Forescout 8.0 - RADIUSwith CAS Configuration - RSA Ready SecurID Access Implementation Guide
2 years ago
Originally Published: 2019-08-23

This section describes how to integrate Forescout with RSA Cloud Authentication Service using RADIUS.

Architecture Diagram

arch-diag-radius-cas_624x403.png

Configure RSA Cloud Authentication Service

To configure RADIUS for Cloud Authentication Service for use with a RADIUS client, you must first configure a RADIUS client in the RSA SecurID Access Console.

Sin into the RSA Cloud Administrative Console and browse to Authentication Clients > RADIUS > Add RADIUS Client and enter the Name, IP Address and Shared Secret.

Click Publish.

 

Configure Forescout

Perform these steps to configure Forescout Forescout as a RADIUS client to RSA Cloud Authentication Service.

Procedure

Sign in to Forescout admin console and click OptionsTools > VPN and click Add.

int-conf-rad-am-1_624x312.png

2. Add the Cisco ASA device information and click Next.

int-conf-rad-am-2.png

3. Configure the access credentials for the Cisco ASA and click Next.

int-conf-rad-am-3_624x598.png

4. Configure the RSA Authentication Manager RADIUS settings and click Finish.

  1. Local RADIUS Port: This should match the RADIUS port as configured on Cisco ASA.
  2. RADIUS Server Address: Enter the IP address of the RSA Identity Router.
  3. RADIUS Server Port: Enter 1812.
  4. RADIUS Shared Secret: Enter the RADIUS shared secret as specified in the RADIUS client in RSA Cloud Administration Console.

int-conf-rad-am-4_624x560.png

5. Click Options from the VPN pane, change RADIUS Server Timeout to 60 and click OK.

int-conf-rad-cas-5_624x452.png

 

Configuration is complete

 

Return to the main page for more certification related information.