AAAFirewall Rule - Cisco ASA RSA Ready SecurID Access Implementation Guide
2 years ago
Originally Published: 2018-11-13

Follow the instruction steps in this section to apply your RADIUS or Authentication Agent configuration to Cisco ASA AAA Firewall Rule.

 

Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.

Procedure

1. Login to Cisco ASDM and browse to Configuration > FirewallAAA Rules and click AddAdd Authentication Rule...

use case configuration firewall 1_624x209.png

2. Select an Authentication Agent or RADIUS  AAA Server Group, configure the rest of your rule settings and click OK.

use case configuration firewall 2_624x301.png

Note:  When securing traffic other than HTTP. Telnet or SSH the user will have to authenticate with ASA using one of these protocols in order to satisfy the AAA rule.  See the Known Issues section for more information.

3. Click Apply.

use case configuration firewall 3_624x53.png

Configuration is complete.

User Experience

Authentication Agent - In this case an AAA Firewall Rule triggers authentication using HTTP.

use case configuration aaa-firewall user experience 1_624x297.png

Return to the main page for more certification related information.