Windows Routing and Remote Access Service - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide
This article describes how to integrate Cloud Access Service (CAS) with Windows Routing and Remote Access Service (RRAS) using RADIUS.
Configure CAS
Perform these steps to configure CAS using RADIUS.
Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to Authentication Clients > RADIUS.
- Click Add RADIUS Client and Profiles.
- On the RADIUS Client page, enter the following:
- Name: Enter a descriptive name for the RADIUS client (Windows RRAS server).
- IP Address: Enter the IP address of the RADIUS client (Windows RRAS IP address).
- Shared Secret: Create and enter a secure shared secret. This secret will be used for secure communication between the RADIUS client and the RADIUS server.
- Click Save and Next Step, and then click Finish to complete the configuration.
- Click Publish Changes to apply your changes to the RADIUS server and wait for the process to be completed.
Notes
- CAS RADIUS server is configured to listen on UDP port 1812.
- Shared Secret must be an alphanumeric string between 1 and 31 characters in length and is case-sensitive.
Configure Windows RRAS
Perform these steps to configure Windows RRAS.
Procedure
- Log on to the RRAS Windows server.
- Open the Routing and Remote Access configuration on the server.
- In the left pane, right-click the server name and click Properties.
- On the Server Properties page, navigate to the Security tab.
- Under Authentication provider, choose RADIUS Authentication.
- On the same window, click Configure next to RADIUS Authentication.
- On the Configure window, click Add to add the RSA RADIUS server details.
- On the Add RADIUS Server window, enter the details of the RADIUS server and click OK.
- Server name: Name for the RSA RADIUS server.
- Shared secret: RADIUS secret between the RADIUS client and server. This should match the secret configured in RSA.
- Time-out: Increase the timeout to 15 seconds.
- Port: Leave port 1812 as the default port used for RADIUS.
- In the Security tab, click Authentication Methods.
- Select the Unencrypted password (PAP) checkbox and click OK.
Note: The VPN client used should also be configured to use PAP to match what is configured in RRAS.
In the preceding screenshot, a pre-shared key (PSK) was used for L2TP/IPsec for simplicity. This should match the PSK configured in the VPN client.
The configuration is complete.
Related Articles
Windows Routing and Remote Access Service - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 4Number of Views Windows Routing and Remote Access Service - RSA Ready Implementation Guide 2Number of Views Add a Persistent IPv6 Static Route 9Number of Views BeyondTrust Privileged Remote Access - RSA Ready Implementation Guide 66Number of Views Add a Persistent IPv4 Static Route 31Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?