Configure Cisco ASA IKEv2 VPN

Okta lets you manage authorization and access to on-premises applications and resources using the RADIUS protocol and the Okta RADIUS agent. With the Okta RADIUS Server Agent organizations can delegate authentication to Okta. This page describes how to configure Cisco ASA IKEV2 VPN to use EAP-TTLS and the Okta RADIUS Server Agent.

Topics

Before you begin

Meet the following network connectivity requirements before you install the Okta RADIUS agent:

Source Destination Port/Protocol Description
Okta RADIUS Agent Okta Identity Cloud TCP/443

HTTP

Configuration and authentication traffic.
Client Gateway Okta RADIUS Agent UDP/1812 RADIUS (Default, you can change this when you install and configure the RADIUS app) RADIUS traffic between the gateway (client) and the RADIUS agent (server).

Supported factors

The size of the challenge message can be too large for the RADIUS prompt if you let users enroll too many factors. Okta recommends that you enroll no more than eight factors at a given time.

Okta supports the following factors for RADIUS apps:

MFA Factor

Password Authentication Protocol (PAP) Extensible Authentication Protocol - Generic Token Card (EAP-GTC) Extensible Authentication Protocol - Tunneled Transport Layer Security (EAP-TTLS)*
Custom TOTP Authentication Supported Supported Supported - as long as challenge is avoided. For example MFA only or "Password, passcode".
Duo (Push, SMS, and Passcode only) Supported Supported Duo passcode only.

Email

Supported

Supported

Supported when the string "EMAIL" is initially sent. Refer to associated note.

Google Authenticator

Supported Supported Supported, as long as challenge is avoided. For example MFA only or "Password, passcode".

Okta Verify (TOTP and PUSH)

Supported Supported Supported as long as challenge is avoided.

For example: MFA-only or "Password, MFA" for TOTP. Push can work with primary authentication with MFA as the push challenge is sent out-of-band.

Okta Verify (number challenge)

Not supported

Not supported

Not supported

RSA Token/ On-prem MFA

Supported

Supported

Supported - as long as challenge is avoided. For example MFA only or "Password, passcode".

Security Question

Supported (Password and MFA only) Supported (Password + MFA only). Not supported
SMS authentication Supported Supported Supported when the string "SMS" is sent. Refer to associated note.
Symantec VIP Supported Supported Supported - as long as challenge is avoided. For example MFA only or "Password, passcode".

Voice Call

Supported Supported Supported when the string "CALL" is sent. Refer to associated note.

YubiKey

Supported Supported Supported - as long as challenge is avoided. For example MFA only or "Password, passcode".

* RADIUS supports three authentication methods:

  • Password + MFA: Primary authentication using password, then the user is prompted to select factors to complete the authentication.
  • MFA Only: Instead of password, users enter either a one-time passcode (OTP), or one of EMAIL, SMS, CALL, PUSH (case insensitive).
  • Password and Passcode: Password entered immediately followed by a passcode in a request. Must be in the same request, for example: Abcd1234,879890" or "Abcd1234,SmS".

Protocols support the following authentication methods:

Protocol Supports
PAP Password and MFA, MFA, "Password and passcode".
EAP-TTLS MFA only, "Password and passcode".
EAP-GTC Password and MFA, MFA only, "Password and passcode".

Typical workflow

Task

Description

Download the RADIUS agent
Install the Okta RADIUS Agent.
Install either the Windows or Linux RADIUS agents as appropriate for your environment.
Configure the app
Configure gateway
Using the Cisco ASDM console, configure the Cisco ASA VPN to use the Okta RADIUS app.
Configure optional settings
Cisco ASA supports two optional settings: Client IP Reporting and Groups response. Configure optional settings
Configure Windows VPN
On the Windows client configure the Windows VPN.
Add root CA
Windows clients can avoid man-in-the-middle attacks by adding trusted CA certificates. On the Windows client install a trusted root CA certificate.
Test

Related topics