It is assumed that the Cisco ASA is setup and operational. An existing Domain user can authenticate using a Domain AD password and access applications, your users can access through IPSec VPN and/or SSL VPN using Domain accounts.
Register DualShield Radius Server
- Launch the Cisco Adaptive Security Device Manager (ASDM), select Configuration in top toolbar, select Device Management in the accordion menu on the bottom
- In the control panel on the left, select Users/AAA and select AAA Server Groups.
- Click "Add" button on the right
- Enter Name
- Select "RADIUS" protocol
- Set "Max Failed Attempts" to 1
- Click "OK" when completed
![DualShield MFA Platform > DualShield Configuration [ASA] > image2014-4-8 17:3:26.png](/download/attachments/35946691/image2014-4-8%2017%3A3%3A26.png?version=1&modificationDate=1587385453000&api=v2)
- Select the newly created AAA server, i.e. DualShield
- Click "Add" in the "Servers in the Selected Group"
- Select "inside" interface
- Enter the IP address of the DualShield Radius Server
- Set Authentication Port to 1812
- Set Accounting Port to 1813
- Enter "Server Secret Key"
- Unselect "Microsoft CHAPv2 Capable"
- Click "OK" when completed
![DualShield MFA Platform > Cisco ASA Configuration [ASA] > image2014-4-9 19:19:13.png](/download/attachments/35946702/image2014-4-9%2019%3A19%3A13.png?version=1&modificationDate=1587385453000&api=v2)
- Click "Apply" button to save settings
Related Articles