There are couple of cisco 3030 vpn servers in our network. Users use soft token to auth to these servers. Servers are running version 4.7.2D. I am not sure why but the SDI servers are actualy configured to talk to cisco boxes via Radius protocol. I am not sure why would someone will setup SDI on Cisco like this, but its been working for a while. I am having issue where soft tokens are getting corrupt and I am not sure if this is one of the resons or not!!.
Can someone provide some insight on :-
a) RSA Servers configured via Radius ?? Why would we do this?
b) Any ideas to troubleshoot soft token corruption.
There might be some reasons why the 3030s were set up to authenticate via Radius using RSA soft tokens. Are there other Cisco devices in the network that authenticate via soft token? In IOS and in Catalyst there is not support for direct communication with RSA so if you want to authenticate via soft token it must be configured to authenticate with TACACS or Radius and the TACACS or Radius server must send the authentication request to RSA. If there are other Cisco devices authenticating for soft token then perhaps the 3030s were set up that way for consistency.
I doubt that authenticating with Radius is causing soft tokens to become corrupted.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :