This section describes how to integrate RSA Cloud Authentication Service with Cisco Nexus using RADIUS Client.
Procedure
- Access your Cloud Administration Console and go to Authentication Clients > RADIUS.
- Choose your Authentication Details according to your needs and environment.
Click the Cloud Authentication Service validates password and applies access policy for additional authentication option for LDAP + RSA Authentication method and the Cloud Authentication Service only applies access policy for additional authentication option for only RSA authentication method. - Add new RADIUS profile with Cisco AVPAIR and set it according to the required role configured on the Nexus, for example, network-admin.
If you want to add multiple roles, you can separate them with space inside the “ “.
Note: you can change network-admin to any role you want according to what is configured on the Nexus, by default the network-admin role gives full read-write privileges on the switch.
Nexus Configuration with RSA Cloud Authentication Service
Procedure
- Configure RADIUS Servers with the Shared secret and the port (You can configure more than one like below if you have more than one Identity router in your environment) , the below IP addresses should refer to the management interface of the identity routers. You must use port 1812 here.
KAPACNEXUS001# configure terminal
KAPACNEXUS001(config)# radius-server host 192.168.10.57 key 0 support1! auth-port 1812
KAPACNEXUS001(config)# radius-server host 10.50.100.57 key 0 support1! auth-port 1812
- Configure new AAA group with group RADIUS
KAPACNEXUS001(config)# aaa group server radius RSA
KAPACNEXUS001(config-radius)# server 192.168.10.57
KAPACNEXUS001(config-radius)# server 10.50.100.57
- Configure AAA Authentication to use RADIUS group for remote access or console
KAPACNEXUS001(config)# aaa authentication login default group RSA local
KAPACNEXUS001(config)# aaa authentication login console group RSA local
Note:- You must add a fallback method as done above by adding local as a fallback in case the RADIUS server is marked as dead by the switch to prevent lockdown to accessing the switch.
- You can also configure timeout value for the RADIUS servers configured, The timeout interval determines how long the Cisco NX-OS device waits for responses from RADIUS servers before declaring a timeout failure, it is advisable to increase it especially in flow having biometrics and approve.
KAPACNEXUS001(config)# radius-server host 192.168.100.50 timeout 60 retransmit 1
Configuration is complete.
Return to the main page.
Related Articles
Cisco Nexus 9000v RSA Ready Implementation Guide 84Number of Views Canon Authorized Send - RSA Ready Implementation Guide 5Number of Views Cisco Nexus 9000v - Login Screenshots - RSA Ready Implementation Guide 12Number of Views Cisco ASA - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 21Number of Views Cisco Adaptive Security Appliance (ASA) - RSA Ready Implementation Guide 20Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide