Cisco Cisco ASA 5506W-X with FirePOWER Services 技術マニュアル

ページ / 10
The information in this document is based on these software and hardware versions:
Firepower Management Center (FMC) version 6.0.0 and above
Firepower sensor version 6.0.0 and above
The information in this document was created from the devices in a specific lab environment. All of
the devices used in this document started with a cleared (default) configuration. If your network is
live, make sure that you understand the potential impact of any command.
Background Information
Captive Portal Authentication or Active Authentication prompts a login page and user credentials
are required for a host to get the internet access.
Single-Sign-On or Passive Authentication provides seamless authentication to a user for network
resources and internet access without entering user credential multiple times. The Single-Sign-on
authentication can be achieved either by Firepower user agent or NTLM browser authentication. 
Note: For Captive Portal Authentication, appliance must be in routed mode.
Configure
Step 1. Configure the Firepower User Agent for Single-Sign-On 
This article explains how to configure Firepower User Agent in a Windows machine:
Step 2. Integrate the Firepower Management Center (FMC) with User Agent
Log in to Firepower Management Center, navigate to System > Integration > Identity
Sources. 
Clickthe New Agent option. Configure the IP address of User Agent system & click the
Add button.
Click the Save button to save the changes. 
Step 3. Integrate 
Step 3.1  Create the Realm