?
Solved

Pix config for radius

Posted on 2006-03-30
3
Medium Priority
?
478 Views
Last Modified: 2010-03-05
I trying to find the configuration I need to put into the pix to work with  radius(IAS) on windows.  This is just for administrators when they are consoling in or telnetting.  No VPN involved
0
Comment
Question by:Jelonet
  • 2
3 Comments
 
LVL 25

Expert Comment

by:Cyclops3590
ID: 16332062
I'll have to look, but I swear that Radius authentications were only allowed for VPN since the console and telnet passwords had to be on the device.  When I read it, it made sense to me since if the Radius server goes down, you don't have access to the firewall anymore.

Will get back to you later when I confirm in a little while.
0
 

Author Comment

by:Jelonet
ID: 16332722
I have the switches and router configured to use radius and I thought I could configure the pix to do the same.  Everything I have looked at pertains to vpn and I was wondering if it would be the same config if using vpn or not.
0
 
LVL 25

Accepted Solution

by:
Cyclops3590 earned 500 total points
ID: 16332831
Looks like my initial reaction is most likely wrong.

Have a look at the "aaa" command in global mode
You should have the options under that.  I don't run a Radius server, so I can't test to make sure.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question