Configure the Cisco ASA VPN to interoperate with RADIUS
During this task we will configure the Cisco ASA VPN, specifically:
- Define a RADIUS Server Profile
 - Define an Authentication Profile for Okta RADIUS Agent
 - Apply the Okta RADIUS Authentication Profile to a Gateway
 - Configure the portal to use the Okta RADIUS Authentication Profile. 
 
Steps
Before you begin
- Ensure that you have the common UDP port and secret key values available.
 
Configure Cisco ASA VPN
- Define an AAA Server Group
- Sign in to the Cisco ASDM console for the VPN appliance using an account with sufficient privileges.
 - Navigate to , as shown below.

 - Click Add to create a new group. The Add AAA Server Group dialog displays.
                  

 Leave the default settings except for the following:
AAA Server Group – specify a name to identify the group for the MFA server
Protocol – select RADIUS if necessary
- Click OK.
 
 - Add AAA Server(s) to your AAA Server Group
Select Remote Access VPN and navigate to .
Select the server group just created.- Click Add. 
The Edit 'ServerName' Server dialog displays.
 - Specify the following, leaving all other fields unchanged:				
- Interface Name – select the interface that will handle communication with the MFA Server
 - Server Name or IP Address – specify the name or the IP address of the Okta RADIUS Agent
 - Timeout (seconds) – 60 seconds
 - Server Authentication port – enter the required port number. Port 1812 was used as the example.
 - Server Accounting Port – 1646. This value is not used, but must be entered to complete the setup.
 - Retry Interval – leave default at 60 seconds
 - Server Secret Key – provided secret defined when setting up the app in Okta.
 - Common Password – leave blank.
 - Uncheck Microsoft CHAPv2 Capable. (important).
 
 - Click OK.
 Click APPLY to save the configuration.
 
Modify the IPSec(IKEv2) Connection Profile
Modify the IPSec(IKEv2) Connection Profile to use the new Authentication Server group.
- Open the Cisco ASDM console for the VPN appliance.
 - Click Configuration.
            

 - Select Remote Access VPN.

 - In the Remote Access VPN section, select IPsec(IKEv2) Connection Profiles.
            

 - Select the DefaultRAGroup group, and click Edit.
            

 - In the IKE Peer Authentication Group section enable Enable Peer to Peer authentication using EAP and
					Send an EAP Identity request to the client.
               

 - 
                                                            
Click OK to save.
 
