In Cisco Secure Access, there are two ways for traffic from remote users to reach private destinations: Resource Connectors or Network Tunnels.
Resource Connectors have several advantages over Network Tunnels.
Unlike Network Tunnels - which can route internet bound traffic - Resource Connectors are specifically designed for accessing private resources rather than routing all traffic. For this reason, Resource Connectors excel in scenarios where you need precise control over resource access while maintaining network segmentation, making them ideal for organizations implementing a true Zero Trust architecture.
In terms of routing, Resource Connectors have simplified connectivity and intelligent traffic management in comparison to Network Tunnels. They require only outbound connections from your network with no additional routing configuration necessary, making implementation straightforward.
Scalability is another advantage of Resource Connectors compared to Network Tunnels. When traffic demands increase, you can easily expand capacity by simply deploying additional connectors within an existing group. This modular approach allows organizations to grow their secure access infrastructure efficiently.
A final point to make note of is the low maintenance nature of Resource Connectors. They are self-maintaining with automatic software upgrades managed by Secure Access, allowing IT teams to focus on other priorities while ensuring security infrastructure remains current.
Resource Connectors can be deployed in AWS, Azure, VMWare, and now in Docker.
In this blog post, I'll walk you through the steps for deploying a Resource Connector in a Docker environment.
Docker has certain advantages over the other options.
The top reasons for choosing Docker containers for Resource Connector deployment over AWS, Azure, or VMware are cost efficiency and deployment speed. Docker containers typically cost significantly less than maintaining dedicated cloud instances while providing faster startup and implementation times. This combination makes Docker particularly appealing for organizations with budget constraints who need to quickly implement secure access solutions with minimal overhead.
Create a Resource Connector in CSA in a few easy steps.
Deploying a Docker Container is simple.
curl -o setup_connector.sh https://us.repo.acgw.sse.cisco.com/scripts/latest/setup_connector.sh
chmod +x setup_connector.sh
sudo ./setup_connector.sh
sudo /opt/connector/install/connector.sh launch --name <connector_name> --key <provisioning_key>
Resource Connectors in Docker provide a cost-effective, rapid deployment option for organizations implementing Zero Trust architecture with Cisco Secure Access. The simplified setup process demonstrated in this guide allows IT teams to quickly implement secure private resource access while maintaining network segmentation and reducing operational overhead.
Please reach out if you have any questions or comments.