Follow the instruction steps in this section to apply your RADIUS or Authentication Agent configuration to Cisco ASA AAA Firewall Rule.
Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.
Procedure
1. Login to Cisco ASDM and browse to Configuration > Firewall > AAA Rules and click Add > Add Authentication Rule...
2. Select an Authentication Agent or RADIUS AAA Server Group, configure the rest of your rule settings and click OK.
Note: When securing traffic other than HTTP. Telnet or SSH the user will have to authenticate with ASA using one of these protocols in order to satisfy the AAA rule. See the Known Issues section for more information.
3. Click Apply.
Configuration is complete.
User Experience
Authentication Agent - In this case an AAA Firewall Rule triggers authentication using HTTP.
Return to the main page for more certification related information.
Related Articles
Cisco FTD - RSASecurID Access Implementation Guide 69Number of Views AdminAccess - Cisco ASA RSA Ready SecurID Access Implementation Guide 26Number of Views Cisco ASA - RSASecurID Access Implementation Guide 186Number of Views RSA Announces the RSA SecurID SDK 2.5 for iOS Release 15Number of Views RADIUSwith CAS Configuration - Cisco FTD RSA Ready SecurID Access Implementation Guide 31Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA announces the availability of the RSA SecurID Hardware Appliance 230 based on the Dell PowerEdge R240 Server How to troubleshoot Oracle database ORA-04030 errors in RSA Identity Governance & Lifecycle RSA Authentication Manager Upgrade Process Microsoft SQL Server Collectors can no longer connect to the SQL Server database after upgrade to Microsoft SQL Server 201…