index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
1,223 | History for RADIUS Servers for AAA
Table 49: History for RADIUS Servers for AAA
Feature Name Platform Releases Description
Describes how to configure RADIUS servers for AAA.
We introduced the following commands:
aaa-server protocol, max-failed-attempts, reactivation-mode,
accounting-mode simultaneous, aaa-server host, ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,224 | CHAPTER 39
TACACS+ Servers for AAA
This chapter describes how to configure TACACS+ servers used in AAA.
• About TACACS+ Servers for AAA, on page 1165
• Guidelines for TACACS+ Servers for AAA, on page 1166
• Configure TACACS+ Servers, on page 1167
• Monitoring TACACS+ Servers for AAA, on page 1170
• History for TACACS+ ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,225 | Attribute Description
Specifies the absolute amount of time in minutes that authentication credentials remain
active before the authenticated user session is terminated.
timeout
The following table lists supported TACACS+ accounting attributes.
.
Table 51: Supported TACACS+ Accounting Attributes
Attribute Description
S... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,226 | IPv6
The AAA server can use either an IPv4 or IPv6 address.
Additional Guidelines
• You can have up to 200 server groups in single mode or 4 server groups per context in multiple mode.
• Each group can have up to 16 servers in single mode or 8 servers in multiple mode.
Configure TACACS+ Servers
This section describes h... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,227 | The number argument can range from 1 and 5. The default is 3.
If you configured a fallback method using the local database (for management access only), and all the servers
in the group fail to respond, or their responses are invalid, then the group is considered to be unresponsive,
and the fallback method is tried. Th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,228 | Add a TACACS+ Server to a Group
To add a TACACS+ server to a group, perform the following steps:
Procedure
Step 1 Identify the TACACS+ server and the server group to which it belongs.
aaa-server server_group [(interface_name)] host server_ip
Example:
ciscoasa(config-aaa-server-group)# aaa-server servergroup1 outside ho... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,229 | the server to encrypt data between them and must be the same on both the client and server systems. The key
cannot contain spaces, but other special characters are allowed.
Monitoring TACACS+ Servers for AAA
See the following commands for monitoring TACACS+ servers for AAA:
• show aaa-server
This command shows the conf... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,230 | CHAPTER 40
LDAP Servers for AAA
This chapter describes how to configure LDAP servers used in AAA.
• About LDAP and the ASA, on page 1171
• Guidelines for LDAP Servers for AAA, on page 1174
• Configure LDAP Servers for AAA, on page 1175
• Monitoring LDAP Servers for AAA, on page 1181
• History for LDAP Servers for AAA, ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,231 | The ASA and LDAP server supports any combination of these SASL mechanisms. If you configure multiple
mechanisms, the ASA retrieves the list of SASL mechanisms that are configured on the server, and sets the
authentication mechanism to the strongest one configured on both the ASA and the server. For example, if
both the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,232 | • Search Scope defines the extent of the search in the LDAP hierarchy. The search proceeds this many
levels in the hierarchy below the LDAP Base DN. You can choose to have the server search only the
level immediately below it, or it can search the entire subtree. A single level search is quicker, but a
subtree search i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,233 | Note As an LDAP client, the ASA does not support the transmission of anonymous binds or requests.
LDAP Attribute Maps
The ASA can use an LDAP directory for authenticating users for:
• VPN remote access users
• Firewall network access/cut-through-proxy sessions
• Setting policy permissions (also called authorization att... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,234 | IPv6
The AAA server can use either an IPv4 or IPv6 address.
Additional Guidelines
• The DN configured on the ASA to access a Sun directory server must be able to access the default
password policy on that server. We recommend using the directory administrator, or a user with directory
administrator privileges, as the D... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,235 | Example:
ciscoasa(config)# ldap-attribute-map att_map_1
Step 2 Map the user-defined attribute name department to the Cisco attribute.
map-name user-attribute-name Cisco-attribute-name
Example:
ciscoasa(config-ldap-attribute-map)# map-name department IETF-Radius-Class
Step 3 Map the user-defined map value department to ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,236 | ciscoasa(config)# ldap attribute-map MGMT
ciscoasa(config-ldap-attribute-map)# map-name accessType IETF-Radius-Service-Type
ciscoasa(config-ldap-attribute-map)# map-value accessType VPN 5
ciscoasa(config-ldap-attribute-map)# map-value accessType admin 6
ciscoasa(config-ldap-attribute-map)# map-value accessType helpdesk... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,237 | When you enter the aaa-server protocol command, you enter aaa-server group configuration mode.
Step 2 Specify the maximum number of failed AAA transactions with an LDAP server in the group before trying
the next server.
max-failed-attempts number
Example:
ciscoasa(config-aaa-server-group)# max-failed-attempts 2
The num... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,238 | Table 54: Host Mode Commands and Defaults
Command Default Value Description
ldap-attribute-map — —
ldap-base-dn — —
ldap-login-dn — —
ldap-login-password — —
ldap-naming-attribute — —
If not set, the ASA uses sAMAccountName for LDAP requests. Whether using
SASL or plain text, you can secure communications between the A... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,239 | ciscoasa(config)# aaa-server watchdogs protocol ldap
ciscoasa(config-aaa-server-group)# aaa-server watchdogs host 192.168.3.4
ciscoasa(config-aaa-server-host)# exit
ciscoasa(config)#
Configure Authorization with LDAP for VPN
When LDAP user authentication for VPN access has succeeded, the ASA queries the LDAP server, wh... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,240 | Example
While there are other authorization-related commands and options available forspecific requirements,
the following example shows commands for enabling user authorization with LDAP. The example
then creates an IPsec remote access tunnel group named remote-1, and assigns that new tunnel group
to the previously cr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,241 | History for LDAP Servers for AAA
Table 55: History for AAA Servers
Platform Description
Releases
Feature Name
LDAPServers describe support for AAA and how to configure
LDAP servers.
We introduced the following commands:
username, aaa authorization exec authentication-server,
aaa authenticationconsole LOCAL, aaa authori... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,242 | CHAPTER 41
Kerberos Servers for AAA
The following topics explain how to configure Kerberos servers used in AAA. You can use Kerberos servers
for the authentication of management connections, network access, and VPN user access.
• Guidelines for Kerberos Servers for AAA, on page 1183
• Configure Kerberos Servers for AAA... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,243 | ciscoasa(config)# aaa-server watchdog protocol kerberos
Step 2 (Optional.) Specify the maximum number of failed AAA transactions with a AAA server in the group before
trying the next server.
max-failed-attempts number
Example:
ciscoasa(config-aaa-server-group)# max-failed-attempts 2
The number argument can range from 1... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,244 | For information about how to upload the keytab file, see Configure Kerberos Key Distribution Center
Validation, on page 1186.
Example
The following example creates a Kerberos server group named watchdogs, adds a server, and sets
the realm to EXAMPLE.COM.
hostname(config)# aaa-server watchdogs protocol kerberos
hostname... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,245 | Example:
ciscoasa(config-aaa-server-host)# retry-interval 6
Step 4 Specify the server port if it is different from the default Kerberos port, which is TCP/88. The ASA contacts
the Kerberos server on this port.
server-port port_number
Example:
ciscoasa(config-aaa-server-host)# server-port 8888
Step 5 Configure the Kerbe... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,246 | validates the returned service ticket against the secret key for the KDC, which is stored in a keytab file that
you generated from the KDC and then uploaded to the ASA. If KDC authentication fails, the server is considered
untrusted and the user is not authenticated.
The following procedure explains how to accomplish K... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,247 | Showsthe AAA serversthat are configured for the system. Use the clear configure aaa-server command
to remove the AAA server configuration.
• show aaa kerberos [username user]
Shows all Kerberos tickets, or tickets for a given username.
• clear aaa kerberos tickets [username user]
Clears all Kerberos tickets, or tickets... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,248 | Platform Description
Releases
Feature Name
You can import a keytab file from a Kerberos Key Distribution
Center (KDC), and the system can authenticate that the Kerberos
server is not being spoofed before using it to authenticate users.
To accomplish KDC authentication, you must set up a
host/ASA_hostname service princi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,249 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
1190
AAA Servers and the Local Database
History for Kerberos Servers for AAA | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,250 | CHAPTER 42
RSA SecurID Servers for AAA
The following topics explain how to configure RSA SecurID servers used in AAA. The RSA SecureID servers
are also known as SDI servers, because SDI is the protocol used to communicate with them. You can use
RSA SecurID serversfor the authentication of management connections, networ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,251 | Configure RSA SecurID Servers for AAA
The following topics explain how to configure RSA SecurID server groups. You can then use these groups
when configuring management access or VPNs.
Configure RSA SecurID AAA Server Groups
If you want to use direct communication with an RSA SecurID server for authentication, you must... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,252 | The depletion keyword reactivates failed servers only after all of the servers in the group are inactive. This
is the default mode.
The deadtime minutes keyword-argument pair specifies the amount of time in minutes, between 0 and 1440,
that elapses between the disabling of the last server in the group and the subsequen... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,253 | ciscoasa(config-aaa-server-host)# retry-interval 6
Step 4 Specify the server port if it is different from the default RSA SecurID port, which is TCP/5500. The ASA
contacts the RSA SecurID server on this port.
server-port port_number
Example:
ciscoasa(config-aaa-server-host)# server-port 5555
Import the SDI Node Secret ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,254 | Monitor RSA SecurID Servers for AAA
You can use the following commands to monitor and clear RSA SecurID-related information.
• show aaa-server
Showsthe AAA serverstatistics. Use the clear aaa-server statistics command to clear the serverstatistics.
• show running-config aaa-server
Showsthe AAA serversthat are configure... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,255 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
1196
AAA Servers and the Local Database
History for RSA SecurID Servers for AAA | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,256 | P ART VII
System Administration
• Management Access, on page 1199
• Software and Configurations, on page 1249
• Response Automation for System Events, on page 1291
• Testing and Troubleshooting, on page 1303 | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,257 | null | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,258 | CHAPTER 43
Management Access
This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS
(using ASDM), how to authenticate and authorize users, and how to create login banners.
• Configure Management Remote Access, on page 1199
• Configure AAA for System Administrators, on page 121... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,259 | Note that the Cisco SSH stack does not support:
• SSH to a different interface over VPN (management-access)
• EDDSA key pair
• RSA key pair in FIPS mode
If you need these features, you should use the ASA SSH stack.
There is a small change to SCP functionality with the CiscoSSH stack: to use the ASA copy command
to copy... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,260 | The larger the key size you specify, the longer it takesto generate a key pair.SSH tries keysin the following
order: EdDSA, ECDSA, and then RSA. View the keys using the show crypto key mypubkey {eddsa |
ecdsa | rsa} command. The keys used by SSH are called <Default-type-Key>.
b) (Optional) If you do not want to use the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,261 | AAAAC3NzaC1lZDI1NTE5AAAAIDmIeTNfEOnuH0094p1MKX80fW2O216g4trnf7gwWe5Q
---- END SSH2 PUBLIC KEY ----
quit
INFO: Import of an SSH public key formatted file SUCCEEDED.
For a localusername, you can enable public key authentication instead of/as well as password authentication.
You can generate a public key/private key pair ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,262 | ciscoasa(config)# ssh timeout 30
Set the timeout from 1 to 60 minutes. The default is 5 minutes. The default duration is too short in most cases,
and should be increased until all pre-production testing and troubleshooting have been completed.
Step 9 (Optional) Enable the Secure Copy (SCP) server.
ssh scopy enable
The ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,263 | • The high keyword specifies only high-strength ciphers (the default): hmac-sha2-256
• The low keyword specifieslow, medium, and high strength ciphers: hmac-sha1 hmac-sha1-96 hmac-md5
hmac-md5-96 hmac-sha2-256
• The medium keyword specifies the medium and high strength ciphers: hmac-sha1 hmac-sha1-96
hmac-sha2-256
Step... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,264 | Your public key has been saved in /Users/dean/.ssh/id_ed25519.pub.
The key fingerprint is:
SHA256:ZHOjfJa3DpZG+qPAp9A5PyCEY0+Vzo2rkGHJpplpw8Q dean@dwinchester-mac
The key's randomart image is:
+--[ED25519 256]--+
| . |
| o |
|. . + o+ o |
|.E+ o ++.+ o |
|B=.= .S = . |
|** ooo. = o . |
|.....o*.o = . |
| o .. *.+.o |
|... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,265 | Configure Telnet Access
To identify the client IP addresses allowed to connect to the ASA using Telnet, perform the following steps.
See the following guidelines:
• To access the ASA interface for Telnet access, you do not also need an access rule allowing the host IP
address. You only need to configure Telnet access a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,266 | Set the timeout from 1 to 1440 minutes. The default is 5 minutes. The default duration is too short in most
cases and should be increased until all pre-production testing and troubleshooting have been completed.
Examples
The following example shows how to let a host on the inside interface with an address of 192.168.1.... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,267 | Before you begin
• In multiple context mode, complete this procedure in the context execution space. To change from the
system to a context configuration, enter changeto context name.
Procedure
Step 1 Identify the IP addresses from which the ASA accepts HTTPS connections for each address or subnet on the
specified inte... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,268 | Enter each client string using a separate command. Many specialty clients (for example, python libraries, curl,
and wget) do not support Cross-site request forgery (CSRF) token-based authentication, so you need to
specifically allow these clientsto use the ASA basic authentication method.Forsecurity purposes, you shoul... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,269 | Configure HTTP Redirect for ASDM Access or Clientless SSL VPN
You must use HTTPS to connect to the ASA using ASDM or clientless SSL VPN. For your convenience,
you can redirect HTTP management connections to HTTPS.For example, by redirecting HTTP, you can enter
either http://10.1.8.4/admin/ or https://10.1.8.4/admin/ an... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,270 | Before you begin
This feature is not supported on management-only interfaces.
Procedure
Specify the name of the management interface that you want to access when entering the ASA from another
interface.
management-access management_interface
For Easy VPN and Site-to-Site tunnels, you can specify a named BVI (in routed ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,271 | • Ensure that the FXOS gateway is set to forward traffic to the ASA data interfaces (the default). See the
getting started guide for more information about setting the gateway.
Procedure
Step 1 Enable FXOS remote management.
fxos {https | ssh | snmp} permit {ipv4_address netmask | ipv6_address/prefix_length} interface_... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,272 | Change the Console Timeout
The console timeout sets how long a connection can remain in privileged EXEC mode or configuration mode;
when the timeout is reached, the session drops into user EXEC mode. By default, the session does not time
out. This setting does not affect how long you can remain connected to the console... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,273 | Displays the traffic-passing state or role of the unit.
For failover, the following values are displayed for the state keyword:
• act—Failover is enabled, and the unit is actively passing traffic.
• stby— Failover is enabled, and the unit is not passing traffic and is in a
standby, failed, or other non-active state.
• ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,274 | • See RFC 2196 for guidelines about banner messages.
Procedure
Add a banner to display at one of three times: when a user first connects (message-of-the-day (motd)), when
a user logs in (login), and when a user accesses privileged EXEC mode (exec).
banner {exec | login | motd} text
Example:
ciscoasa(config)# banner mot... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,275 | If you also set a resource limit per context for the maximum administrative sessions (SSH, etc.), then the
lower value will be used.
Note
Before you begin
In multiple context mode, complete this procedure in the context execution space. To change from the system
to a context configuration, enter the changeto context na... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,276 | Configure AAA for System Administrators
Thissection describes how to configure authentication, management authorization, and command authorization
for system administrators.
Configure Management Authentication
Configure authentication for CLI and ASDM access.
About Management Authentication
How you log into the ASA dep... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,277 | • AAA Authentication—When you enable ASDM (HTTPS) authentication, you enter the username and
password as defined on the AAA server or local user database. You can no longer use ASDM with a
blank username and the enable password.
• AAA Authentication plus Certificate Authentication—(Single, routed mode only) When you en... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,278 | In multiple context mode, you cannot configure any AAA commands in the system configuration. However,
if you configure Telnet or serial authentication in the admin context, then authentication also applies to these
sessions. The admin context AAA server or local user database is used in this instance.
Configure Authent... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,279 | Before you begin
See About Enable Authentication, on page 1218.
Procedure
Choose one of the following options for authenticating users:
• To authenticate users with a AAA server or the local database, enter the following command:
aaa authentication enable console {LOCAL | server_group [LOCAL]}
Example:
ciscoasa(config)... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,280 | Procedure
Step 1 Enable certificate authentication:
http authentication-certificate interface_name[match certificate_map_name]
Example:
ciscoasa(config)# crypto ca certificate map map1 10
ciscoasa(config-ca-cert-map)# subject-name emailAddress www.example.com
ciscoasa(config)# http authentication-certificate outside ma... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,281 | • SP—State/Province
• T—Title
• UID User ID
• UPN—User Principal Name
• The use-entire-name keyword uses the entire DN name.
• The use-script keyword uses a Lua script generated by ASDM.
• Thepre-fill-username keyword pre-fillsthe username when prompted for authentication. If the username
is different from the one you ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,282 | RADIUS/LDAP TACACS+ Attributes Local Database Attributes
(Mapped) Attributes
Management Level
Service-Type 6 PASS, privilege level 1 admin
(Administrative),
Privilege-Level 1
Full Access—Allows full access to any services
specified by the aaa authentication console
commands
PASS, privilege level 2 nas-prompt
and higher... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,283 | aaa authorization http console {authentication-server | LOCAL}
Example:
ciscoasa(config)# aaa authentication http console RADIUS
ciscoasa(config)# aaa authorization http console authentication-server
Step 3
Examples
The following example shows how to define an LDAP attribute map. In this example, the security
policy sp... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,284 | EXEC mode when they first log in (commands at level 0 or 1). The user needs to authenticate again with
the enable command to access privileged EXEC mode (commands at level 2 or higher), or they can log
in with the login command (local database only).
You can use local command authorization without any users in the loca... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,285 | • show pager
• clear pager
• quit
• show version
If you move any configure mode commands to a lower level than 15, be sure to move the configure command
to that level as well, otherwise, the user cannot enter configuration mode.
Configure Local Command Authorization
Local command authorization lets you assign commands ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,286 | aaa authorization exec authentication-server [auto-enable]
Example:
ciscoasa(config)# aaa authorization exec authentication-server
This command also enables management authorization.See Control CLI and ASDM Access with Management
Authorization, on page 1222.
Step 3 Enable the use of local command privilege levels:
aaa ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,287 | The following example shows an additional command, the configure command, which uses the
mode keyword:
ciscoasa(config)# privilege show level 5 mode cmd command configure
ciscoasa(config)# privilege clear level 15 mode cmd command configure
ciscoasa(config)# privilege cmd level 15 mode cmd command configure
ciscoasa(co... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,288 | Figure 76: Permitting All Related Commands
• For commands that are a single word, you must permit unmatched arguments, even if there are no
arguments for the command, for example enable or help (see the following figure).
Figure 77: Permitting Single Word Commands
• To disallow some arguments, enter the arguments prece... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,289 | Figure 78: Disallowing Arguments
• When you abbreviate a command at the command line, the ASA expands the prefix and main command
to the full text, but it sends additional arguments to the TACACS+ server as you enter them.
For example, if you enter sh log, then the ASA sends the entire command to the TACACS+ server, sh... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,290 | • pager
• show pager
• clear pager
• quit
• show version
Configure TACACS+ Command Authorization
If you enable TACACS+ command authorization, and a user enters a command at the CLI, the ASA sends
the command and username to the TACACS+ server to determine if the command is authorized.
Before you enable TACACS+ command ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,291 | Configure a Password Policy for Local Database Users
When you configure authentication for CLI or ASDM access using the local database, you can configure a
password policy that requires a user to change their password after a specified amount of time and also requires
password standards such as a minimum length and the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,292 | Character matching is position independent, meaning that new password characters are considered changed
only if they do not appear anywhere in the current password.
Step 3 (Optional) Set the minimum length of passwords.
password-policy minimum-length value
Example:
ciscoasa(config)# password-policy minimum-length 8
Val... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,293 | Example:
ciscoasa(config)# password-policy reuse-interval 5
You can prohibit the reuse of a password that matches previously used passwords, between 2 and 7 previous
passwords. The previous passwords are stored in the configuration under each username in encrypted form
using the password-history command; this command i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,294 | ciscoasa# change-password old-password j0hncr1chton new-password a3rynsun
If you do not enter the old and new passwords in the command, the ASA prompts you for input.
Enable and View the Login History
By default, the login history is saved for 90 days. You can disable this feature or change the duration, up to
365 days... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,295 | ciscoasa(config)# show aaa login-history
Login history for user: turjan
Logins in last 1 days: 1
Last successful login: 16:44:32 UTC Jul 23 2018 from console
Failures since last login: 0
Last failed login: None
Privilege level: 14
Privilege level changed from 11 to 14 at: 14:07:30 UTC Aug 21 2018
Configure Management A... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,296 | The following table lists the common lockout conditions and how you might recover from them.
Table 56: CLI Authentication and Command Authorization Lockout Scenarios
Feature Lockout Condition Description Workaround: Single Mode Workaround: Multiple Mode
Session into the ASA from the
switch. From the system
execution sp... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,297 | This command shows privilege levels for all commands.
For the show running-config all privilege all command, the ASA displays the current assignment of
each CLI command to a privilege level. The following is sample output from this command:
ciscoasa(config)# show running-config all privilege all
privilege show level 15... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,298 | Table 57: show curpriv Command Output Description
Field Description
Username. If you are logged in as the default user, the name is enable_1 (user
EXEC) or enable_15 (privileged EXEC).
Username
Levels range from 0 to 15. Unless you configure local command authorization and
assign commands to intermediate privilege leve... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,299 | History for Management Access
Table 58: History for Management Access
Platform Description
Releases
Feature Name
The Cisco SSH stack is now used by default.
New/Modified commands: ssh stack ciscossh
CiscoSSH stack now default 9.19(1)
You can now add a loopback interface and use it for the following
features:
• SSH
• Te... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,300 | Platform Description
Releases
Feature Name
The ASA can lock out local users after a configurable number of failed
login attempts. This feature did not apply to users with privilege level
15. Also, a user would be locked out indefinitely until an admin unlocked
their account. Now, users will be unlocked after 10 minutes... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,301 | Platform Description
Releases
Feature Name
You can now set the idle timeout for all HTTPS connections to the ASA,
including ASDM, WebVPN, and other clients. Formerly, using the http
server idle-timeout command, you could only set the ASDM idle
timeout. If you set both timeouts, the new command takes precendence.
New/Mo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,302 | Platform Description
Releases
Feature Name
When you authenticate for enable access (aaa authentication enable
console) or allow privileged EXEC access directly (aaa authorization
exec auto-enable), then the ASA now notifies users if their assigned
access level has changed since their last login.
New/Modified commands: ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,303 | Platform Description
Releases
Feature Name
In releases prior to 9.6(2), you could enableSSH public key authentication
(ssh authentication) without also explicitly enabling AAA SSH
authentication with the Local user database (aaa authentication ssh
console LOCAL). In 9.6(2), the ASA required you to explicitly enable
AAA... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,304 | Platform Description
Releases
Feature Name
When you enable ASDM certificate authentication (http
authentication-certificate), you can configure how ASDM extracts the
username from the certificate; you can also enable pre-filling the username
at the login prompt.
We introduced the following command:httpusername-from-cer... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,305 | Platform Description
Releases
Feature Name
When you configure authentication for CLI or ASDM access using the
local database, you can configure a password policy that requires a user
to change their password after a specified amount of time and also requires
password standards such as a minimum length and the minimum n... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,306 | Platform Description
Releases
Feature Name
We introduced this feature.
We introduced the following commands:
show running-config all privilege all, show running-config privilege
level,show running-configprivilege command, telnet, telnet timeout,
ssh, ssh timeout, http, http server enable, asdm image disk, banner,
conso... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,307 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
1248
System Administration
History for Management Access | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,308 | CHAPTER 44
Software and Configurations
This chapter describes how to manage the ASA software and configurations.
• Upgrade the Software, on page 1249
• Load an Image Using ROMMON (ISA 3000), on page 1249
• Upgrade the ROMMON Image (ISA 3000), on page 1251
• Downgrade Your Software, on page 1252
• Manage Files, on page ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,309 | Be sure that the connection to the network already exists.
The interface command is ignored on the ASA 5506-X, ASA 5508-X, and ASA 5516-X, and
ISA 3000 platforms, and you must perform TFTP recovery on these platforms from the
Management 1/1 interface.
Note
Step 5 Validate your settings:
rommon #6> set
ROMMON Variable S... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,310 | After the software image is successfully loaded, the ASA automatically exits ROMMON mode.
Step 9 Booting the ASA from ROMMON mode does not preserve the system image across reloads; you must still
download the image to flash memory. See the Cisco ASA Upgrade Guide for full upgrade procedures.
Upgrade the ROMMON Image (I... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,311 | Computed Hash SHA2: d824bdeecee1308fc64427367fa559e9
eefe8f182491652ee4c05e6e751f7a4f
5cdea28540cf60acde3ab9b65ff55a9f
4e0cfb84b9e2317a856580576612f4af
Embedded Hash SHA2: d824bdeecee1308fc64427367fa559e9
eefe8f182491652ee4c05e6e751f7a4f
5cdea28540cf60acde3ab9b65ff55a9f
4e0cfb84b9e2317a856580576612f4af
Digital signatur... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,312 | • Downgrade to a pre-9.9(1) release when you enable cluster site redundancy—You should
disable site redundancy if you want to downgrade (or if you want to add a pre-9.9(1) unit to a cluster).
Otherwise, you will see side effects, for example, dummy forwarding flows on the unit running the
old version.
• Downgrade from ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,313 | • VPN tunnels are replicated to the standby unit even if the standby unit is running a version of
software that does not support the Ciphersuite that the original tunnel negotiated—This scenario
occurs when downgrading. In this case, disconnect your VPN connection and reconnect.
Incompatible Configuration Removed After... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,314 | Before you begin
This procedure requires a backup configuration of the ASA before you upgraded, so you can restore the old
configuration. If you do not restore the old configuration, you may have incompatible commandsrepresenting
new or changed features. Any new commands will be rejected when you load the old software ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,315 | It'simportant that you do notsave the running configuration to the startup configuration using write memory;
this command will overwrite your backup configuration.
Example:
ciscoasa# copy disk0:/9.12.4_cfg.sav startup-config
Step 2 In FXOS, use the chassis manager or FXOS CLI to use the old ASA software version using t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,316 | Step 3 If you are also downgrading FXOS, use the chassis manager or FXOS CLI to set the old FXOS software
version to be the current version using the upgrade procedure in the ASA upgrade guide for standalone,
failover, or clustering deployments.
Downgrade the ISA 3000
The downgrade feature provides a shortcut for compl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,317 | Procedure
Step 1 View files in flash memory:
dir [disk0: | disk1:]
Example:
hostname# dir
Directory of disk0:/
500 -rw- 4958208 22:56:20 Nov 29 2004 cdisk.bin
2513 -rw- 4634 19:32:48 Sep 17 2004 first-backup
2788 -rw- 21601 20:51:46 Nov 23 2004 backup.cfg
2927 -rw- 8670632 20:42:48 Dec 08 2004 asdmfile.bin
Enter disk0:... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,318 | Erase the Flash File System
To erase the flash file system, perform the following steps.
Procedure
Step 1 Connect to the ASA console port according to the instructions inAccess the ISA 3000 Console, on page 11.
Step 2 Power off the ASA, then power it on.
Step 3 During startup, press the Escape key when you are prompted... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,319 | Before you begin
• The ASA license must have the strong encryption (3DES/AES) license to support SSH Version 2
connections.
• Unless otherwise specified, for multiple context mode, complete this procedure in the system execution
space. To change from the context to the system execution space, enter the changeto system ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,320 | Destination username [cisco]?
Destination password []? cisco123
Destination filename [x]?
By default, this option is enabled. When this option is enabled, you are prompted to accept or reject the host
key if it is not already stored on the ASA. When this option is disabled, the ASA accepts the host key
automatically if... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,321 | Source filename [files/config1.cfg]?config2.cfg
Destination filename [test.cfg]?
Accessing tftp://10.1.4.7/files/config2.cfg;int=outside...
You can override the filename when you enter the command; for example, when you use the copy command,
you can take advantage of the predefined TFTP server address but still enter a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,322 | copy [/noconfirm] [interface_name] tftp://server[/path]/src_filename {disk0|disk1}:/[path/]dest_filename
Example:
ciscoasa# copy tftp://10.1.1.67/files/context1.cfg disk0:/context1.cfg
Address or name of remote host [10.1.1.67]?
Source filename [files/context1.cfg]?
Destination filename [context1.cfg]?
Cryptochecksum: ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.