Preview Tool

Cisco Bug: CSCvh99159 - RADIUS authentication/authorization fails for ASDM

Last Modified

Sep 20, 2019

Products (1)

  • Cisco ASA 5500-X Series Firewalls

Known Affected Releases


Description (partial)

ASDM users will not be allowed to connect if the ASA is configured to require RADIUS authentication and RADIUS authorization of administrative http users

The ASA is configured as in the following example:

aaa-server radsvr protocol radius
aaa-server radsvr (inside) host <ServerIP>
 key *****

aaa authentication http console radsvr
aaa authorization http console radsvr
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.