To configure Defender, you need to complete these steps:
To configure an Access Node
Node Type From this list, select Radius Agent. This enables the RADIUS protocol for communications between Cisco ACS devices and Defender. Note that the RADIUS protocol is transmitted over UDP and uses port 1645 or 1812.
User ID From this list, select the user ID type you want to use.
IP Address or DNS Name Specify the Cisco AAA Server by entering its IP address or DNS name.
Port Type the port number through which you want this Access Node to connect to the Defender Security Server. You must specify the same port as the one you entered in the Server Authentication Port text box in Step 1: Create an AAA server group, add Defender Security Server.
Subnet Mask Keep the default subnet mask.
Shared Secret Type the same shared secret you entered in the Server Secret Key text box in Step 1: Create an AAA server group, add Defender Security Server.
In this step, you specify the users or groups who will use the configured Access Node to authenticate via Defender.
To specify users or groups for the Access Node
Defender VPN Integrator is a tool that makes it very easy for remote users to utilize all the benefits of both VPN technology and the secure, two-factor authentication provided by Defender. Defender VPN Integrator simplifies the authentication process by integrating with the installed Defender Soft Token for Windows.
The Defender VPN Integrator is installed and configured on the end-user’s desktop, along with the Soft Token for Windows. When the user initiates a Defender protected VPN connection, VPN Integrator communicates between the Defender Soft Token for Windows and the third-party VPN client, to ensure that the secure, one-time password authentication process is handled automatically. The entire operation is seamless and very fast—only the passphrase for the Defender Soft Token for Windows is required from the user.
The guide describes how to install and configure Defender VPN Integrator within your environment.