Post

Cisco Duo with ASA AnyConnect

Cisco Duo integrates with ASA’s AnyConnect VPN to provide MFA (Multi-Factor Authentication) for secure remote access. When a user logs in to the AnyConnect VPN client, Duo’s authentication process is triggered, typically after the primary credentials are validated against an Active Directory. Duo pushes a second factor, such as a mobile app notification, SMS, or phone call, to the user for verification to add an additional layer of security for VPN access.

x


Creating User

On the Duo Admin Portal, create a User, this user has to be present on the Local Active Directory

x


Here’s the user with the same name on the AD side

x


Now the user is made with correct email, notice that it’s active but the status is Not Enrolled

x


Select the user and hit “Send Enrollment Email” to enroll the user

x


On the user end, we can click the link sent to the email and add the account to the Duo Mobile App

x


Protecting Application

Next select Protect Application, and search for Cisco Radius VPN

x


Upon creating the App, we’ll be given some keys and an API hostname, keep it stored for later configuration

x


Installing Duo Proxy Autentication Server

On a freshly installed Windows Server, download the Duo Auth Proxy Installer and run it

x

x


Then open the Proxy Manager and configure the authproxy.cfg, hit Save and select Validate to confirm everything is nominal

x


After that, select Start Service to start the Proxy

x


ASA Configuration

On ASA, we’ll add the Duo Proxy Server as an AAA Radius Server

x


After that, we can run the authentication test using the “senafrd” user, we should receive MFA confirmation on our Duo Mobile App

x


Now we can select the Duo as the AAA Server Group on the VPN Connection Profiles

x


And finally when we try connecting to VPN, we’ll get the MFA confirmation on the App

x

x


On the Duo Admin Portal, we can see the Authentication History and Endpoints used by this “senafrd” user

x


This post is licensed under CC BY 4.0 by the author.