<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Things have changed. (-:ASA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181226#M138496</link>
    <description>&lt;DIV class="discussion-body"&gt;&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;P&gt;Things have changed. (-:&lt;/P&gt;&lt;P&gt;ASA now understands&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cisco-av-pair = priv-lvl=15&lt;/P&gt;&lt;P&gt;When I log in to my ASA 9.1(5), I land directly on privilege exec mode.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Sun, 31 Aug 2014 12:21:34 GMT</pubDate>
    <dc:creator>Peter Koltl</dc:creator>
    <dc:date>2014-08-31T12:21:34Z</dc:date>
    <item>
      <title>Bypass EXEC Mode when login in SSH for ASA 8.4(2)</title>
      <link>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181223#M138447</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to check with you all, is there anyone able to access to the Cisco ASA 8.4(2) CLI without the needs of entering the enable password?&lt;/P&gt;&lt;P&gt;Currently it's configured with TACACS access for CLI and ASDM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For ASDM we got no issue and able to access and make change directly when entering own TACACS credential.&lt;/P&gt;&lt;P&gt;However for the CLI, we would need to type "enable" and also the enable password once login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anyway we could skip the EXEC mode and access to the PRIVILEDGE mode directly?&lt;/P&gt;&lt;P&gt;Many thanks for your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Current Config:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa-server xxxx protocol tacacs+&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa-server xxxx (management) host xxxx&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Danny&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181223#M138447</guid>
      <dc:creator>ckhoodanny</dc:creator>
      <dc:date>2019-03-11T03:07:44Z</dc:date>
    </item>
    <item>
      <title>Bypass EXEC Mode when login in SSH for ASA 8.4(2)</title>
      <link>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181224#M138464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately, ASA does not support AAA Exec Authorization functionality yet, so it cannot be configured with TACACS or RADIUS to jump directly to privilege exec mode. We need to go through with enable authentication &lt;/P&gt;&lt;P&gt;like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;===================&lt;/P&gt;&lt;P&gt;ASA:Username: *****&lt;/P&gt;&lt;P&gt;ASA:Password: *****&lt;/P&gt;&lt;P&gt;ASA:&amp;gt;enable&lt;/P&gt;&lt;P&gt;Password: ****&lt;/P&gt;&lt;P&gt;===================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is because the ASA does not understand the cisco-avpair ="shell:priv-lvl=15" attribute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA does not support AAA Exec Authorization functionality yet, so it cannot be configured with TACACS or RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workaround for this issue is to manually switch from the user mode to the enable mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is only supported in IOS ( Router/Switches).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 19:13:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181224#M138464</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-02-25T19:13:56Z</dc:date>
    </item>
    <item>
      <title>Bypass EXEC Mode when login in SSH for ASA 8.4(2)</title>
      <link>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181225#M138470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot jkatyal!&lt;/P&gt;&lt;P&gt;Now I understand. Hope this help other as well...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Mar 2013 09:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181225#M138470</guid>
      <dc:creator>ckhoodanny</dc:creator>
      <dc:date>2013-03-21T09:15:10Z</dc:date>
    </item>
    <item>
      <title>Things have changed. (-:ASA</title>
      <link>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181226#M138496</link>
      <description>&lt;DIV class="discussion-body"&gt;&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;P&gt;Things have changed. (-:&lt;/P&gt;&lt;P&gt;ASA now understands&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cisco-av-pair = priv-lvl=15&lt;/P&gt;&lt;P&gt;When I log in to my ASA 9.1(5), I land directly on privilege exec mode.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 31 Aug 2014 12:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181226#M138496</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2014-08-31T12:21:34Z</dc:date>
    </item>
    <item>
      <title>I have video demo athttps:/</title>
      <link>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181227#M138520</link>
      <description>&lt;P&gt;I have video demo at&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/video/12293656/asa-aaa-configuration-acs-authentication-and-authorization&lt;/P&gt;&lt;P&gt;regarding this. If the video is not clear, you can also try&lt;/P&gt;&lt;P&gt;http://www.youtube.com/watch?v=p7HIsGUdOzo&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2014 13:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181227#M138520</guid>
      <dc:creator>H G S Tharaka Kariyawasam</dc:creator>
      <dc:date>2014-09-03T13:22:02Z</dc:date>
    </item>
    <item>
      <title>Peter is correct! In addition</title>
      <link>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181228#M138539</link>
      <description>&lt;P&gt;Peter is correct! In addition, 9.2.1 added another nice little feature that can help you with your problem:&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" bordercolor="#ccc" cellpadding="5" cellspacing="0" class="t1" style="border-collapse:collapse;" width="200.0%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class="td1" valign="top"&gt;&lt;P class="p2"&gt;Improved one-time password authentication&lt;/P&gt;&lt;/TD&gt;&lt;TD class="td1" valign="top"&gt;&lt;P class="p3"&gt;Administrators who have sufficient authorization privileges may enter privileged EXEC mode by entering their authentication credentials once. The &lt;B&gt;auto-enable&lt;/B&gt; option was added to the &lt;B&gt;aaa authorization exec&lt;/B&gt; command.&lt;/P&gt;&lt;P class="p3"&gt;We modified the following command: &lt;B&gt;aaa authorization exec&lt;/B&gt; .&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Wed, 03 Sep 2014 15:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181228#M138539</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-03T15:33:21Z</dc:date>
    </item>
    <item>
      <title>Thanks Neno and Peter for</title>
      <link>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181229#M138541</link>
      <description>&lt;P&gt;Thanks Neno and Peter for keep the thread/discussion updated.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2014 16:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/2181229#M138541</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2014-09-03T16:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: I have video demo athttps:/</title>
      <link>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/3192309#M138558</link>
      <description>&lt;P&gt;Hi Tharaka,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for video. I have a question though. I try to setup ACS in VMware, which was success. But at time to time it cannot access via web. Ping is fine from both side.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you help me out there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2017 09:07:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/bypass-exec-mode-when-login-in-ssh-for-asa-8-4-2/m-p/3192309#M138558</guid>
      <dc:creator>prashanma</dc:creator>
      <dc:date>2017-10-02T09:07:48Z</dc:date>
    </item>
  </channel>
</rss>

