0 cisco asa configuration, 1 procedure 1: create new radius server instance, Cisco asa configuration – HID Cisco ASA and 4TRESS AAA Server User Manual

Page 4: Procedure 1: create new radius server instance

Advertising
background image

ActivIdentity 4TRESS AAA Web Tokens and Cisco ASA | Integration Handbook

P 4

External Use | June 8, 2012 | © 2012 ActivIdentity

2.0 Cisco ASA Configuration

This chapter describes how to manage a Cisco ASA. When a user signs into a Cisco ASA appliance, the Cisco

ASA forwards the user’s credentials to this authentication server to verify the user’s identity. You will create one

authentication server (an ActivIdentity 4TRESS AAA RADIUS Server) to validate the user’s one-time password

generated by a Web soft token.

2.1

Procedure 1: Create New Radius Server Instance

When using an external RADIUS server to authenticate Cisco ASA users, you must configure the server to

recognize the Cisco ASA as a client and specify a shared secret for the RADIUS server to use to authenticate the

client request.
To configure a connection to the RADIUS server on a Cisco ASA SSL VPN appliance and to define the RADIUS

Server instance, perform the following steps.

Getting Started

1. In the ASDM console, navigate to

Configuration-> Remote Access

VPN -> AAA/Local User, and then click AAA Server Groups.

2. Click

Add at the far right of the page displayed.


The nearby dialog is displayed.

3. Enter a

Server Group name, and then select RADIUS for the

Protocol.

4. Click

OK.

Repeat the process to add a backup RADIUS server.


Advertising