This section describes how to integrate RSA Cloud Authentication Service with Cisco Nexus using RADIUS Client.
Procedure
- Access your Cloud Administration Console and go to Authentication Clients > RADIUS.
- Choose your Authentication Details according to your needs and environment.
Click the Cloud Authentication Service validates password and applies access policy for additional authentication option for LDAP + RSA Authentication method and the Cloud Authentication Service only applies access policy for additional authentication option for only RSA authentication method. - Add new RADIUS profile with Cisco AVPAIR and set it according to the required role configured on the Nexus, for example, network-admin.
If you want to add multiple roles, you can separate them with space inside the “ “.
Note: you can change network-admin to any role you want according to what is configured on the Nexus, by default the network-admin role gives full read-write privileges on the switch.
Nexus Configuration with RSA Cloud Authentication Service
Procedure
- Configure RADIUS Servers with the Shared secret and the port (You can configure more than one like below if you have more than one Identity router in your environment) , the below IP addresses should refer to the management interface of the identity routers. You must use port 1812 here.
KAPACNEXUS001# configure terminal
KAPACNEXUS001(config)# radius-server host 192.168.10.57 key 0 support1! auth-port 1812
KAPACNEXUS001(config)# radius-server host 10.50.100.57 key 0 support1! auth-port 1812
- Configure new AAA group with group RADIUS
KAPACNEXUS001(config)# aaa group server radius RSA
KAPACNEXUS001(config-radius)# server 192.168.10.57
KAPACNEXUS001(config-radius)# server 10.50.100.57
- Configure AAA Authentication to use RADIUS group for remote access or console
KAPACNEXUS001(config)# aaa authentication login default group RSA local
KAPACNEXUS001(config)# aaa authentication login console group RSA local
Note:- You must add a fallback method as done above by adding local as a fallback in case the RADIUS server is marked as dead by the switch to prevent lockdown to accessing the switch.
- You can also configure timeout value for the RADIUS servers configured, The timeout interval determines how long the Cisco NX-OS device waits for responses from RADIUS servers before declaring a timeout failure, it is advisable to increase it especially in flow having biometrics and approve.
KAPACNEXUS001(config)# radius-server host 192.168.100.50 timeout 60 retransmit 1
Configuration is complete.
Return to the main page.
Related Articles
Cisco Nexus 9000v RSA Ready Implementation Guide 84Number of Views Cisco Nexus 9000v - Login Screenshots - RSA Ready Implementation Guide 11Number of Views Canon Authorized Send - RSA Ready Implementation Guide 5Number of Views Cisco Adaptive Security Appliance (ASA) - RSA Ready Implementation Guide 18Number of Views Cisco ASA - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 21Number of Views
Trending Articles
RSA Release Notes for RSA Authentication Manager 8.8 RSA MFA Agent 2.4.3 for Microsoft Windows Group Policy Object Template Guide RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA MFA Agent 2.4.3 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026)