<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco IOS with Securid in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279618#M433733</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello. I realize this post has been inactive for a long time, but I had a quick question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are in the investigation stages of RSA, and we already use RADIUS for authentication on our AS5350. When RSA comes into play, do we just change our RADIUS statement to point to the RSA server, and the RSA server becomes the RADIUS and RSA server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Feb 2007 14:02:57 GMT</pubDate>
    <dc:creator>poulid</dc:creator>
    <dc:date>2007-02-16T14:02:57Z</dc:date>
    <item>
      <title>Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279614#M433729</link>
      <description>&lt;P&gt;Does anyone know how you can secure dial up connections into a Cisco 3620 Router using RSA securid.We currently use a Radius server which works fine but we want to extend this to use Securid.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 20:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279614#M433729</guid>
      <dc:creator>s.nicholls</dc:creator>
      <dc:date>2019-03-10T20:45:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279615#M433730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A customer I work with is doing this between a group of AS5350 routers and a TACACS server. I would assume it would be quite similar for Radius. I have configured the router to authenticate telnet and SSH access with one authentication method and to authenticate dial access with a different authentication method. The dial access authentication method sends the authentication request to the TACACS server. The TACACS is configured that the authentication data is in an external source and is configured to send the athentication request to the RSA secureID server. Authentication from RSA goes to TACACS which forwards it to the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Aug 2004 12:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279615#M433730</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2004-08-24T12:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279616#M433731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can authenticate directly to the SecureID server from the router using Radius.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got the exact configs somewhere, i'll dig them out if you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you just need to amend your radius config to point to the Ace server, set up a shared secret between your router and the Ace server.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then set up your aaa authentication method for ppp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. aaa authentication ppp dial_in group radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then bind your AAA statement to your modems &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-async *&lt;/P&gt;&lt;P&gt;  ppp authentication pap dial_in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to use pap as your authentication method&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Aug 2004 11:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279616#M433731</guid>
      <dc:creator>paddyxdoyle</dc:creator>
      <dc:date>2004-08-25T11:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279617#M433732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config i mentioned earlier. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One RSA server&lt;/P&gt;&lt;P&gt;--------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server host 10.1.1.1&lt;/P&gt;&lt;P&gt;radius-server key 0 secret_key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication ppp user-radius group radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Group-Async1&lt;/P&gt;&lt;P&gt;	ppp authentication pap user-radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two radius servers &lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;If the first fails or can't be reached then the second will be used&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server host 10.1.1.1 key 0 secret_key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server host 10.2.1.1 key 0 secret_key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication ppp user-radius group AceServers group AceServers2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server radius AceServers&lt;/P&gt;&lt;P&gt;server 10.1.1.1 auth-port 1645 acct-port 1646	&lt;/P&gt;&lt;P&gt;	deadtime 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server radius AceServers2&lt;/P&gt;&lt;P&gt;server 10.2.1.1  auth-port 1645 acct-port 1646	&lt;/P&gt;&lt;P&gt;	deadtime 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Group-Async1&lt;/P&gt;&lt;P&gt;	ppp authentication pap user-radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Paddy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Aug 2004 19:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279617#M433732</guid>
      <dc:creator>paddyxdoyle</dc:creator>
      <dc:date>2004-08-25T19:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279618#M433733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello. I realize this post has been inactive for a long time, but I had a quick question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are in the investigation stages of RSA, and we already use RADIUS for authentication on our AS5350. When RSA comes into play, do we just change our RADIUS statement to point to the RSA server, and the RSA server becomes the RADIUS and RSA server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2007 14:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279618#M433733</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2007-02-16T14:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279619#M433734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Depends.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you already have a fully featured AAA server (eg Cisco Secure ACS) you might want to stick with have and it "back end" onto RSA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might do this because the RSA RADIUS server is somewhat functionally limited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS for example can back end onto RSA for both RADIUS and TACACS+ for authentication and then perform localised authorisation and policy (eg filtering by network access device)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a very popular deployment model.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2007 14:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279619#M433734</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2007-02-16T14:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279620#M433735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darran,&lt;/P&gt;&lt;P&gt;What  you're offering with Cisco ACS is completely overkilled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) In case you don't know, RSA SecurID server version 6.1 also bundles in Radius Server (aka&lt;/P&gt;&lt;P&gt;Steelbelt Radius) so it can offer a lot more&lt;/P&gt;&lt;P&gt;than the old native RSA radius server in version 5.1 or lower.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If you do not want to use Radius on the RSA&lt;/P&gt;&lt;P&gt;Server due to some requirements, you can use&lt;/P&gt;&lt;P&gt;Microsoft IAS server that is FREE with Microsoft Windows server.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why pay for Cisco SecureACS server for &lt;/P&gt;&lt;P&gt;Functionalities such as TACACS server that &lt;/P&gt;&lt;P&gt;this user does not even need?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my 2c.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2007 14:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279620#M433735</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-16T14:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279621#M433736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We currently use MS IAS, which works fine for us. Sounds like using the RSA server as the RADIUS server would work perfect, giving us the two prong authentication we are looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again folks, as always this forum has helped a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2007 14:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279621#M433736</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2007-02-16T14:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279622#M433737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Think you missed the "If you already..."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2007 14:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279622#M433737</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2007-02-16T14:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279623#M433738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you're already using MS IAS, what you &lt;/P&gt;&lt;P&gt;want to do is to proxy off the Radius connection&lt;/P&gt;&lt;P&gt;from the MS IAS to the RSA SecurID server with&lt;/P&gt;&lt;P&gt;Radius server running.  That way, you don't&lt;/P&gt;&lt;P&gt;have to make changes on the Cisco devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Service providers do this all the time.  I also&lt;/P&gt;&lt;P&gt;use SecurID RSA server but I proxy the connection from my freeRadius server to the &lt;/P&gt;&lt;P&gt;RSA SecurID server and it works like a charm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2007 14:57:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279623#M433738</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-16T14:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS with Securid</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279624#M433739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We only have one device that would need to be changed, so it wouldn't be a really big deal. Thanks for all the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2007 15:11:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ios-with-securid/m-p/279624#M433739</guid>
      <dc:creator>poulid</dc:creator>
      <dc:date>2007-02-16T15:11:56Z</dc:date>
    </item>
  </channel>
</rss>

