter so that VPN connectivity is constrained to a specific application as opposed to all applications on the VPN client. The feature automatically initiates when the app starts.
Support for customized IPsec cryptography algorithmsAlways On VPN supports the use of both RSA and elliptic curve cryptography–based custom cryptographic algorithms to meet stringent government or organizational security policies.
Native Extensible Authentication Protocol (EAP) supportAlways On VPN natively supports EAP, which allows you to use a diverse set of Microsoft and third-party EAP types as part of the authentication workflow. EAP provides secure authentication based on the following authentication types:
  • Username and password
  • Smart card (both physical and virtual)
  • User certificates
  • Windows Hello for Business
  • MFA support by way of EAP RADIUS integration
The application vendor controls third-party UWP VPN plug-in authentication methods, although they have an array of available options, including custom credential types and OTP support.

VPN connectivity

The following are the primary improvements in Always On VPN connectivity:

Key improvementDescription
Always OnAlways On is a Windows 10 feature that enables the active VPN profile to connect automatically and remain connected based on triggers—namely, user sign-in, network state change, or device screen active. Always On is also integrated into the connected standby experience to maximize battery life.
Application triggeringYou can configure VPN profiles in Windows 10 to connect automatically on the launch of a specified set of applications. You can configure both desktop and UWP applications to trigger a VPN connection.
Name-based triggeringWith Always On VPN, you can define rules so that specific domain name queries trigger the VPN connection. Windows 10 now supports name-based triggering for domain-joined and nondomain-joined machines (previously, only nondomain-joined machines were supported).
Trusted network detectionAlways On VPN includes this feature to ensure that VPN connectivity is not triggered if a user is connected to a trusted network within the corporate boundary. You can combine this feature with any of the triggering methods mentioned earlier to provide a seamless 'only connect when needed' user experience.
Device TunnelAlways On VPN gives you the ability to create a dedicated VPN profile for device or machine. Unlike User Tunnel, which only connects after a user logs on to the device or machine, Device Tunnel allows the VPN to establish connectivity before user sign-in. Both Device Tunnel and User Tunnel operate independently with their VPN profiles, can be connected at the same time, and can use different authentication methods and other VPN configuration settings as appropriate.

Networking

Always On Anyconnect

The following are some of the networking improvements in Always On VPN:

Key improvementDescription
Dual-stack support for IPv4 and IPv6Always On VPN natively supports the use of both IPv4 and IPv6 in a dual-stack approach. It has no specific dependency on one protocol over the other, which allows for maximum IPv4/IPv6 application compatibility combined with support for future IPv6 networking needs.

Note: Before you get started, make sure to enable IPv6 on the VPN server. Otherwise, a connection cannot be established and an error message displays.

Application-specific routing policiesIn addition to defining global VPN connection routing policies for internet and intranet traffic separation, it is possible to add routing policies to control the use of split tunnel or force tunnel configurations on a per-application basis. This option gives you more granular control over which apps are allowed to interact with which resources through the VPN tunnel.
Exclusion routesAlways On VPN supports the ability to specify exclusion routes that specifically control routing behavior to define which traffic should traverse the VPN only and not go over the physical network interface.

Notes:
- Exclusion routes currently work for traffic within the same subnet as the client, for example, LinkLocal.
- Exclusion routes only work in a Split Tunnel setup.

Anyconnect Always On Split Tunnel

Configuration and compatibility

Cisco Anyconnect Always Tunnel

The following are some of the configuration and compatibility improvements in Always On VPN:

Anyconnect

Always On Anyconnect Mac

Key improvementDescription
Third-party VPN gateway compatibilityThe Always On VPN client does not require the use of a Microsoft-based VPN gateway to operate. Through the support of the IKEv2 protocol, the client facilitates interoperability with third-party VPN gateways that support this industry-standard tunneling type. You can also achieve interoperability with third-party VPN gateways by using a UWP VPN plug-in combined with a custom tunneling type without sacrificing Always On VPN platform features and benefits.

Note:
Consult with your gateway or third-party back-end appliance vendor on configurations and compatibility with Always On VPN and Device Tunnel using IKEv2.

Industry-standard IKEv2 VPN protocol supportThe Always On VPN client supports IKEv2, one of today's most widely used industry-standard tunneling protocols. This compatibility maximizes interoperability with third-party VPN gateways.
Platform supportAlways On VPN supports domain-joined, nondomain-joined (workgroup), or Azure AD–joined devices to allow for both enterprises and bring your own device (BYOD) scenarios. Also, Always On VPN is available in all Windows editions.
Diverse management and deployment mechanismsYou can use many management and deployment mechanisms to manage VPN settings (called a VPN profile), including Windows PowerShell, Microsoft Endpoint Configuration Manager, Intune or third-party mobile device management (MDM) tool, and Windows Configuration Designer. These options simplify the configuration of Always On VPN regardless of the client management tools you use.
Standardized VPN profile definitionAlways On VPN supports configuration using a standard XML profile (ProfileXML), providing a standard configuration template format that most management and deployment toolsets use.

Always On Anyconnect Download

Next steps