AnyConnect | XML

The mostly used VPN software from Cisco is probably Cisco AnyConnect Secure Mobility Client and it is a pretty sharp tool. The simple view of client is really impressive and productive.


Whenever I want to connect to my VPN host I will type my VPN host address in the text of VPN client and click connect. Its pretty easy when we are using only one VPN profile. It will remember our last used setting/profile details with it. But when I need to switch to another VPN network, I have to delete the VPN host address and retype the new VPN host address. I have searched in Internet and found how to set the multiple profile in VPN client.

To set multiple profile in Cisco AnyConnect VPN client. We have to add a xml config file with name “Profile.xml”.


The file has to be placed in the following path (Windows):

C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Profile

Profile.xml:

This is a simple example of one VPN host with login.


Profile2.xml:

Another example, in this case, we have two differents VPN hosts.


Profile3.xml:

Here you can modify some variables - ie: auto connect on start, auto update (if you have configured), Timeout, Block Untrusted Servers, ...


Profile4.xml:

In the script above, we can use a Backup Server List - very useful.


Or if you like the easy way, you can download the "VPN Profile Editor" tool and make your own XML custom.


240 views0 comments

Recent Posts

See All

Umbrella VA

What is Umbrella VA and how it works? 🤔 Umbrella virtual appliances (VAs) are lightweight virtual machines that are compatible with VMWare ESX/ESXi, Windows Hyper-V, and KVM hypervisors and the Micro

The configuration register

The configuration register is a special 16 bits value and can be used to change router behavior in several ways, such as: ▸How the router boots (into ROMmon, NetBoot); ▸Options while booting (ignore c

FTD factory reset

⧽ Technology Overview: Cisco FTD is a threat-focused, next-gen firewall (NGFW) with unified management. It provides advanced threat protection before, during and after attacks. NGFWs use a variety of