Cisco ASA can use an external authentication server such as RADIUS or TACACS to offload the authentication process. To set up an external authentication server for SecureMe, for example, follow these three simple steps:
Step 1. |
Select an authentication protocol. Figure 19-15. Specifying an Authentication Protocol |
Step 2. |
Define an authentication server. Figure 19-16. Defining an Authentication Server |
Step 3. |
Map the configured authentication server. Figure 19-17. Mapping the Authentication Server |
Example 19-7 shows the complete AAA configuration generated by ASDM.
Example 19-7. AAA Configuration Generated by ASDM
aaa-server Rad protocol radius aaa-server Rad host 192.168.10.105 key cisco123 aaa authentication enable console Rad LOCAL aaa authentication ssh console Rad LOCAL aaa authentication telnet console Rad LOCAL
Part I: Product Overview
Introduction to Network Security
Product History
Hardware Overview
Part II: Firewall Solution
Initial Setup and System Maintenance
Network Access Control
IP Routing
Authentication, Authorization, and Accounting (AAA)
Application Inspection
Security Contexts
Transparent Firewalls
Failover and Redundancy
Quality of Service
Part III: Intrusion Prevention System (IPS) Solution
Intrusion Prevention System Integration
Configuring and Troubleshooting Cisco IPS Software via CLI
Part IV: Virtual Private Network (VPN) Solution
Site-to-Site IPSec VPNs
Remote Access VPN
Public Key Infrastructure (PKI)
Part V: Adaptive Security Device Manager
Introduction to ASDM
Firewall Management Using ASDM
IPS Management Using ASDM
VPN Management Using ASDM
Case Studies