<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH and ASDM Two Factor Authentication in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3726463#M902976</link>
    <description>&lt;P&gt;Thanks Marvin. Yes I saw that Cisco acquired Duo and I hope that solutions come quicker given Duo's expertise in MFA. DoD mandated that it be MFA be completed last December, but you know how that goes. Must do, but no guidance in how to do on a closed network that doesn't see the cloud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and much appreciated.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Oct 2018 17:04:10 GMT</pubDate>
    <dc:creator>Robert Molina</dc:creator>
    <dc:date>2018-10-16T17:04:10Z</dc:date>
    <item>
      <title>SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3365090#M902965</link>
      <description>&lt;P style="margin: 0in 0in 8pt;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;We have a requirement to establish Two Factor Authentication (2FA) to manage all network devices. Seeking guidance/advice on connecting to a device via SSH and ASDM. VPN is not implemented. Our current environment includes a router, switch and ASA firewall. We currently are using Active Directory and Windows NPS to support RADIUS. The network devices are not allowed to have local user accounts, only a single emergency account. All users are sourced from Active Directory. &lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 8pt;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;Any advice on the way forward to cost effective implementation of 2FA would be appreciated. &lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3365090#M902965</guid>
      <dc:creator>thomas.talley</dc:creator>
      <dc:date>2020-02-21T15:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3365521#M902967</link>
      <description>&lt;P&gt;If the device (ASA or otherwise) is setup to use the Microsoft NPS server as its RADIUS server, all of the 2FA work happens on the NPS side.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There's nothing special you need to do with the ASA beyond telling it to authenticate and authorize the users via the RADIUS server.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 11:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3365521#M902967</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-04-13T11:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3725882#M902970</link>
      <description>&lt;P&gt;What about if user accounts are on a TACACS (ISE) server for authentication?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Oct 2018 23:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3725882#M902970</guid>
      <dc:creator>Robert Molina</dc:creator>
      <dc:date>2018-10-15T23:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3725951#M902973</link>
      <description>&lt;P&gt;In that case I don't believe it's currently supported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since Cisco recently acquired Duo, we may see additional 2FA features as those products get blended into the Cisco offerings but that's all future work.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 03:24:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3725951#M902973</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-16T03:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3726463#M902976</link>
      <description>&lt;P&gt;Thanks Marvin. Yes I saw that Cisco acquired Duo and I hope that solutions come quicker given Duo's expertise in MFA. DoD mandated that it be MFA be completed last December, but you know how that goes. Must do, but no guidance in how to do on a closed network that doesn't see the cloud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and much appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 17:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3726463#M902976</guid>
      <dc:creator>Robert Molina</dc:creator>
      <dc:date>2018-10-16T17:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3726468#M902979</link>
      <description>&lt;P&gt;In a press release on the Duo purchase it states: "Duo is the leading provider of unified access security and multi-factor authentication delivered through the cloud". It would not seem to be an option for a closed network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My initial question is in support of DoD environment with an expectation that the 2FA leverage CAC/Token/Smartcard. The only solution I have been able to obtain from DoD is RSA SecureID. But the cost of that solution would be almost the same as the cost of the three devices being managed. Does not seem to be a cost effective solution for our situation.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 17:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3726468#M902979</guid>
      <dc:creator>thomas.talley</dc:creator>
      <dc:date>2018-10-16T17:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3726485#M902982</link>
      <description>&lt;P&gt;Thomas,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're right that Duo uses the cloud for 2FA, however, Cisco has a need to provide 2FA (CAC/Smartcard) support to the DoD as a whole who have network devices not only on Classified (closed) networks but on the Unclassified network. A question would be to ask in terms of the Unclassified network, is does DoD want to have 2FA account information in the cloud? RSA SecureID would not necessarily work in our small environment since I believe that to use an RSA SecureID we would require the purchase of an RSA server and token. Too much cost just for one or two users in our unique program. Therefore, I am looking at vendors that can provide a standalone solution that either uses an account on a TACACS server or AD regardless of the ios that is currently on the network devices. ASDM UI for the ASA is just one of those things that doesn't take 2FA into account.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 17:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/3726485#M902982</guid>
      <dc:creator>Robert Molina</dc:creator>
      <dc:date>2018-10-16T17:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4038673#M1067200</link>
      <description>&lt;P&gt;Hello!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I implemented NPS as a Radius Identity Server (external Identity Store) on Cisco ACS 5.8. I think that this is possible in ISE v 2 too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 16:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4038673#M1067200</guid>
      <dc:creator>oeortiz01</dc:creator>
      <dc:date>2020-03-02T16:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4038720#M1067201</link>
      <description>FYSA Here is another nice-to-know 2factor solution involving ISE: &lt;A href="https://www.pragmasys.com/products/support/cisco-2-factor" target="_blank"&gt;https://www.pragmasys.com/products/support/cisco-2-factor&lt;/A&gt;&lt;BR /&gt;Older doc, but works with 9k devices too.  HTH!</description>
      <pubDate>Mon, 02 Mar 2020 17:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4038720#M1067201</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-03-02T17:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4680036#M1093108</link>
      <description>&lt;P&gt;If you place ACL on the switches and limit Ip to /32 on the firewall.&amp;nbsp; Could you implement MFA on the the station to get in compliance till Cisco catches up to what regulation are requesting?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 23:13:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4680036#M1093108</guid>
      <dc:creator>Kombi</dc:creator>
      <dc:date>2022-09-01T23:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4980601#M1107035</link>
      <description>&lt;P&gt;RADIUS configuration seems not enough, this configuration work fine for SSH but with ASDM there are some problem, a lot of continuosly push were prompted from DUO on the DUO APP ... so doesn't work&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2023 14:00:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4980601#M1107035</guid>
      <dc:creator>Luca Berlinghieri</dc:creator>
      <dc:date>2023-12-18T14:00:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSH and ASDM Two Factor Authentication</title>
      <link>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4980609#M1107037</link>
      <description>&lt;P&gt;When the external identity source used by RADIUS is setup with MFA, we typically adjust the timeout to something like 1-2 minutes so that the end user has time to confirm their login using the configured MFA solution.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2023 14:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-and-asdm-two-factor-authentication/m-p/4980609#M1107037</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-12-18T14:12:09Z</dc:date>
    </item>
  </channel>
</rss>

