This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Integrations

  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Integrations
  • :
  • RADIUS with AM Configuration - Cisco FTD RSA Ready SecurID Access Implementation Guide
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

RADIUS with AM Configuration - Cisco FTD RSA Ready SecurID Access Implementation Guide

This section contains instructions on how to integrate Cisco FTD with RSA Authentication Manager using RADIUS.

Architecture Diagram

arch-diag-radius-am_624x403.png

RSA Authentication Manager

To configure your RSA Authentication Manager for use with a RADIUS Agent, you must configure a RADIUS client and a corresponding agent host record in the Authentication Manager Security Console.

The relationship of agent host record to RADIUS client in the Authentication Manager can 1 to 1, 1 to many or 1 to all (global).

RSA Authentication Manager listens on ports UDP 1645 and UDP 1812.

 

Cisco FTD

Follow the steps in this section to configure Cisco FTD as a RADIUS client to RSA Authentication Manager.

Procedure

1. Logon to Cisco Firepower Management Center and browse to Objects > Object Management > RADIUS Server Group and click Add RADIUS Server Group.

rad-am-1_624x396.png

 

2. Enter a Name for the server group and click + to add a RADIUS server.

rad-cas-2_624x458.png

3. Configure the RADIUS server settings and click Save.

rad-am-3_624x458.png

  • IP Address/Hostname - Enter the hostname or IP address of your RSA Authentication Manager server.
  • Authentication Port - Enter either 1645 or 1812.
  • Key - Enter the RADIUS shared secret to match as entered in the RADIUS client in RSA Authentication Manager Security Console.

4. (Optional) click + to add RADIUS servers for any RSA Authentication Manager replica servers.

rad-am-4_624x458.png

5. Click to Save the RADIUS Server Group.

rad-am-5_624x458.png

 

Next Step: Proceed to the Use Case Configuration Summary section for information on how to apply the RADIUS configuration to your use case.


Labels (1)
Labels:
  • Integrations

Tags (5)
  • Integration
  • Integrations
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
1 Like
Was this article helpful? Yes No
Share
No ratings
Version history
Last update:
‎2019-01-25 02:51 PM
Updated by:
RSA-IDD-Legacy Beginner
Contributors
  • RSA-IDD-Legacy
    RSA-IDD-Legacy

Related Content

Article Dashboard
  • Article History
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.