<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questions about using Duo deploy in Deployment Strategy</title>
    <link>https://community.cisco.com/t5/deployment-strategy/questions-about-using-duo-deploy/m-p/4875927#M6</link>
    <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Duo Authentication Proxy supports LDAP and RADIUS authentication.&lt;/P&gt;
&lt;P&gt;Duo Access Gateway supports SAML 2.0 only.&lt;/P&gt;
&lt;P&gt;So which one you choose depends on your use case. If you are looking to add 2FA to FTD VPN logins, then we recommend &lt;A href="https://duo.com/docs/cisco-firepower"&gt;RADIUS with the Duo Authentication Proxy&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;I saw that the new FTD 6.7 release supports SAML for VPN, so Duo Access Gateway or Duo Single Sign-on are also valid options. We do not yet have step-by-step instructions for FTD with SAML, but you could configure this using a &lt;A href="https://duo.com/docs/sso-generic"&gt;Duo generic SAML application&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Duo Network Gateway is a like a reverse proxy for publishing internal web applications or SSH servers externally with 2FA added. It is not a good solution for adding 2FA to FTD RA VPN. It would be used instead of the RA VPN to provide SSH/HTTPS access to internal services without a VPN tunnel.&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Wed, 16 Dec 2020 22:44:45 GMT</pubDate>
    <dc:creator>DuoKristina</dc:creator>
    <dc:date>2020-12-16T22:44:45Z</dc:date>
    <item>
      <title>Questions about using Duo deploy</title>
      <link>https://community.cisco.com/t5/deployment-strategy/questions-about-using-duo-deploy/m-p/4875926#M5</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Hi everyone&lt;/P&gt;
&lt;P&gt;I have encountered some doubts about the way Duo runs authentication (I integrate with FTD). Duo has three methods Authentication Proxy, Duo Network Gateway, Duo Access Gateway, and I also know that Authentication Proxy uses RADIUS or LDAP for authentication. Duo does the second verification.&lt;BR /&gt;
Duo Network Gateway means to install Duo’s connection tool on the host, you can use Duo Network Gateway use ssh connect to internal network&lt;BR /&gt;
Duo Access Gateway can be verified through AD or online or Google G Suite accounts online verification service&lt;/P&gt;
&lt;P&gt;I want to know what kind of environment these three types should be built in? All three are very similar. I can’t distinguish the pros and cons of each method. I hope I can mention it, thank all&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 16 Dec 2020 10:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/questions-about-using-duo-deploy/m-p/4875926#M5</guid>
      <dc:creator>ZONGYUho80020</dc:creator>
      <dc:date>2020-12-16T10:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about using Duo deploy</title>
      <link>https://community.cisco.com/t5/deployment-strategy/questions-about-using-duo-deploy/m-p/4875927#M6</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Duo Authentication Proxy supports LDAP and RADIUS authentication.&lt;/P&gt;
&lt;P&gt;Duo Access Gateway supports SAML 2.0 only.&lt;/P&gt;
&lt;P&gt;So which one you choose depends on your use case. If you are looking to add 2FA to FTD VPN logins, then we recommend &lt;A href="https://duo.com/docs/cisco-firepower"&gt;RADIUS with the Duo Authentication Proxy&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;I saw that the new FTD 6.7 release supports SAML for VPN, so Duo Access Gateway or Duo Single Sign-on are also valid options. We do not yet have step-by-step instructions for FTD with SAML, but you could configure this using a &lt;A href="https://duo.com/docs/sso-generic"&gt;Duo generic SAML application&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Duo Network Gateway is a like a reverse proxy for publishing internal web applications or SSH servers externally with 2FA added. It is not a good solution for adding 2FA to FTD RA VPN. It would be used instead of the RA VPN to provide SSH/HTTPS access to internal services without a VPN tunnel.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 16 Dec 2020 22:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/questions-about-using-duo-deploy/m-p/4875927#M6</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2020-12-16T22:44:45Z</dc:date>
    </item>
  </channel>
</rss>

