RADIUSwith CAS Configuration - Cisco FTD RSA Ready SecurID Access Implementation Guide
2 years ago
Originally Published: 2019-01-25

This section contains instructions on how to integrate CiscoFTD with RSA Cloud Authentication Service using RADIUS.

Architecture Diagram

arch-diag-radius-cas_624x403.png

RSA Cloud Authentication Service

To configure RADIUS for Cloud Authentication Service for use with a RADIUS client, you must first configure a RADIUS client in the RSA SecurID Access Console.

Logon to the RSA Cloud Administrative Console and browse to Authentication Clients > RADIUS > Add RADIUS Client and enter the Name, IP Address and Shared Secret.

Click Publish.

 

Cisco FTD

Follow the steps in this section to configure Cisco FTD as a RADIUS client to RSA Cloud Authentication Service.

Procedure

1. Logon to Cisco Firepower Management Center and browse to ObjectsObject Management > RADIUS Server Group and click Add RADIUS Server Group.rad-cas-1_624x396.png

2. Enter a Name for the server group and click + to add a RADIUS server.

rad-am-2_624x301.png

3. Configure the RADIUS server settings and click Save.

rad-cas-3_624x458.png

  • IP Address/Hostname - Enter the hostname or IP address of your RSA Identity Router.
  • Authentication Port - Enter 1812.
  • Key - Enter the RADIUS shared secret to match as entered in the RADIUS client in RSA Cloud Administation Console.

4. (Optional) click + to add RADIUS servers for any RSA Authentication Manager replica servers.

rad-cas-4_624x458.png

5. Click to Save the RADIUS Server Group.

rad-cas-5_624x458.png

 

Next Step: Proceed to the Use Case Configuration Summary section for information on how to apply the RADIUS configuration to your use case.