index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
1,223
History for RADIUS Servers for AAA Table 49: History for RADIUS Servers for AAA Feature Name Platform Releases Description Describes how to configure RADIUS servers for AAA. We introduced the following commands: aaa-server protocol, max-failed-attempts, reactivation-mode, accounting-mode simultaneous, aaa-server host, ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,224
CHAPTER 39 TACACS+ Servers for AAA This chapter describes how to configure TACACS+ servers used in AAA. • About TACACS+ Servers for AAA, on page 1165 • Guidelines for TACACS+ Servers for AAA, on page 1166 • Configure TACACS+ Servers, on page 1167 • Monitoring TACACS+ Servers for AAA, on page 1170 • History for TACACS+ ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,225
Attribute Description Specifies the absolute amount of time in minutes that authentication credentials remain active before the authenticated user session is terminated. timeout The following table lists supported TACACS+ accounting attributes. . Table 51: Supported TACACS+ Accounting Attributes Attribute Description S...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,226
IPv6 The AAA server can use either an IPv4 or IPv6 address. Additional Guidelines • You can have up to 200 server groups in single mode or 4 server groups per context in multiple mode. • Each group can have up to 16 servers in single mode or 8 servers in multiple mode. Configure TACACS+ Servers This section describes h...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,227
The number argument can range from 1 and 5. The default is 3. If you configured a fallback method using the local database (for management access only), and all the servers in the group fail to respond, or their responses are invalid, then the group is considered to be unresponsive, and the fallback method is tried. Th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,228
Add a TACACS+ Server to a Group To add a TACACS+ server to a group, perform the following steps: Procedure Step 1 Identify the TACACS+ server and the server group to which it belongs. aaa-server server_group [(interface_name)] host server_ip Example: ciscoasa(config-aaa-server-group)# aaa-server servergroup1 outside ho...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,229
the server to encrypt data between them and must be the same on both the client and server systems. The key cannot contain spaces, but other special characters are allowed. Monitoring TACACS+ Servers for AAA See the following commands for monitoring TACACS+ servers for AAA: • show aaa-server This command shows the conf...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,230
CHAPTER 40 LDAP Servers for AAA This chapter describes how to configure LDAP servers used in AAA. • About LDAP and the ASA, on page 1171 • Guidelines for LDAP Servers for AAA, on page 1174 • Configure LDAP Servers for AAA, on page 1175 • Monitoring LDAP Servers for AAA, on page 1181 • History for LDAP Servers for AAA, ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,231
The ASA and LDAP server supports any combination of these SASL mechanisms. If you configure multiple mechanisms, the ASA retrieves the list of SASL mechanisms that are configured on the server, and sets the authentication mechanism to the strongest one configured on both the ASA and the server. For example, if both the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,232
• Search Scope defines the extent of the search in the LDAP hierarchy. The search proceeds this many levels in the hierarchy below the LDAP Base DN. You can choose to have the server search only the level immediately below it, or it can search the entire subtree. A single level search is quicker, but a subtree search i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,233
Note As an LDAP client, the ASA does not support the transmission of anonymous binds or requests. LDAP Attribute Maps The ASA can use an LDAP directory for authenticating users for: • VPN remote access users • Firewall network access/cut-through-proxy sessions • Setting policy permissions (also called authorization att...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,234
IPv6 The AAA server can use either an IPv4 or IPv6 address. Additional Guidelines • The DN configured on the ASA to access a Sun directory server must be able to access the default password policy on that server. We recommend using the directory administrator, or a user with directory administrator privileges, as the D...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,235
Example: ciscoasa(config)# ldap-attribute-map att_map_1 Step 2 Map the user-defined attribute name department to the Cisco attribute. map-name user-attribute-name Cisco-attribute-name Example: ciscoasa(config-ldap-attribute-map)# map-name department IETF-Radius-Class Step 3 Map the user-defined map value department to ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,236
ciscoasa(config)# ldap attribute-map MGMT ciscoasa(config-ldap-attribute-map)# map-name accessType IETF-Radius-Service-Type ciscoasa(config-ldap-attribute-map)# map-value accessType VPN 5 ciscoasa(config-ldap-attribute-map)# map-value accessType admin 6 ciscoasa(config-ldap-attribute-map)# map-value accessType helpdesk...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,237
When you enter the aaa-server protocol command, you enter aaa-server group configuration mode. Step 2 Specify the maximum number of failed AAA transactions with an LDAP server in the group before trying the next server. max-failed-attempts number Example: ciscoasa(config-aaa-server-group)# max-failed-attempts 2 The num...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,238
Table 54: Host Mode Commands and Defaults Command Default Value Description ldap-attribute-map — — ldap-base-dn — — ldap-login-dn — — ldap-login-password — — ldap-naming-attribute — — If not set, the ASA uses sAMAccountName for LDAP requests. Whether using SASL or plain text, you can secure communications between the A...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,239
ciscoasa(config)# aaa-server watchdogs protocol ldap ciscoasa(config-aaa-server-group)# aaa-server watchdogs host 192.168.3.4 ciscoasa(config-aaa-server-host)# exit ciscoasa(config)# Configure Authorization with LDAP for VPN When LDAP user authentication for VPN access has succeeded, the ASA queries the LDAP server, wh...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,240
Example While there are other authorization-related commands and options available forspecific requirements, the following example shows commands for enabling user authorization with LDAP. The example then creates an IPsec remote access tunnel group named remote-1, and assigns that new tunnel group to the previously cr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,241
History for LDAP Servers for AAA Table 55: History for AAA Servers Platform Description Releases Feature Name LDAPServers describe support for AAA and how to configure LDAP servers. We introduced the following commands: username, aaa authorization exec authentication-server, aaa authenticationconsole LOCAL, aaa authori...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,242
CHAPTER 41 Kerberos Servers for AAA The following topics explain how to configure Kerberos servers used in AAA. You can use Kerberos servers for the authentication of management connections, network access, and VPN user access. • Guidelines for Kerberos Servers for AAA, on page 1183 • Configure Kerberos Servers for AAA...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,243
ciscoasa(config)# aaa-server watchdog protocol kerberos Step 2 (Optional.) Specify the maximum number of failed AAA transactions with a AAA server in the group before trying the next server. max-failed-attempts number Example: ciscoasa(config-aaa-server-group)# max-failed-attempts 2 The number argument can range from 1...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,244
For information about how to upload the keytab file, see Configure Kerberos Key Distribution Center Validation, on page 1186. Example The following example creates a Kerberos server group named watchdogs, adds a server, and sets the realm to EXAMPLE.COM. hostname(config)# aaa-server watchdogs protocol kerberos hostname...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,245
Example: ciscoasa(config-aaa-server-host)# retry-interval 6 Step 4 Specify the server port if it is different from the default Kerberos port, which is TCP/88. The ASA contacts the Kerberos server on this port. server-port port_number Example: ciscoasa(config-aaa-server-host)# server-port 8888 Step 5 Configure the Kerbe...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,246
validates the returned service ticket against the secret key for the KDC, which is stored in a keytab file that you generated from the KDC and then uploaded to the ASA. If KDC authentication fails, the server is considered untrusted and the user is not authenticated. The following procedure explains how to accomplish K...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,247
Showsthe AAA serversthat are configured for the system. Use the clear configure aaa-server command to remove the AAA server configuration. • show aaa kerberos [username user] Shows all Kerberos tickets, or tickets for a given username. • clear aaa kerberos tickets [username user] Clears all Kerberos tickets, or tickets...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,248
Platform Description Releases Feature Name You can import a keytab file from a Kerberos Key Distribution Center (KDC), and the system can authenticate that the Kerberos server is not being spoofed before using it to authenticate users. To accomplish KDC authentication, you must set up a host/ASA_hostname service princi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,249
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 1190 AAA Servers and the Local Database History for Kerberos Servers for AAA
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,250
CHAPTER 42 RSA SecurID Servers for AAA The following topics explain how to configure RSA SecurID servers used in AAA. The RSA SecureID servers are also known as SDI servers, because SDI is the protocol used to communicate with them. You can use RSA SecurID serversfor the authentication of management connections, networ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,251
Configure RSA SecurID Servers for AAA The following topics explain how to configure RSA SecurID server groups. You can then use these groups when configuring management access or VPNs. Configure RSA SecurID AAA Server Groups If you want to use direct communication with an RSA SecurID server for authentication, you must...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,252
The depletion keyword reactivates failed servers only after all of the servers in the group are inactive. This is the default mode. The deadtime minutes keyword-argument pair specifies the amount of time in minutes, between 0 and 1440, that elapses between the disabling of the last server in the group and the subsequen...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,253
ciscoasa(config-aaa-server-host)# retry-interval 6 Step 4 Specify the server port if it is different from the default RSA SecurID port, which is TCP/5500. The ASA contacts the RSA SecurID server on this port. server-port port_number Example: ciscoasa(config-aaa-server-host)# server-port 5555 Import the SDI Node Secret ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,254
Monitor RSA SecurID Servers for AAA You can use the following commands to monitor and clear RSA SecurID-related information. • show aaa-server Showsthe AAA serverstatistics. Use the clear aaa-server statistics command to clear the serverstatistics. • show running-config aaa-server Showsthe AAA serversthat are configure...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,255
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 1196 AAA Servers and the Local Database History for RSA SecurID Servers for AAA
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,256
P ART VII System Administration • Management Access, on page 1199 • Software and Configurations, on page 1249 • Response Automation for System Events, on page 1291 • Testing and Troubleshooting, on page 1303
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,257
null
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,258
CHAPTER 43 Management Access This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, and how to create login banners. • Configure Management Remote Access, on page 1199 • Configure AAA for System Administrators, on page 121...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,259
Note that the Cisco SSH stack does not support: • SSH to a different interface over VPN (management-access) • EDDSA key pair • RSA key pair in FIPS mode If you need these features, you should use the ASA SSH stack. There is a small change to SCP functionality with the CiscoSSH stack: to use the ASA copy command to copy...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,260
The larger the key size you specify, the longer it takesto generate a key pair.SSH tries keysin the following order: EdDSA, ECDSA, and then RSA. View the keys using the show crypto key mypubkey {eddsa | ecdsa | rsa} command. The keys used by SSH are called <Default-type-Key>. b) (Optional) If you do not want to use the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,261
AAAAC3NzaC1lZDI1NTE5AAAAIDmIeTNfEOnuH0094p1MKX80fW2O216g4trnf7gwWe5Q ---- END SSH2 PUBLIC KEY ---- quit INFO: Import of an SSH public key formatted file SUCCEEDED. For a localusername, you can enable public key authentication instead of/as well as password authentication. You can generate a public key/private key pair ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,262
ciscoasa(config)# ssh timeout 30 Set the timeout from 1 to 60 minutes. The default is 5 minutes. The default duration is too short in most cases, and should be increased until all pre-production testing and troubleshooting have been completed. Step 9 (Optional) Enable the Secure Copy (SCP) server. ssh scopy enable The ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,263
• The high keyword specifies only high-strength ciphers (the default): hmac-sha2-256 • The low keyword specifieslow, medium, and high strength ciphers: hmac-sha1 hmac-sha1-96 hmac-md5 hmac-md5-96 hmac-sha2-256 • The medium keyword specifies the medium and high strength ciphers: hmac-sha1 hmac-sha1-96 hmac-sha2-256 Step...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,264
Your public key has been saved in /Users/dean/.ssh/id_ed25519.pub. The key fingerprint is: SHA256:ZHOjfJa3DpZG+qPAp9A5PyCEY0+Vzo2rkGHJpplpw8Q dean@dwinchester-mac The key's randomart image is: +--[ED25519 256]--+ | . | | o | |. . + o+ o | |.E+ o ++.+ o | |B=.= .S = . | |** ooo. = o . | |.....o*.o = . | | o .. *.+.o | |...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,265
Configure Telnet Access To identify the client IP addresses allowed to connect to the ASA using Telnet, perform the following steps. See the following guidelines: • To access the ASA interface for Telnet access, you do not also need an access rule allowing the host IP address. You only need to configure Telnet access a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,266
Set the timeout from 1 to 1440 minutes. The default is 5 minutes. The default duration is too short in most cases and should be increased until all pre-production testing and troubleshooting have been completed. Examples The following example shows how to let a host on the inside interface with an address of 192.168.1....
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,267
Before you begin • In multiple context mode, complete this procedure in the context execution space. To change from the system to a context configuration, enter changeto context name. Procedure Step 1 Identify the IP addresses from which the ASA accepts HTTPS connections for each address or subnet on the specified inte...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,268
Enter each client string using a separate command. Many specialty clients (for example, python libraries, curl, and wget) do not support Cross-site request forgery (CSRF) token-based authentication, so you need to specifically allow these clientsto use the ASA basic authentication method.Forsecurity purposes, you shoul...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,269
Configure HTTP Redirect for ASDM Access or Clientless SSL VPN You must use HTTPS to connect to the ASA using ASDM or clientless SSL VPN. For your convenience, you can redirect HTTP management connections to HTTPS.For example, by redirecting HTTP, you can enter either http://10.1.8.4/admin/ or https://10.1.8.4/admin/ an...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,270
Before you begin This feature is not supported on management-only interfaces. Procedure Specify the name of the management interface that you want to access when entering the ASA from another interface. management-access management_interface For Easy VPN and Site-to-Site tunnels, you can specify a named BVI (in routed ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,271
• Ensure that the FXOS gateway is set to forward traffic to the ASA data interfaces (the default). See the getting started guide for more information about setting the gateway. Procedure Step 1 Enable FXOS remote management. fxos {https | ssh | snmp} permit {ipv4_address netmask | ipv6_address/prefix_length} interface_...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,272
Change the Console Timeout The console timeout sets how long a connection can remain in privileged EXEC mode or configuration mode; when the timeout is reached, the session drops into user EXEC mode. By default, the session does not time out. This setting does not affect how long you can remain connected to the console...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,273
Displays the traffic-passing state or role of the unit. For failover, the following values are displayed for the state keyword: • act—Failover is enabled, and the unit is actively passing traffic. • stby— Failover is enabled, and the unit is not passing traffic and is in a standby, failed, or other non-active state. • ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,274
• See RFC 2196 for guidelines about banner messages. Procedure Add a banner to display at one of three times: when a user first connects (message-of-the-day (motd)), when a user logs in (login), and when a user accesses privileged EXEC mode (exec). banner {exec | login | motd} text Example: ciscoasa(config)# banner mot...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,275
If you also set a resource limit per context for the maximum administrative sessions (SSH, etc.), then the lower value will be used. Note Before you begin In multiple context mode, complete this procedure in the context execution space. To change from the system to a context configuration, enter the changeto context na...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,276
Configure AAA for System Administrators Thissection describes how to configure authentication, management authorization, and command authorization for system administrators. Configure Management Authentication Configure authentication for CLI and ASDM access. About Management Authentication How you log into the ASA dep...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,277
• AAA Authentication—When you enable ASDM (HTTPS) authentication, you enter the username and password as defined on the AAA server or local user database. You can no longer use ASDM with a blank username and the enable password. • AAA Authentication plus Certificate Authentication—(Single, routed mode only) When you en...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,278
In multiple context mode, you cannot configure any AAA commands in the system configuration. However, if you configure Telnet or serial authentication in the admin context, then authentication also applies to these sessions. The admin context AAA server or local user database is used in this instance. Configure Authent...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,279
Before you begin See About Enable Authentication, on page 1218. Procedure Choose one of the following options for authenticating users: • To authenticate users with a AAA server or the local database, enter the following command: aaa authentication enable console {LOCAL | server_group [LOCAL]} Example: ciscoasa(config)...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,280
Procedure Step 1 Enable certificate authentication: http authentication-certificate interface_name[match certificate_map_name] Example: ciscoasa(config)# crypto ca certificate map map1 10 ciscoasa(config-ca-cert-map)# subject-name emailAddress www.example.com ciscoasa(config)# http authentication-certificate outside ma...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,281
• SP—State/Province • T—Title • UID User ID • UPN—User Principal Name • The use-entire-name keyword uses the entire DN name. • The use-script keyword uses a Lua script generated by ASDM. • Thepre-fill-username keyword pre-fillsthe username when prompted for authentication. If the username is different from the one you ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,282
RADIUS/LDAP TACACS+ Attributes Local Database Attributes (Mapped) Attributes Management Level Service-Type 6 PASS, privilege level 1 admin (Administrative), Privilege-Level 1 Full Access—Allows full access to any services specified by the aaa authentication console commands PASS, privilege level 2 nas-prompt and higher...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,283
aaa authorization http console {authentication-server | LOCAL} Example: ciscoasa(config)# aaa authentication http console RADIUS ciscoasa(config)# aaa authorization http console authentication-server Step 3 Examples The following example shows how to define an LDAP attribute map. In this example, the security policy sp...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,284
EXEC mode when they first log in (commands at level 0 or 1). The user needs to authenticate again with the enable command to access privileged EXEC mode (commands at level 2 or higher), or they can log in with the login command (local database only). You can use local command authorization without any users in the loca...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,285
• show pager • clear pager • quit • show version If you move any configure mode commands to a lower level than 15, be sure to move the configure command to that level as well, otherwise, the user cannot enter configuration mode. Configure Local Command Authorization Local command authorization lets you assign commands ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,286
aaa authorization exec authentication-server [auto-enable] Example: ciscoasa(config)# aaa authorization exec authentication-server This command also enables management authorization.See Control CLI and ASDM Access with Management Authorization, on page 1222. Step 3 Enable the use of local command privilege levels: aaa ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,287
The following example shows an additional command, the configure command, which uses the mode keyword: ciscoasa(config)# privilege show level 5 mode cmd command configure ciscoasa(config)# privilege clear level 15 mode cmd command configure ciscoasa(config)# privilege cmd level 15 mode cmd command configure ciscoasa(co...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,288
Figure 76: Permitting All Related Commands • For commands that are a single word, you must permit unmatched arguments, even if there are no arguments for the command, for example enable or help (see the following figure). Figure 77: Permitting Single Word Commands • To disallow some arguments, enter the arguments prece...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,289
Figure 78: Disallowing Arguments • When you abbreviate a command at the command line, the ASA expands the prefix and main command to the full text, but it sends additional arguments to the TACACS+ server as you enter them. For example, if you enter sh log, then the ASA sends the entire command to the TACACS+ server, sh...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,290
• pager • show pager • clear pager • quit • show version Configure TACACS+ Command Authorization If you enable TACACS+ command authorization, and a user enters a command at the CLI, the ASA sends the command and username to the TACACS+ server to determine if the command is authorized. Before you enable TACACS+ command ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,291
Configure a Password Policy for Local Database Users When you configure authentication for CLI or ASDM access using the local database, you can configure a password policy that requires a user to change their password after a specified amount of time and also requires password standards such as a minimum length and the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,292
Character matching is position independent, meaning that new password characters are considered changed only if they do not appear anywhere in the current password. Step 3 (Optional) Set the minimum length of passwords. password-policy minimum-length value Example: ciscoasa(config)# password-policy minimum-length 8 Val...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,293
Example: ciscoasa(config)# password-policy reuse-interval 5 You can prohibit the reuse of a password that matches previously used passwords, between 2 and 7 previous passwords. The previous passwords are stored in the configuration under each username in encrypted form using the password-history command; this command i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,294
ciscoasa# change-password old-password j0hncr1chton new-password a3rynsun If you do not enter the old and new passwords in the command, the ASA prompts you for input. Enable and View the Login History By default, the login history is saved for 90 days. You can disable this feature or change the duration, up to 365 days...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,295
ciscoasa(config)# show aaa login-history Login history for user: turjan Logins in last 1 days: 1 Last successful login: 16:44:32 UTC Jul 23 2018 from console Failures since last login: 0 Last failed login: None Privilege level: 14 Privilege level changed from 11 to 14 at: 14:07:30 UTC Aug 21 2018 Configure Management A...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,296
The following table lists the common lockout conditions and how you might recover from them. Table 56: CLI Authentication and Command Authorization Lockout Scenarios Feature Lockout Condition Description Workaround: Single Mode Workaround: Multiple Mode Session into the ASA from the switch. From the system execution sp...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,297
This command shows privilege levels for all commands. For the show running-config all privilege all command, the ASA displays the current assignment of each CLI command to a privilege level. The following is sample output from this command: ciscoasa(config)# show running-config all privilege all privilege show level 15...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,298
Table 57: show curpriv Command Output Description Field Description Username. If you are logged in as the default user, the name is enable_1 (user EXEC) or enable_15 (privileged EXEC). Username Levels range from 0 to 15. Unless you configure local command authorization and assign commands to intermediate privilege leve...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,299
History for Management Access Table 58: History for Management Access Platform Description Releases Feature Name The Cisco SSH stack is now used by default. New/Modified commands: ssh stack ciscossh CiscoSSH stack now default 9.19(1) You can now add a loopback interface and use it for the following features: • SSH • Te...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,300
Platform Description Releases Feature Name The ASA can lock out local users after a configurable number of failed login attempts. This feature did not apply to users with privilege level 15. Also, a user would be locked out indefinitely until an admin unlocked their account. Now, users will be unlocked after 10 minutes...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,301
Platform Description Releases Feature Name You can now set the idle timeout for all HTTPS connections to the ASA, including ASDM, WebVPN, and other clients. Formerly, using the http server idle-timeout command, you could only set the ASDM idle timeout. If you set both timeouts, the new command takes precendence. New/Mo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,302
Platform Description Releases Feature Name When you authenticate for enable access (aaa authentication enable console) or allow privileged EXEC access directly (aaa authorization exec auto-enable), then the ASA now notifies users if their assigned access level has changed since their last login. New/Modified commands: ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,303
Platform Description Releases Feature Name In releases prior to 9.6(2), you could enableSSH public key authentication (ssh authentication) without also explicitly enabling AAA SSH authentication with the Local user database (aaa authentication ssh console LOCAL). In 9.6(2), the ASA required you to explicitly enable AAA...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,304
Platform Description Releases Feature Name When you enable ASDM certificate authentication (http authentication-certificate), you can configure how ASDM extracts the username from the certificate; you can also enable pre-filling the username at the login prompt. We introduced the following command:httpusername-from-cer...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,305
Platform Description Releases Feature Name When you configure authentication for CLI or ASDM access using the local database, you can configure a password policy that requires a user to change their password after a specified amount of time and also requires password standards such as a minimum length and the minimum n...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,306
Platform Description Releases Feature Name We introduced this feature. We introduced the following commands: show running-config all privilege all, show running-config privilege level,show running-configprivilege command, telnet, telnet timeout, ssh, ssh timeout, http, http server enable, asdm image disk, banner, conso...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,307
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 1248 System Administration History for Management Access
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,308
CHAPTER 44 Software and Configurations This chapter describes how to manage the ASA software and configurations. • Upgrade the Software, on page 1249 • Load an Image Using ROMMON (ISA 3000), on page 1249 • Upgrade the ROMMON Image (ISA 3000), on page 1251 • Downgrade Your Software, on page 1252 • Manage Files, on page ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,309
Be sure that the connection to the network already exists. The interface command is ignored on the ASA 5506-X, ASA 5508-X, and ASA 5516-X, and ISA 3000 platforms, and you must perform TFTP recovery on these platforms from the Management 1/1 interface. Note Step 5 Validate your settings: rommon #6> set ROMMON Variable S...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,310
After the software image is successfully loaded, the ASA automatically exits ROMMON mode. Step 9 Booting the ASA from ROMMON mode does not preserve the system image across reloads; you must still download the image to flash memory. See the Cisco ASA Upgrade Guide for full upgrade procedures. Upgrade the ROMMON Image (I...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,311
Computed Hash SHA2: d824bdeecee1308fc64427367fa559e9 eefe8f182491652ee4c05e6e751f7a4f 5cdea28540cf60acde3ab9b65ff55a9f 4e0cfb84b9e2317a856580576612f4af Embedded Hash SHA2: d824bdeecee1308fc64427367fa559e9 eefe8f182491652ee4c05e6e751f7a4f 5cdea28540cf60acde3ab9b65ff55a9f 4e0cfb84b9e2317a856580576612f4af Digital signatur...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,312
• Downgrade to a pre-9.9(1) release when you enable cluster site redundancy—You should disable site redundancy if you want to downgrade (or if you want to add a pre-9.9(1) unit to a cluster). Otherwise, you will see side effects, for example, dummy forwarding flows on the unit running the old version. • Downgrade from ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,313
• VPN tunnels are replicated to the standby unit even if the standby unit is running a version of software that does not support the Ciphersuite that the original tunnel negotiated—This scenario occurs when downgrading. In this case, disconnect your VPN connection and reconnect. Incompatible Configuration Removed After...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,314
Before you begin This procedure requires a backup configuration of the ASA before you upgraded, so you can restore the old configuration. If you do not restore the old configuration, you may have incompatible commandsrepresenting new or changed features. Any new commands will be rejected when you load the old software ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,315
It'simportant that you do notsave the running configuration to the startup configuration using write memory; this command will overwrite your backup configuration. Example: ciscoasa# copy disk0:/9.12.4_cfg.sav startup-config Step 2 In FXOS, use the chassis manager or FXOS CLI to use the old ASA software version using t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,316
Step 3 If you are also downgrading FXOS, use the chassis manager or FXOS CLI to set the old FXOS software version to be the current version using the upgrade procedure in the ASA upgrade guide for standalone, failover, or clustering deployments. Downgrade the ISA 3000 The downgrade feature provides a shortcut for compl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,317
Procedure Step 1 View files in flash memory: dir [disk0: | disk1:] Example: hostname# dir Directory of disk0:/ 500 -rw- 4958208 22:56:20 Nov 29 2004 cdisk.bin 2513 -rw- 4634 19:32:48 Sep 17 2004 first-backup 2788 -rw- 21601 20:51:46 Nov 23 2004 backup.cfg 2927 -rw- 8670632 20:42:48 Dec 08 2004 asdmfile.bin Enter disk0:...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,318
Erase the Flash File System To erase the flash file system, perform the following steps. Procedure Step 1 Connect to the ASA console port according to the instructions inAccess the ISA 3000 Console, on page 11. Step 2 Power off the ASA, then power it on. Step 3 During startup, press the Escape key when you are prompted...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,319
Before you begin • The ASA license must have the strong encryption (3DES/AES) license to support SSH Version 2 connections. • Unless otherwise specified, for multiple context mode, complete this procedure in the system execution space. To change from the context to the system execution space, enter the changeto system ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,320
Destination username [cisco]? Destination password []? cisco123 Destination filename [x]? By default, this option is enabled. When this option is enabled, you are prompted to accept or reject the host key if it is not already stored on the ASA. When this option is disabled, the ASA accepts the host key automatically if...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,321
Source filename [files/config1.cfg]?config2.cfg Destination filename [test.cfg]? Accessing tftp://10.1.4.7/files/config2.cfg;int=outside... You can override the filename when you enter the command; for example, when you use the copy command, you can take advantage of the predefined TFTP server address but still enter a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,322
copy [/noconfirm] [interface_name] tftp://server[/path]/src_filename {disk0|disk1}:/[path/]dest_filename Example: ciscoasa# copy tftp://10.1.1.67/files/context1.cfg disk0:/context1.cfg Address or name of remote host [10.1.1.67]? Source filename [files/context1.cfg]? Destination filename [context1.cfg]? Cryptochecksum: ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf