Add Duo protection to earlier ASA versions with our ASA LDAPS SSL VPN or ASA RADIUS with An圜onnect configurations.ĭuo Beyond customers should be aware of these An圜onnect client minimum version requirements for Duo's Trusted Endpoints certificate detection. Prior versions of ASA firmware and An圜onnect do not support SAML login or use a different browser experience.
#CISCO ASA ASDM ICON PLUS#
Primary and Duo secondary authentication occur at the identity provider, not at the ASA itself.Ĭisco ASA SSO requires ASA version of 9.7.1.24, 9.8.2.28, 9.9.2.1, or higher of these releases, or 9.10 and later, plus An圜onnect 4.6 or later. This deployment option requires that you have a SAML 2.0 identity provider (IdP) in place that features Duo authentication, like Duo Single Sign-On. Overviewĭuo's SAML SSO for ASA supports inline self-service enrollment and the Duo Prompt for An圜onnect and web-based SSL VPN logins. If the configuration works, click Save to store it to your device's flash storage.Duo Federal customers: try Duo Protection for Cisco ASA SSO with Duo Access Gateway. You can also open a terminal window and use ping/SSH.
#CISCO ASA ASDM ICON PASSWORD#
(WINS servers aren't needed by Chrome OS.) Enter the IP addresses of DNS servers and default domain name.Make sure the VPNPool you just created is selected.
Click New and choose a descriptive pool name like "VPNPool.".If you haven't created a pool for VPN IPs: Enter a pool of addresses to use for VPN.Enter at least one username and password, then click Add.(You can assume you're using a local user database, which is the default.) To use a pre-shared key (passphrase), select Pre-Shared Key-PSK and set the PSK.To use a certificate, import the certificates now.
#CISCO ASA ASDM ICON WINDOWS#