Follow the instruction steps in this section to apply your RADIUS or Authentication Agent configuration to Cisco ASA AAA Firewall Rule.
Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.
Procedure
1. Login to Cisco ASDM and browse to Configuration > Firewall > AAA Rules and click Add > Add Authentication Rule...
2. Select an Authentication Agent or RADIUS AAA Server Group, configure the rest of your rule settings and click OK.
Note: When securing traffic other than HTTP. Telnet or SSH the user will have to authenticate with ASA using one of these protocols in order to satisfy the AAA rule. See the Known Issues section for more information.
3. Click Apply.
Configuration is complete.
User Experience
Authentication Agent - In this case an AAA Firewall Rule triggers authentication using HTTP.
Return to the main page for more certification related information.
Related Articles
Cisco FTD - RSASecurID Access Implementation Guide 69Number of Views AdminAccess - Cisco ASA RSA Ready SecurID Access Implementation Guide 26Number of Views Cisco ASA - RSASecurID Access Implementation Guide 185Number of Views SSOAgent - SAMLConfiguration - Cisco ASA RSA Ready SecurID Access Implementation Guide 23Number of Views RADIUSwith CAS Configuration - Cisco FTD RSA Ready SecurID Access Implementation Guide 31Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Governance & Lifecycle 8.0.0 Administrators Guide Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory