• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 90
  • Last Modified:

Cisco ASA two factor VPN

Currently we have a cisco ASA 5510 and a ipsec client vpn connecting with the Cisco VPN client (not any connect)  I was wondering if anyone has deployed this with two factor?  Preferably a RSA token generated by smartphone
0
leadtheway
Asked:
leadtheway
  • 2
1 Solution
 
SIM50Commented:
I have deployed it with RSA SecurID and it worked without any issues.  But here is my question for you: are you doing this for the compliance? If yes then auditors will tell you to switch from ipsec to anyconnect client because RA IPsec uses aggressive mode for phase 1 which is considered to be insecure.
0
 
leadthewayAuthor Commented:
no not for compliance, just wanting to add another layer
0
 
SIM50Commented:
In that case, RSA SecurID should work for you. It's a straight forward implementation and the guides available from EMC. I used hardware tokens thought.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Prepare for an Exciting Career in Cybersecurity

Help prevent cyber-threats and provide solutions to safeguard our global digital economy. Earn your MS in Cybersecurity. WGU’s MSCSIA degree program curriculum features two internationally recognized certifications from the EC-Council at no additional time or cost.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now