Leadtheway
asked on
Cisco ASA two factor VPN
Currently we have a cisco ASA 5510 and a ipsec client vpn connecting with the Cisco VPN client (not any connect) I was wondering if anyone has deployed this with two factor? Preferably a RSA token generated by smartphone
I have deployed it with RSA SecurID and it worked without any issues. But here is my question for you: are you doing this for the compliance? If yes then auditors will tell you to switch from ipsec to anyconnect client because RA IPsec uses aggressive mode for phase 1 which is considered to be insecure.
ASKER
no not for compliance, just wanting to add another layer
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.