Step 1: Create an AAA server group, add Defender Security Server
To create an AAA server group
- Open the Cisco ADSM console, and then do the following:
- On the toolbar, click Configuration.
- In the left pane, click Remote Access VPN.
- In the left pane, expand the AAA/Local Users node to select the AAA Server Groups node.
- In the right pane, in the AAA Server Groups area, click the Add button.
- In the dialog box that opens, do the following:
- In the Server Group text box, type a descriptive name for your group.
- From the Protocol drop-down list, select RADIUS.
- Click OK to create the group and close the dialog box.
- In the right pane, in the Servers in the Selected Group area, click the Add button.
- In the dialog box that opens, do the following:
- In the Server Name or IP Address text box, enter the name or IP address of the Defender Security Server you want to use to authenticate the users.
- In the Server Authentication Port text box, enter the port used by the Defender Security Server to receive authentication requests (port 1645 by default).
- In the Server Secret Key text box, enter the shared secret you want to use to establish a connection between the Defender Access Node and Defender Security Server.
- Click OK to add the Defender Security Server to the list and close the dialog box.
Step 2: Configure an IPsec connection profile
To configure an IPsec profile
- In the Cisco ADSM console, do the following:
- On the toolbar, click Configuration.
- In the left pane, click Remote Access VPN.
- In the left pane, expand the Network (Client) Access node to select the IPsec Connection Profiles node.
- In the right pane, under Connection Profiles, select an existing profile or add a new profile.
- Modify the selected or created profile (click the Edit button): In the User Authentication area, from the Server Group drop-down list, select the AAA server group you created in Step 1: Create an AAA server group, add Defender Security Server.
Configuring Defender
To configure Defender, you need to complete these steps:
Step 1: Configure an Access Node
To configure an Access Node
- On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
- In the left pane, expand the appropriate domain node, and then expand the Defender node
- In the left pane, right-click Access Nodes, from the shortcut menu, select New | Defender Access Node.
- Complete the wizard to configure the Defender Access Node.
- On the Enter a name and description for this Access Node page, type a descriptive name and description for the Access Node.
- On the Select the node type and user ID type for this Access Node page, use the following options:
Node Type From this list, select Radius Agent. This enables the RADIUS protocol for communications between Cisco ACS devices and Defender. Note that the RADIUS protocol is transmitted over UDP and uses port 1645 or 1812.
User ID From this list, select the user ID type you want to use.
- On the Enter the connection details for this Access Node page, use the following options:
IP Address or DNS Name Specify the Cisco AAA Server by entering its IP address or DNS name.