Configuring Cisco ASA AnyConnect VPN Two-Factor Authentication
General information
This article describes how to configure Cisco ASA AnyConnect to connect to a VPN with two-factor authentication.
Possible authentication methods:
MultiFactor Mobile ApplicationSMSHardware OTP tokensOTP applications: Google Authenticator or Yandex.KeyTelegram
To configure the second factor of authentication, you will need to install and configure the MultiFactor Radius Adapter.
might be useful
The second factor can be configured in dialogue mode with the user.
Video presentation
Scheme of work
- The user connects to the VPN, enters the username and password into AnyConnect;
- Cisco ASA is connected to the MultiFactor Radius Adapter component via the RADIUS protocol;
- The component checks the user's login and password in Active Directory or Network Policy Server and requests a second authentication factor;
- The user confirms the access request on the phone or enters a one-time code in AnyConnect.
Setting up Multifactor
- Go to Multifactor management system, then to the Resources section and create a new resource of the "Firewall" type - "Cisco";
- Fill in the “Name” and “Address” as you wish. The “Before checking the second factor” and “Language” parameters are responsible for the ability to configure the second factor directly in the AnyConnect client when a user connects without a configured second access factor;
- After creation, two parameters will be available to you: NAS Identifier and Shared Secret, they will be required for subsequent steps;
- Install and configure MultiFactor Radius Adapter.
Configuring Cisco ASA
ADSM Configuration
- Select a connection that requires two-factor authentication;
- Click Edit -> Basic;
- In the Authentication section, click Manage;
- In the "AAA Server Groups" section, click Add;
- Create a new server group:
- name: MFA Radius Servers
- protocol: RADIUS
- save and close
- Next, create a new server in the group:
- IP address: address of the MultiFactor Radius Adapter component
- Server Secret Key: Shared Key from component settings
- Timeout: 40 seconds
- uncheck "Microsoft CHAPv2 Capable"
- save and close.
- In the Authentication section, specify the "MFA Radius Servers" group for the AAA Server Group.
###CLI Configuration
aaa-server MFA protocol radius
aaa-server MFA (inside) host 10.105.130.51
key *****
tunnel-group TEST type remote-access
tunnel-group TEST general-attributes
address-pool test
authentication-server-group (inside) MFA
tunnel-group TEST webvpn-attributes
group-alias TEST enable
ip local pool test 192.168.1.1-192.168.1.10 mask 255.255.255.0
See also: