Skip to content

Cisco AnyConnect MFA with Mideye & FMC (FTD)

ComponentDetails
PlatformSecure Firewall Threat Defense (FTD)
ManagementFirepower Management Center (FMC)
VPNRemote Access VPN (AnyConnect / Cisco Secure Client)
AuthenticationRADIUS Server Group

Cisco’s FMC device configuration guides for Remote Access VPN and identity integration (RADIUS/AD/LDAP) are published per major release. Refer to the FMC 7.7 Remote Access VPN identity integration guide for the latest reference.


Cisco Secure Client (formerly AnyConnect) licenses are required for Remote Access VPN on firewalls running Secure Firewall ASA or Secure Firewall Threat Defense.

  • Feature tiers: Cisco historically offered AnyConnect Plus and Apex tiers. Apex includes advanced capabilities such as posture assessment. Map these to customer requirements as needed.
  • Smart Licensing: Modern FMC/FTD deployments use Smart Licensing. Confirm that the FMC/FTD is properly registered and licensed.

Practical takeaway: Verify that the customer has valid Secure Client / AnyConnect licensing for RA VPN and that Smart Licensing is active before proceeding.


  • Mideye Server reachable from the firewall on UDP port 1812 (default RADIUS port).
  • Decide whether you will also use Authorization and/or Accounting via RADIUS in the VPN policy.
  • Create a RADIUS client in Mideye Server for the firewall (or the source IPs that will send RADIUS requests). See RADIUS Clients in the reference guide.

In FMC, Remote Access VPN uses a Realm or a RADIUS Server Group for user validation.

  1. In FMC, navigate to Objects → Object Management → AAA Server → RADIUS Server Group.
  2. Create a new RADIUS Server Group (example name: Mideye_RADIUS_Group).
  3. Add one or more RADIUS servers (your Mideye Server nodes), including:
    • IP address or hostname
    • Shared secret (must match the Mideye Server RADIUS client configuration)
    • Timeout: set to at least 35 seconds (required for MFA / OTP flows)

Add RADIUS Server Group in FMC


  1. Navigate to Devices → Remote Access and click Add to start the RA VPN wizard.
  2. Enter a policy name and description, select the VPN protocol (typically SSL), and select the target FTD device(s). Click Next.

Remote Access VPN Policy Wizard

  1. Enter a Connection Profile name and select AAA Only in the authentication dropdown (typical for username/password + OTP flows).
  2. Select your RADIUS Server Group for Authentication. Optionally select the same or a different RADIUS Server Group for Authorization and Accounting.
  3. Configure client address assignment — create a new IP pool or use a predefined one.

Connection Profile configuration

  1. On the next page, select the AnyConnect / Secure Client images.
  2. Click Next to select the outside interface and certificate for Remote Access.
  3. Complete the wizard and deploy the configuration.

3. Set AnyConnect / Secure Client timeout for MFA

Section titled “3. Set AnyConnect / Secure Client timeout for MFA”

There are two timeout layers that must both be configured for MFA to work reliably:

A) RADIUS Server Group timeout (server-side)

Section titled “A) RADIUS Server Group timeout (server-side)”

This was already set in step 1. Keep it at ≥ 35 seconds.

B) AnyConnect / Secure Client authentication timeout (client-side)

Section titled “B) AnyConnect / Secure Client authentication timeout (client-side)”

The AnyConnect Profile Editor controls how long the client waits for an authentication response before timing out.

  1. Download the AnyConnect Profile Editor matching your Secure Client / AnyConnect major version from cisco.com.
  2. Open the profile editor and navigate to Preferences (Part 2).
  3. Set Authentication Timeout (seconds) to 35.

AnyConnect Profile Editor — Preferences (Part 2)

Authentication timeout set to 35 seconds

  1. Save the profile XML file (example: Mideye.xml).
  2. In FMC, edit your Remote Access VPN policy, click Edit Group Policy under the Group Policy name, and select the AnyConnect tab.
  3. Upload the saved XML profile and associate it with the group policy.
  4. Deploy the updated configuration.

4. Add the firewall as a RADIUS client in Mideye Server

Section titled “4. Add the firewall as a RADIUS client in Mideye Server”

Add the firewall (or the NAT/source IP that originates RADIUS traffic) as a RADIUS client in Mideye Server. Ensure:

  • The shared secret matches the FMC RADIUS Server Group configuration
  • The UDP port matches (default 1812)
  • Any vendor-specific requirements are configured (if applicable)

See RADIUS Clients in the reference guide.


SymptomCheck
Authentication fails quickly / times outVerify both the RADIUS Server Group timeout (≥ 35s) and the client profile Authentication Timeout (≥ 35s)
FMC/FTD shows “realm/RADIUS” errorsConfirm the RADIUS Server Group object exists and is referenced by the VPN policy
RA VPN features blocked by licensingVerify Secure Client / AnyConnect licensing and Smart Licensing status in FMC
OTP never arrivesVerify network connectivity between the FTD and Mideye Server on UDP 1812
Shared secret mismatchEnsure the secret configured in FMC matches the RADIUS client in Mideye Server exactly