
- Cisco asdm 5.2 password#
- Cisco asdm 5.2 windows#
Set the Policy Name to something meaningful.Right-click the Network Policy folder and click New.Review the settings on the next page and click Finish.From the drop down menu next to Attribute: on the right select User-Name. Under the Specify a Realm Name select the Attribute option on the left.On the next two pages leave the default settings and click Next.Specify the friendly name that you used when creating the RADIUS Client above.Scroll down and select the Client Friendly Name condition and click Add… Leave the Type of network access server as Unspecified and click Next. I used CiscoASA because this policy is geared specifically for that RADIUS client. Set the Policy Nameto something meaningful.Right-click on the Connection Request Policies and click New.See Figure 1 for all the complete RADIUS Client properties. Leave the default values for the other settings and click OK.Enter the Server Secret Key specified on during the ASA configuration in the Shared secret and Confirm shared secret field.Make sure you document the Friendly Name used as it will be used later in some of the policies created. I used “CiscoASA” but if you had more than one you might want to make it more unique and identifiable.
Create a Friendly Name for the ASA device. Right-click on RADIUS Clients and select New RADIUS Client. Expand the RADIUS Clients and Servers folder. After launching the NPS tool right-click on the entry NPS(Local) and click the Register Server in Active Directory.Ĭreate a RADIUS client entry for the ASA. Under Role Service select only the Network Policy Server service and click Next.Īfter the role finishes installing you will need to set up the server using the Network Policy Server (NPS) management tool found under Administrative Tools. Select the Network Policy and Access Services role and click Next. Click Next on the Before You Begin page. Click the Roles object and then click the Add Roles link on the right. Cisco asdm 5.2 windows#
Connect to the Windows Server 2008 server and launch Server Manager.I believe this requires Domain Admin privileges. You also will need permissions to “Register” the server in AD. To perform the below steps you need Administrator permissions to the server that will host the RADIUS server. The documentation from Microsoft was somewhat vague and other resources I found using the trusty Google method listed steps and addition pieces I knew to be unnecessary. Leave the rest of the settings at the defaults and click Ok.
Cisco asdm 5.2 password#
Re-enter the secret in the Common Password field. Make sure you document this as it is required when configuring the RADIUS server.
Skip to the Server Secret Key field and create a complex password. Under Server Name or IP Address enter the IP Name you created for the RADIUS server above. Under the Interface Name select the interface on the ASA that will have access to the RADIUS server, most likely inside. Click the Add button to the right of Servers in the Select Group. Select the server group created in the step above. And click OKĪdd the RADIUS server to the Server Group. Accept the default for the other settings. Give the server group a name, like TEST-AD, and make sure the RADIUS protocol is selected. Click the Add button to the right of the AAA Server Groups section. Expand AAA Setup and select AAA Server Groups. Enter a descriptive name, the IP address and a description of the server. Under the Firewall section, expand the Objects link and select the IP Names. Launch ASDM and connecting to the ASA, I went to the Configuration view. The same configuration could be achieved via the command line interface, but I found the ASDM was more convenient for checking existing settings and then replicating. I performed the Cisco configuration using the ASDM management tool. ASA 5510 (though I believe these instructions should work for all ASA models).