All Systems Operational

About This Site

Cisco Secure Access has a global infrastructure with built in redundancy and failover routing designed to minimize any planned or unplanned outages.

Secure Access provides complete transparency so you can always see the current status of all the Secure Access cloud services.

API Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Branch to Branch Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Branch to Internet Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
CASB Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Dashboard Operational
Global Operational
Client-based ZTNA Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Clientless ZTNA Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Cloud Malware Detection Operational
Global Operational
DLP Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
DNS Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Identity Operational
Global Operational
Logging Export Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
RA-VPN to Branch Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
RA-VPN to Internet/SaaS Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
RBI Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Reporting Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Resource Connector Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Roaming Client to Internet Operational
Asia Operational
Australia Operational
Europe Operational
North America Operational
South America Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Past Incidents
Sep 8, 2024

No incidents reported today.

Sep 7, 2024

No incidents reported.

Sep 6, 2024

No incidents reported.

Sep 5, 2024

No incidents reported.

Sep 4, 2024

No incidents reported.

Sep 3, 2024

No incidents reported.

Sep 2, 2024
Resolved - This incident has been resolved.
Sep 2, 17:53 UTC
Investigating - We are currently investigating an issue affecting the creation of new VPN profiles for the first time within the Cisco Secure Access Dashboard/UI. Customers with existing VPN profiles are not impacted.

We will provide updates periodically and as new information becomes available.

Sep 2, 17:26 UTC
Sep 1, 2024

No incidents reported.

Aug 31, 2024

No incidents reported.

Aug 30, 2024
Resolved - This incident has been resolved.
Aug 30, 20:36 UTC
Investigating - The Secure Access SAML certificate used for user identification will expire on the 13th of September 2024 19:24:58 (UTC). You must renew the VPN Service Provider SAML certificate before it expires on 13th September 2024.

If currently using SAML Request Validation within your IdP, you must download the new Service Provider certificate, update your IdP with this new certificate, and activate the certificate on the Cisco Secure Access dashboard within 24 hours before the current certificate expires. Failure to do this will result in SAML user authentication and connection failures.

For steps to renew, please see, https://docs.sse.cisco.com/sse-user-guide/docs/manage-certificate-rotation

Note
• Some Identity Providers do not perform validation of SAML request signatures and therefore do not require our new certificate. However, we suggest activating new certificate to dismiss the expiry notifications. Please contact your Identity Provider vendor for confirmation.

• If you have multiple Secure Access orgs linked to the same identity provider, you should add the new certificate to each IdP configuration.

For future notifications you can subscribe to the Cisco Community page at the link below.
https://community.cisco.com/t5/secure-access-announcements/tkb-p/secure-access-announcements

Regards,
Secure Access Support team

Aug 30, 20:35 UTC
Aug 29, 2024
Completed - The scheduled maintenance has been completed.
Aug 29, 12:00 UTC
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Aug 29, 00:00 UTC
Scheduled - We are performing maintenance on our Cisco Secure Access Remote Browser Isolation infrastructure. Remote Browser Isolation may be unavailable in the North Americas region for some or all of the maintenance window. Customer traffic will be rerouted to the Secure Web Gateway and policies other than Remote Browser Isolation policies will be applied. We're sorry for any inconvenience this may cause.
Aug 28, 16:31 UTC
Resolved - This incident has been resolved.
Aug 29, 11:38 UTC
Investigating - We are currently investigating an issue that may have prevented new connections from ZTNA, Remote-Access VPN and Site-to-Site tunnels creation.
The issue was limited to certain regions only: ap-southeast3, ap-northeast1, us-west-2
Existing connections were not affected.

Aug 29, 10:58 UTC
Aug 28, 2024

No incidents reported.

Aug 27, 2024

No incidents reported.

Aug 26, 2024

No incidents reported.

Aug 25, 2024
Resolved - This incident has been resolved.
Aug 25, 13:57 UTC
Identified - We have identified the cause of this issue and remediation efforts are underway. We will provide updates periodically and when new information is available, until our service is restored
Aug 25, 11:47 UTC
Investigating - We are currently investigating an issue affecting SAML SSO configuration to be saved on the Dashboard. We will provide updates periodically and when new information is available.
Aug 25, 08:04 UTC