peruwhe.blogg.se

Cisco vpn setup secondary radius authentication server
Cisco vpn setup secondary radius authentication server













cisco vpn setup secondary radius authentication server

Interface Name – select the interface that will handle communication with the MFA Server.Leave the default settings except for the following.Select the server group you just created. Leave the default settings except for the followingĪAA Server Group – specify a name to identify the group for the MFA serverĪdd AAA Server(s) to your AAA Server GroupĬlick OK to return to the Cisco ASDM console, shown in step 2, above.Ĭick Remote Access VPN and navigate to AAA/Local Users > AAA Server Groups. The Add AAA Server Group screen opens, as shown below. Navigate to Configuration > Remote Access VPN > AAA/Local users > AAA server groups, as shown below.Sign in to the Cisco ASDM console for the VPN appliance with sufficient privileges.Ensure that you have the common UDP port and secret key values available.Modify the An圜onnect Client Profile to extend the timeout.Modify the An圜onnect Connection Profile to use the AAA Server Group.Add AAA Server(s) to your AAA Server Group.During this task we will define a RADIUS Server Profile, define an Authentication Profile for Okta RADIUS Agent, apply the Okta RADIUS Authentication Profile to a Gateway, and configure the portal to use the Okta RADIUS Authentication Profile.















Cisco vpn setup secondary radius authentication server