01-21-2009 01:21 AM - edited 03-10-2019 04:17 PM
I tired configuring TACACS+ configuration for ASA but unable to complete it. I have ACS 3.3 for all other Cisco Routers and Switches
03-24-2009 04:56 AM
Leonard
If you post the configuration of the ASA we might be able to see what the issue is. But so far we do not have nearly enough information to analyze the problem.
HTH
Rick
03-24-2009 08:59 AM
So the problem lies in ASA but not ACS authentication or authorization issue?
Because it is not convenient for me to post the config can u tell me what is the typical configuration for ASA to communicate with ACS via RSA tokens?
I search at Cisco website but they never say how to do it. Plus currently my wireless controllers and ASA GUI are unable to use RSA tokens to authenticate.
Really need some help from all expert out there.
Thank you very much
03-24-2009 01:08 PM
Leonard
We do not yet know for sure where the problem is. But based on your description of the symptoms I believe that it is more likely a problem in configuration of the ASA then in the ACS or the RSA tokens. If we get additional information and believe that it is not an ASA configuration issue then we can look at the ACS and the RSA tokens for possible issues.
There are several options in how to configure the ASA and it would be better if we could see how you have configured the ASA rather than attempt to guess which configuration options would fit your circumstance.
HTH
Rick
03-24-2009 06:45 PM
ok my ASA and wireless controllers authenticate using TACACS+ through ACS. Currently my local database in ACS works but when i start using RSA the GUI failed to lunch and got hang. It seemed that it authenticate successful at RSA but when returned the credential to ASA it failed.
Why is this so? Has anyone tried using RSA tokens and able to authenticate w ASA and wireless controllers GUI.
07-14-2013 06:39 AM
Leo,
I was looking around and come across this post. It's very late, however, wanted to add my inputs for other community members.
RSA Token/One-Time-Password support available with ASDM only in SINGLE ROUTED MODE. If you are in Single Routed Mode, you can do OTP with ASDM if you are running ASA 8.2+ with ASDM 6.2+.
If the firewall is running in multi-context and transparent mode. It won't work. Below is the enhancement request that was filed for the same feature to be supported.
CSCtf23419 ASDM OTP authentication support in multi-context and transparent modes
With WLC is yet not possible and there is a enhancement request filed.
CSCuf61598 WLC: Need ability to support multiple sessions via OTP authentication
~BR
Jatin Katyal
**Do rate helpful posts**
05-10-2017 01:44 PM
Please see the below guide for TACACS+ configuration on ASA
http://www.cisco.com/image/gif/paws/112967/acs-aaa-tacacs-00.pdf
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide