AAA Firewall Rule - Cisco ASA RSA Ready SecurID Access Implementation Guide

Document created by RSA Information Design and Development on Nov 13, 2018Last modified by RSA Information Design and Development on Dec 3, 2018
Version 5Show Document
  • View in full screen mode

Follow the instruction steps in this section to apply your RADIUS or Authentication Agent configuration to Cisco ASA AAA Firewall Rule.

 

Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.

Procedure

1. Login to Cisco ASDM and browse to Configuration > FirewallAAA Rules and click AddAdd Authentication Rule...

2. Select an Authentication Agent or RADIUS  AAA Server Group, configure the rest of your rule settings and click OK.

Note:  When securing traffic other than HTTP. Telnet or SSH the user will have to authenticate with ASA using one of these protocols in order to satisfy the AAA rule.  See the Known Issues section for more information.

3. Click Apply.

Configuration is complete.

User Experience

Authentication Agent - In this case an AAA Firewall Rule triggers authentication using HTTP.

Return to the main page for more certification related information.

 

Attachments

    Outcomes