<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASDM Privilege Level default 15 for Radius users in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asdm-privilege-level-default-15-for-radius-users/m-p/2145748#M124132</link>
    <description>&lt;P&gt;So this may be a bit of a dumb question...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I stumbled upon an ASA today that is configured to authenticate against a Radius server for SSH and HTTPS connections. If I log in via SSH, I can't gain a privilege level of more than 1 (tried login command, etc).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if I log in with ASDM, I always have privilege level 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command authorization is not enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this default behavior. If so, why? Do I need to enable command authorization to override this behavior?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI, the system in question is running ASA 8.3(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 03:04:58 GMT</pubDate>
    <dc:creator>John LeCoque</dc:creator>
    <dc:date>2019-03-11T03:04:58Z</dc:date>
    <item>
      <title>ASDM Privilege Level default 15 for Radius users</title>
      <link>https://community.cisco.com/t5/network-access-control/asdm-privilege-level-default-15-for-radius-users/m-p/2145748#M124132</link>
      <description>&lt;P&gt;So this may be a bit of a dumb question...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I stumbled upon an ASA today that is configured to authenticate against a Radius server for SSH and HTTPS connections. If I log in via SSH, I can't gain a privilege level of more than 1 (tried login command, etc).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if I log in with ASDM, I always have privilege level 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command authorization is not enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this default behavior. If so, why? Do I need to enable command authorization to override this behavior?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI, the system in question is running ASA 8.3(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asdm-privilege-level-default-15-for-radius-users/m-p/2145748#M124132</guid>
      <dc:creator>John LeCoque</dc:creator>
      <dc:date>2019-03-11T03:04:58Z</dc:date>
    </item>
    <item>
      <title>ASDM Privilege Level default 15 for Radius users</title>
      <link>https://community.cisco.com/t5/network-access-control/asdm-privilege-level-default-15-for-radius-users/m-p/2145749#M124133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please provide the AAA configuration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 21:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asdm-privilege-level-default-15-for-radius-users/m-p/2145749#M124133</guid>
      <dc:creator>shekharmore003</dc:creator>
      <dc:date>2013-02-22T21:31:38Z</dc:date>
    </item>
    <item>
      <title>ASDM Privilege Level default 15 for Radius users</title>
      <link>https://community.cisco.com/t5/network-access-control/asdm-privilege-level-default-15-for-radius-users/m-p/2145750#M124134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;aaa-server RADGR protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADGR host 10.2.2.2&lt;/P&gt;&lt;P&gt; timeout 4&lt;/P&gt;&lt;P&gt; key cisco123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication enable console RADGR LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After logging in, use the enable command with your user password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/docs/security/asa/asa83/configuration/guide/access_management.html#wp1145571"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa83/configuration/guide/access_management.html#wp1145571&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 08:05:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asdm-privilege-level-default-15-for-radius-users/m-p/2145750#M124134</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2013-02-27T08:05:26Z</dc:date>
    </item>
    <item>
      <title>ASDM Privilege Level default 15 for Radius users</title>
      <link>https://community.cisco.com/t5/network-access-control/asdm-privilege-level-default-15-for-radius-users/m-p/2145751#M124135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In ASA you can't land directly to privilege exec mode after enetring your login password. You have to enter the enable password too. This is only designed for IOS where you can&amp;nbsp; directly land to( # ) by-passing the enable passowrd mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 09:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asdm-privilege-level-default-15-for-radius-users/m-p/2145751#M124135</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-02-27T09:34:39Z</dc:date>
    </item>
  </channel>
</rss>

