<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA5525 2FA solution in Secure Access Discussions</title>
    <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344274#M93</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;I'd like to check which two-factor authentication (2FA) options are currently supported by our Cisco firewalls ASA5525 and Cisco Security Manager (CSM)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Tue, 04 Nov 2025 06:50:24 GMT</pubDate>
    <dc:creator>MJ666</dc:creator>
    <dc:date>2025-11-04T06:50:24Z</dc:date>
    <item>
      <title>Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344274#M93</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;I'd like to check which two-factor authentication (2FA) options are currently supported by our Cisco firewalls ASA5525 and Cisco Security Manager (CSM)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 06:50:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344274#M93</guid>
      <dc:creator>MJ666</dc:creator>
      <dc:date>2025-11-04T06:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344286#M94</link>
      <description>&lt;LI-CODE lang="markup"&gt;I'd like to check which two-factor authentication (2FA) options are currently supported by our Cisco firewalls ASA5525 and Cisco Security Manager (CSM)?&lt;/LI-CODE&gt;
&lt;P&gt;Can you please confirm 2FA for device admin for ASA or remote VPN ? Device admin yes you can do depends what code running. (check the admin guide)&amp;nbsp; again depends on what Radius/TACACS you using.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco Security Manager (CSM) - you can configure the same for Web GUI access.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 07:49:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344286#M94</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-11-04T07:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344307#M96</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are looking for various Admin and remote VPN solutions.&lt;BR /&gt;The ultimate goal is to choose the best solution in both cases.&lt;/P&gt;
&lt;P&gt;I'm not sure I understand your comment “Cisco Security Manager (CSM) - you can configure the same for Web GUI access.”&lt;BR /&gt;Could you elaborate, please?&lt;/P&gt;
&lt;P&gt;Best&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 09:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344307#M96</guid>
      <dc:creator>MJ666</dc:creator>
      <dc:date>2025-11-04T09:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344310#M97</link>
      <description>&lt;P&gt;We usually rely on 2FA configuration on the external authentication server. For instance if you use ISE as the authentication server, then ISE can relay the 2FA request to the 2FA server instead of the ASA itself. However, you could also configure the ASA to send the 2FA request to the 2FA server directly, I'm not sure about CSM, I think it doesn't support that feature unless you configure an external authentication server.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 09:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344310#M97</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-11-04T09:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344313#M98</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp; I'm using RADIUS authentication&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 10:02:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344313#M98</guid>
      <dc:creator>MJ666</dc:creator>
      <dc:date>2025-11-04T10:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344336#M101</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="375" data-end="430"&gt;Thank you for your feedback.&lt;BR data-start="403" data-end="406" /&gt;To clarify my request:&lt;/P&gt;
&lt;UL data-start="436" data-end="767"&gt;
&lt;LI data-start="436" data-end="573"&gt;
&lt;P data-start="438" data-end="573"&gt;I’m referring to &lt;STRONG data-start="455" data-end="516"&gt;two-factor authentication (2FA) for administrative access&lt;/STRONG&gt; (SSH, ASDM, or CSM Web GUI), not for remote VPN users.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="576" data-end="767"&gt;
&lt;P data-start="578" data-end="653"&gt;We would like to know &lt;STRONG data-start="600" data-end="649"&gt;which 2FA mechanisms are officially supported&lt;/STRONG&gt; on:&lt;/P&gt;
&lt;OL data-start="658" data-end="767"&gt;
&lt;LI data-start="658" data-end="708"&gt;
&lt;P data-start="661" data-end="708"&gt;&lt;STRONG data-start="661" data-end="706"&gt;Cisco ASA 5525 (running ASA version 9.16)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="713" data-end="764"&gt;
&lt;P data-start="716" data-end="764"&gt;&lt;STRONG data-start="716" data-end="764"&gt;Cisco Security Manager (CSM version 11.5(4))&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="770" data-end="783"&gt;Specifically:&lt;/P&gt;
&lt;UL data-start="786" data-end="1201"&gt;
&lt;LI data-start="786" data-end="1014"&gt;
&lt;P data-start="788" data-end="1014"&gt;Does ASA natively support direct integration with 2FA providers (e.g., Duo, RSA SecureID, Microsoft Azure MFA, etc.), or must it always rely on an external RADIUS server such as Cisco Prime Infrastructure or ISE or Duo Authentication Proxy?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1017" data-end="1198"&gt;
&lt;P data-start="1019" data-end="1198"&gt;For CSM, can 2FA be directly configured for the Web GUI login, or is it only possible through integration with an external authentication server (e.g., LDAP or RADIUS with 2FA)?&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1204" data-end="1323"&gt;A clear confirmation or documentation link for the &lt;STRONG data-start="1255" data-end="1280"&gt;supported 2FA options&lt;/STRONG&gt; for both ASA and CSM would be appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 10:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344336#M101</guid>
      <dc:creator>MJ666</dc:creator>
      <dc:date>2025-11-04T10:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344341#M102</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="375" data-end="430"&gt;Thank you for your feedback.&lt;BR data-start="403" data-end="406" /&gt;To clarify my request:&lt;/P&gt;
&lt;UL data-start="436" data-end="767"&gt;
&lt;LI data-start="436" data-end="573"&gt;
&lt;P data-start="438" data-end="573"&gt;I’m referring to &lt;STRONG data-start="455" data-end="516"&gt;two-factor authentication (2FA) for administrative access&lt;/STRONG&gt; (SSH, ASDM, or CSM Web GUI), not for remote VPN users.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="576" data-end="767"&gt;
&lt;P data-start="578" data-end="653"&gt;We would like to know &lt;STRONG data-start="600" data-end="649"&gt;which 2FA mechanisms are officially supported&lt;/STRONG&gt; on:&lt;/P&gt;
&lt;OL data-start="658" data-end="767"&gt;
&lt;LI data-start="658" data-end="708"&gt;
&lt;P data-start="661" data-end="708"&gt;&lt;STRONG data-start="661" data-end="706"&gt;Cisco ASA 5525 (running ASA version 9.16 manage per CLI or CSM Weg GUI)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="713" data-end="764"&gt;
&lt;P data-start="716" data-end="764"&gt;&lt;STRONG data-start="716" data-end="764"&gt;Cisco Security Manager (CSM version 4.29)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="770" data-end="783"&gt;Specifically:&lt;/P&gt;
&lt;UL data-start="786" data-end="1201"&gt;
&lt;LI data-start="786" data-end="1014"&gt;
&lt;P data-start="788" data-end="1014"&gt;Does ASA natively support direct integration with 2FA providers (e.g., Duo, RSA SecureID, Microsoft Azure MFA, etc.), or must it always rely on an external RADIUS/TACACS+ server such as Cisco Prime Infrasrtucture** or Cisco ISE or Duo Authentication Proxy?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1017" data-end="1198"&gt;
&lt;P data-start="1019" data-end="1198"&gt;For CSM, can 2FA be directly configured for the Web GUI login, or is it only possible through integration with an external authentication server (e.g., LDAP or RADIUS with 2FA)?&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1204" data-end="1323"&gt;A clear confirmation or documentation link for the &lt;STRONG data-start="1255" data-end="1280"&gt;supported 2FA options&lt;/STRONG&gt; for both ASA and CSM would be appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 10:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344341#M102</guid>
      <dc:creator>MJ666</dc:creator>
      <dc:date>2025-11-04T10:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344351#M103</link>
      <description>&lt;P&gt;On the ASA you can, however whether you configure the ASA to send the request directly to Duo or you pass through an external RADIUS server it won't change the fact that you will have to configure an external aaa server on the device. With regard to CSM, based on my knowledge it supports both RADIUS and TACACS.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/security_manager/428/user/csm-user-guide-428/chapter48-configuring-device-administration-policies-on-firewall-devices.html" target="_blank"&gt;User Guide for Cisco Security Manager 4.28 - Configuring Device Administration Policies on Firewall Devices [Cisco Security Manager] - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://help.duo.com/s/article/3160?language=en_US" target="_blank"&gt;How do I protect SSH logins to my Cisco ASA?&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 11:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344351#M103</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-11-04T11:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344363#M104</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Thank you for the clarification.&lt;/P&gt;
&lt;P data-start="1921" data-end="1953"&gt;So, to confirm my understanding:&lt;/P&gt;
&lt;UL data-start="1959" data-end="2409"&gt;
&lt;LI data-start="1959" data-end="2199"&gt;
&lt;P data-start="1961" data-end="2199"&gt;On &lt;STRONG data-start="1964" data-end="1987"&gt;ASA 5525 (ASA 9.16)&lt;/STRONG&gt;:&lt;BR data-start="1988" data-end="1991" /&gt;2FA is supported &lt;STRONG data-start="2012" data-end="2063"&gt;through integration with an external AAA server&lt;/STRONG&gt; (RADIUS or TACACS+) such as Cisco Prime Infrastructure 3.10.6. The ASA itself does not natively handle the second factor.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2205" data-end="2406"&gt;
&lt;P data-start="2207" data-end="2406"&gt;On &lt;STRONG data-start="2210" data-end="2225"&gt;CSM 4.29&lt;/STRONG&gt;:&lt;BR data-start="2226" data-end="2229" /&gt;2FA for administrative (Web GUI) access can be achieved only &lt;STRONG data-start="2294" data-end="2331"&gt;via RADIUS or TACACS+ integration&lt;/STRONG&gt;, depending on the 2FA configuration of the external authentication server.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2412" data-end="2475"&gt;Could you please confirm that this interpretation is correct?&lt;/P&gt;
&lt;P data-start="2481" data-end="2627"&gt;Also, if available, could you provide a Cisco reference confirming these integration models for ASA and CSM (for documentation or audit purposes)?&lt;/P&gt;
&lt;P data-start="2481" data-end="2627"&gt;Best&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 11:28:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344363#M104</guid>
      <dc:creator>MJ666</dc:creator>
      <dc:date>2025-11-04T11:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA5525 2FA solution</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344375#M105</link>
      <description>&lt;P&gt;Yes, that's my understanding. I found these links that might be useful:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/security_manager/428/user/csm-user-guide-428/chapter48-configuring-device-administration-policies-on-firewall-devices.html#con_747388" target="_blank"&gt;User Guide for Cisco Security Manager 4.28 - Configuring Device Administration Policies on Firewall Devices [Cisco Security Manager] - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/configuration/general/asa-916-general-config/admin-management.html" target="_blank"&gt;CLI Book 1: Cisco ASA Series General Operations CLI Configuration Guide, 9.16 - Management Access [Cisco Secure Firewall ASA] - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/asdm716/general/asdm-716-general-config/admin-management.html" target="_blank"&gt;ASDM Book 1: Cisco ASA Series General Operations ASDM Configuration Guide, 7.16 - Management Access [Cisco Firepower 4100 Series] - Cisco&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 11:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/cisco-asa5525-2fa-solution/m-p/5344375#M105</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-11-04T11:50:04Z</dc:date>
    </item>
  </channel>
</rss>

