Configuring RADIUS Dynamic Authorization
Before you begin:
-
Only one interface can be configured in the security zone or interface group if it is referred in a RADIUS Server.
-
A dynamic authorization enabled RADIUS server requires Secure Firewall Threat Defense 6.3 or later for the dynamic authorization to work.
-
Interface selection in RADIUS server is not supported on Secure Firewall Threat Defense 6.2.3 or earlier versions. The interface option will be ignored during deployment.
-
Firewall Threat Defense posture VPN does not support group policy change through dynamic authorization or RADIUS change of authorization (CoA).
Do This |
More Info |
|
---|---|---|
Step 1 |
Log on to your Secure Firewall Management Center web interface. |
|
Step 2 |
Configure a RADIUS server object with dynamic authorization. |
|
Step 3 |
Configure a route to ISE server through an interface enabled for change of authorization (CoA) to establish connectivity from Firewall Threat Defense to RADIUS server through routing or a specific interface. |
|
Step 4 |
Configure a remote access VPN policy and select the RADIUS server group object that you have created with dynamic authorization. |
|
Step 5 |
Configure the DNS server details and domain-lookup interfaces using the Platform Settings. |
|
Step 6 |
Configure a split-tunnel in group policy to allow DNS traffic through Remote Access VPN tunnel if the DNS server is reachable through VNP network. |
|
Step 7 |
Deploy the configuration changes. |