Follow the instruction steps in this section to apply your RADIUS or Authentication Agent configuration to Cisco ASA AAA Firewall Rule.
Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.
Procedure
1. Login to Cisco ASDM and browse to Configuration > Firewall > AAA Rules and click Add > Add Authentication Rule...
2. Select an Authentication Agent or RADIUS AAA Server Group, configure the rest of your rule settings and click OK.
Note: When securing traffic other than HTTP. Telnet or SSH the user will have to authenticate with ASA using one of these protocols in order to satisfy the AAA rule. See the Known Issues section for more information.
3. Click Apply.
Configuration is complete.
User Experience
Authentication Agent - In this case an AAA Firewall Rule triggers authentication using HTTP.
Return to the main page for more certification related information.
Related Articles
Cisco FTD - RSASecurID Access Implementation Guide 69Number of Views AdminAccess - Cisco ASA RSA Ready SecurID Access Implementation Guide 26Number of Views SSOAgent - SAMLConfiguration - Cisco ASA RSA Ready SecurID Access Implementation Guide 23Number of Views Cisco ASA - RSASecurID Access Implementation Guide 185Number of Views Authentication Agent Configuration - Cisco ASA RSA Ready SecurID Access Implementation Guide 60Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle