This article describes how to integrate Cisco ASA with RSA Cloud Authentication Service using RADIUS.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using RADIUS.
Procedure
- Sign in to the RSA Cloud Administrative Console and browse to Authentication Clients > RADIUS.
- Click Add RADIUS Client and Profiles and enter:
- Enter Name.
- IP Address - The IP address of the RADIUS Client that is ASA Firewall. The IP address will be of the ASA’s interface that sources the RADIUS request.
- Shared Secret.
- Click Save and Next Step and click Publish Changes.
Notes
The IP address of the ASA’s interface can be determined using:
- The
Show iporShow Interfacecommand on CLI of the ASA firewall. - Or from the Web UI of CDO, which is the cloud management platform for ASA.
Enable the Message authenticator attribute option on the configured radius client for Blast-RADIUS (CVE-2024-3596) Protocol Spoofing Mitigation by using the following steps:
- Sign in to the Cloud Authentication Console and navigate to Authentication Clients > RADIUS.
- Edit the RADIUS client and enable Message authenticator attribute.
The identity router configured for the testing included two IP addresses (management and portal).
This guide was prepared by setting up the ASA with an internal (inside) network and an external (outside) interface. The outside interface was configured as a VPN server. Cisco AnyConnect VPN Client was used to connect to the VPN server (ASA) and authenticated using the RSA identity solutions.
Configure Cisco ASA
Perform these steps to configure Cisco ASA.
Procedure
- Sign in to Cisco Defense Orchestrator (CDO) and browse to Objects.
- Click Create Object in the upper-right corner.
- To create the RADIUS Server Group, select Identity Source.
- Define the Object Name, select the Device Type as ASA, choose RADIUS Server Group, and click Continue to add a server to the group.
- Click + to create RADIUS AAA Server.
- Click Create New RADIUS Server.
- Provide the following details:
- Device Type: Select ASA.
- Server Name or IP Address: Enter the Radius Server Name or management IP address of your RSA Identity Router.
- Timeout (seconds): Set to 10 seconds (default).
- Authentication Port: Set to 1812.
- Server Secret Key: Enter the RADIUS shared secret. It must match the secret as entered in the RSA Cloud Administration Console.
- Click Save.
- Select the newly created RADIUS server and click Select.
- Sign in to CDO, browse to VPN > ASA/FDM Remote Access VPN Configuration > AnyConnect Connection Profiles and edit your profile.
- For RADIUS, select AAA Only in the Authentication Type drop-down list and select your AAA Server Group in the Primary Identity Source for User Authentication drop-down list.
- Click Continue.
Note:
This guide focuses on Configuring RADIUS component needed for the authentication of the VPN user. For AnyConnect VPN configuration, refer to Cisco documentation:
https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/215442-configure-anyconnect-management-vpn-tunn.html
The configuration is complete.
Return to Cisco Adaptive Security Appliance (ASA) - RSA Ready Implementation Guide.
Related Articles
SSOAgent - SAMLConfiguration - Cisco ASA RSA Ready SecurID Access Implementation Guide 23Number of Views Authentication Agent Configuration - Cisco ASA RSA Ready SecurID Access Implementation Guide 60Number of Views Cisco ASA - RSASecurID Access Implementation Guide 185Number of Views AdminAccess - Cisco ASA RSA Ready SecurID Access Implementation Guide 26Number of Views Cisco ASA - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 21Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle