Guest

Preview Tool

Cisco Bug: CSCvh99159 - RADIUS authentication/authorization fails for ASDM

Last Modified

Aug 19, 2019

Products (1)

  • Cisco ASA 5500-X Series Firewalls

Known Affected Releases

9.6(4)

Description (partial)

Symptom:
ASDM users will not be allowed to connect if the ASA is configured to require RADIUS authentication and RADIUS authorization of administrative http users

Conditions:
The ASA is configured as in the following example:

aaa-server radsvr protocol radius
aaa-server radsvr (inside) host <ServerIP>
 key *****

aaa authentication http console radsvr
aaa authorization http console radsvr
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.