Link to home
Start Free TrialLog in
Avatar of Leadtheway
LeadthewayFlag for United States of America

asked on

Cisco ASA two factor VPN

Currently we have a cisco ASA 5510 and a ipsec client vpn connecting with the Cisco VPN client (not any connect)  I was wondering if anyone has deployed this with two factor?  Preferably a RSA token generated by smartphone
Avatar of SIM50
SIM50
Flag of United States of America image

I have deployed it with RSA SecurID and it worked without any issues.  But here is my question for you: are you doing this for the compliance? If yes then auditors will tell you to switch from ipsec to anyconnect client because RA IPsec uses aggressive mode for phase 1 which is considered to be insecure.
Avatar of Leadtheway

ASKER

no not for compliance, just wanting to add another layer
ASKER CERTIFIED SOLUTION
Avatar of SIM50
SIM50
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial