Chat now with support
Chat with Support

Defender 5.8 - Administrator Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Securing PAM-enabled services Defender Management Portal (Web interface) Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Integration with Cloud Access Manager Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

Step 1: Create an AAA server group, add Defender Security Server

a
b
In the left pane, click Remote Access VPN.
c
In the left pane, expand the AAA/Local Users node to select the AAA Server Groups node.
d
In the right pane, in the AAA Server Groups area, click the Add button.
a
In the Server Group text box, type a descriptive name for your group.
b
From the Protocol drop-down list, select RADIUS.
c
Click OK to create the group and close the dialog box.
3
In the right pane, in the Servers in the Selected Group area, click the Add button.
a
In the Server Name or IP Address text box, enter the name or IP address of the Defender Security Server you want to use to authenticate the users.
b
In the Server Authentication Port text box, enter the port used by the Defender Security Server to receive authentication requests (port 1645 by default).
c
In the Server Secret Key text box, enter the shared secret you want to use to establish a connection between the Defender Access Node and Defender Security Server.
d
Click OK to add the Defender Security Server to the list and close the dialog box.

Step 2: Configure an IPsec connection profile

a
b
In the left pane, click Remote Access VPN.
c
In the left pane, expand the Network (Client) Access node to select the IPsec Connection Profiles node.
2
In the right pane, under Connection Profiles, select an existing profile or add a new profile.
3
Modify the selected or created profile (click the Edit button): In the User Authentication area, from the Server Group drop-down list, select the AAA server group you created in Step 1: Create an AAA server group, add Defender Security Server.

Configuring Defender

Step 1: Configure an Access Node

3
In the left pane, right-click Access Nodes, from the shortcut menu, select New | Defender Access Node.
On the Enter a name and description for this Access Node page, type a descriptive name and description for the Access Node.
On the Select the node type and user ID type for this Access Node page, use the following options:
Node Type  From this list, select Radius Agent. This enables the RADIUS protocol for communications between Cisco ACS devices and Defender. Note that the RADIUS protocol is transmitted over UDP and uses port 1645 or 1812.
User ID  From this list, select the user ID type you want to use.
On the Enter the connection details for this Access Node page, use the following options:
IP Address or DNS Name  Specify the Cisco AAA Server by entering its IP address or DNS name.
Port  Type the port number through which you want this Access Node to connect to the Defender Security Server. You must specify the same port as the one you entered in the Server Authentication Port text box in Step 1: Create an AAA server group, add Defender Security Server.
Subnet Mask  Keep the default subnet mask.
Shared Secret  Type the same shared secret you entered in the Server Secret Key text box in Step 1: Create an AAA server group, add Defender Security Server.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating