02-16-2019 02:15 PM
Hi, I have been asked to look into implementing two factor authentication for device logon to our routers/switches/ASA firewalls using ISE with Safenet (Gemalto) providing the external RADIUS token services.
Is this scenario actually possible ? The documentation I have seen in relation to ISE on the Safenet site seems specific to 2FA for the purposes of ASA VPN services and not for actual local device access to the routers/switches/ASA's themselves which is what we are being asked to implement.
Currently device logon is done using TACACS authentication/authorisation against ISE which subsequently is setup to check the user credentials within AD.
The proposal we are being asked to implement is to amend this so:
User has to enter both AD credentials via TACACS and a one time passcode/token from Safenet (which uses RADIUS).
The intention would be to let the authorisation aspect remain within ISE/TACACS.
Has anyone set up a similar solution with ISE/Safenet 2FA services?
As per above is this even a feasible option, for example how is it seen/configured from the router/switch end in AAA?
Thanks for taking the time to read through and I appreciate any feedback.
02-16-2019 02:36 PM
02-16-2019 07:48 PM
As ISE inherits T+ from ACS, please take a look at this guide -- 007-013144-001_SAS_IntegrationGuide_Cisco_Secure_ACS_LDAP_RADIUS_RevA.pdf The diagram in page 6 is pretty much it except we will replace RADIUS in Steps 2 and 6 with T+.
02-19-2019 05:09 AM
Hi,
I used Gemalto for our employees ASA Remote Access VPN with 2FA.
You need to add the Gemalto IP address when creating a Radius server in ASA.
Then in the specified Tunnel-Group/Connection Profile use secondary authentication where you can point to the ISE radius or Local user DB (not advisable).
03-06-2019 06:22 AM
Thanks for the feedback everyone, I have had to temporarily park this due to other commitments but my plan is to lab the proposed solution, once done I will endeavour to feedback my findings here.
06-21-2023 09:53 PM
Have a look at this Demo shared by Cisco (https://www.youtube.com/watch?v=daj4KqaeNNE&t=2104s)
It answers your particular use case. Go to 40:37 for the Demo
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide