top of page

AnyConnect | XML

The mostly used VPN software from Cisco is probably Cisco AnyConnect Secure Mobility Client and it is a pretty sharp tool. The simple view of client is really impressive and productive.


Whenever I want to connect to my VPN host I will type my VPN host address in the text of VPN client and click connect. Its pretty easy when we are using only one VPN profile. It will remember our last used setting/profile details with it. But when I need to switch to another VPN network, I have to delete the VPN host address and retype the new VPN host address. I have searched in Internet and found how to set the multiple profile in VPN client.

To set multiple profile in Cisco AnyConnect VPN client. We have to add a xml config file with name “Profile.xml”.


The file has to be placed in the following path (Windows):

C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Profile

Profile.xml:

This is a simple example of one VPN host with login.


Profile2.xml:

Another example, in this case, we have two differents VPN hosts.


Profile3.xml:

Here you can modify some variables - ie: auto connect on start, auto update (if you have configured), Timeout, Block Untrusted Servers, ...


Profile4.xml:

In the script above, we can use a Backup Server List - very useful.


Or if you like the easy way, you can download the "VPN Profile Editor" tool and make your own XML custom.


2,608 views0 comments

Recent Posts

See All

Securing IOS-XE Routing Protocols

Securing the routing information prevents an attacker from introducing false routing information into the network, which could be used as part of a Denial of Service (DoS) or Man-in-the-Middle (MiTM)

Cisco Duo Log Sync (DLS)

Duologsync (DLS) is a utility written by Duo Security that supports fetching logs from Duo endpoints and ingesting them to different SIEMs. Logging: A logging filepath can be specified in config.yml.

Umbrella VA logging to Remote Syslog Server

Syslog is a protocol that computer systems use to send event data logs to a central location for storage. Logs can then be accessed by analysis and reporting software to perform audits, monitoring, tr

bottom of page