Configure Cisco Identity Services Engine (ISE): RADIUS Authentication

Note:  The instructions given in the topic are based on ISE v3.3.x.

1.   Log into ISE.
2. Go to Administration>Network Devices.
3. Click Add. The New Network Device page appears.
a. Enter the device name in the Name field.
b. Enter the IP address and net mask value of the GigaVUE FM device in the IP Address field.
c. Select the RADIUS Authentication Settings checkbox.
d. Configure a key for the RADIUS authentication in the Shared Secret field.
4. Click Submit.
5. Go to Administration>Identity Management>Identities.
a. Create users for RADIUS authentication.
6. Go to Administration>Identity Management>Groups>User Identity Groups.
a. Create user groups and assign the users to specific user groups.

Note:  Refer Add Users and Create User Groups topics in CISCO ISE documentation for more information.

7. Go to Policy>Policy Elements>Results.
8. In the Results page, go to Authorization>Authorization Profiles.
a. Click Add to create an authorization profile that will be mapped to the user groups.
b. Enter the name for the authorization profile in the Name field.
c. In the Common Tasks section, select the ASA VPN option and enter the user group that needs to be mapped to the user group in GigaVUE‑FM
9. Go to Policy>Policy Sets. The New Policy Set page appears.
10. . Do the following steps to create a new policy.
a. In the Authentication Policy section, create an authentication rule and map it to the users who can be authenticated to access GigaVUE‑FM through RADIUS authentication.
b. In the Authorization Policy section, create an authorization rule that maps the user groups with the created RADIUS authorization profile.