<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Login to ASA with Enable Mode in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3327902#M209355</link>
    <description>&lt;P&gt;Pretty sure the answer saying its not possible is wrong&lt;/P&gt;</description>
    <pubDate>Thu, 08 Feb 2018 21:18:42 GMT</pubDate>
    <dc:creator>ashmatash1</dc:creator>
    <dc:date>2018-02-08T21:18:42Z</dc:date>
    <item>
      <title>Login to ASA with Enable Mode</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848500#M209344</link>
      <description>&lt;P&gt;I've seen some posts on the forum regarding the use of AAA to login to an ASA in enable mode.&amp;nbsp; I'm using a Server 2008 R2 NPS server, and I can successfully login.&amp;nbsp; However, I'm using the NPS server to send back the Cisco AV-pair for 'priv-lvl=15'.&amp;nbsp; I am expecting to login to the ASA and be in enable mode.&amp;nbsp; I have seen other posts reference TACACS+, but we don't have ACS.&amp;nbsp; Is TACACS+ a requirement for this?&amp;nbsp; I remember reading in some other forums that it's a security feature on the ASA to not allow logging in directly to the enable mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Scott &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848500#M209344</guid>
      <dc:creator>Scott Pickles</dc:creator>
      <dc:date>2019-03-11T01:47:04Z</dc:date>
    </item>
    <item>
      <title>Login to ASA with Enable Mode</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848501#M209345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that you are correct that it is a security feature of the ASA that it will not allow you to login to the ASA and go directly to enable mode. I believe that this is the behavior whether the authentication servers uses TACACS or any other authentication protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 20:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848501#M209345</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2012-02-01T20:59:32Z</dc:date>
    </item>
    <item>
      <title>Login to ASA with Enable Mode</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848502#M209346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Confirming Richard statement from AAA perspective. The ASA will not allow you to get directly into Enable Mode when returning Privilege Level 15. The feature is only implemented on IOS devices. The ASA is considered a security device and it will not put you directly on Enable Mode as IOS does.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 22:05:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848502#M209346</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-02-01T22:05:55Z</dc:date>
    </item>
    <item>
      <title>Hi,Actually it is possible -</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848503#M209347</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Actually it is possible - i can't be sure if it is the new version of ASA that allows it.&lt;/P&gt;&lt;P&gt;I am running asa916-k8.bin on 5510&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The command is &lt;EM&gt;aaa authorization exec LOCAL auto-enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I ssh to my ASA, I enter my username and password and I am at priv exec mode straight away.&lt;/P&gt;&lt;P&gt;Try it and let me know.&lt;/P&gt;&lt;P&gt;Ravi L&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2015 20:34:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848503#M209347</guid>
      <dc:creator>raviluchmun</dc:creator>
      <dc:date>2015-06-15T20:34:25Z</dc:date>
    </item>
    <item>
      <title>Ravi L That is an interesting</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848504#M209349</link>
      <description>&lt;P&gt;Ravi L&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is an interesting development. Thanks for letting us know that the behavior of ASA has changed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 13:09:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848504#M209349</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2015-06-16T13:09:14Z</dc:date>
    </item>
    <item>
      <title>That is correct, For all the</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848505#M209350</link>
      <description>&lt;P&gt;That is correct, For all the years ASA dev team would not entertain to add this feature but finally they made the change beginning code 9.2.1 where they introduced the "Auto-enable" command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;B class="cBold"&gt;aaa authorization exec &lt;/B&gt; {&lt;B class="cBold"&gt; authentication-server&lt;/B&gt; |&lt;B class="cBold"&gt; LOCAL&lt;/B&gt; } [&lt;B class="cBold"&gt; auto-enable&lt;/B&gt; ]&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a1.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" width="96%"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P class="pB1_Body1"&gt;&lt;B class="cBold"&gt;auto-enable&lt;/B&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1647977"&gt;&lt;/A&gt;Enables administrators who have sufficient authorization privileges to enter privileged EXEC mode by entering their authentication credentials once.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Mon, 17 Aug 2015 19:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848505#M209350</guid>
      <dc:creator>kskhanna</dc:creator>
      <dc:date>2015-08-17T19:04:08Z</dc:date>
    </item>
    <item>
      <title>This works for local accounts</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848506#M209351</link>
      <description>&lt;P&gt;This works for local accounts only on the ASA, you cannot getting into enable mode directly via SSH using Radius or LDAP.&amp;nbsp; This is because this is a security device.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2017 19:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848506#M209351</guid>
      <dc:creator>gbanta001</dc:creator>
      <dc:date>2017-08-09T19:40:52Z</dc:date>
    </item>
    <item>
      <title>Works fine with ssh with</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848507#M209353</link>
      <description>&lt;P&gt;Works fine with ssh with Tacacs authentication!&lt;/P&gt;</description>
      <pubDate>Thu, 10 Aug 2017 02:56:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/1848507#M209353</guid>
      <dc:creator>kskhanna</dc:creator>
      <dc:date>2017-08-10T02:56:02Z</dc:date>
    </item>
    <item>
      <title>doesn't seem to work with pubkey auth</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3197090#M209354</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;&lt;STRONG class="cBold"&gt;aaa authorization exec &lt;/STRONG&gt; {&lt;STRONG class="cBold"&gt; authentication-server&lt;/STRONG&gt; |&lt;STRONG class="cBold"&gt; LOCAL&lt;/STRONG&gt; } [&lt;STRONG class="cBold"&gt; auto-enable&lt;/STRONG&gt; ]&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;too bad this does not seem to work&amp;nbsp;with pubkey authentication&lt;/P&gt;
&lt;P&gt;(trying on&amp;nbsp;Version 9.1(6) )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2017 13:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3197090#M209354</guid>
      <dc:creator>Luca Andreucci</dc:creator>
      <dc:date>2017-10-11T13:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: Login to ASA with Enable Mode</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3327902#M209355</link>
      <description>&lt;P&gt;Pretty sure the answer saying its not possible is wrong&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2018 21:18:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3327902#M209355</guid>
      <dc:creator>ashmatash1</dc:creator>
      <dc:date>2018-02-08T21:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: Login to ASA with Enable Mode</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3758020#M209356</link>
      <description>&lt;P&gt;no dear you are wrong, just tried it and it is awesome, before that from console it would log into enable mode, but not from ssh, and the enable password would always be wrong for some reason. Until ACS is connected this is great!&lt;/P&gt;</description>
      <pubDate>Wed, 05 Dec 2018 07:44:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3758020#M209356</guid>
      <dc:creator>Majed Zouhairy</dc:creator>
      <dc:date>2018-12-05T07:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: This works for local accounts</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3801161#M209357</link>
      <description>&lt;P&gt;The command you need for ssh against tacacs to work is:&lt;BR /&gt;aaa authorization exec authentication-server auto-enable&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 16:57:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3801161#M209357</guid>
      <dc:creator>j-sutterfield</dc:creator>
      <dc:date>2019-02-13T16:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: Login to ASA with Enable Mode</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3815160#M209358</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 19:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/3815160#M209358</guid>
      <dc:creator>alextomko</dc:creator>
      <dc:date>2019-06-12T19:53:27Z</dc:date>
    </item>
    <item>
      <title>Re: Login to ASA with Enable Mode</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/4734098#M578693</link>
      <description>&lt;P&gt;This works with NPS as the RADIUS server to my ASA5545-X as well... just need to do a little policy config on the NPS side.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authentication enable console NPS_RADIUS LOCAL&lt;BR /&gt;aaa authentication ssh console NPS_RADIUS LOCAL&lt;BR /&gt;aaa authorization exec authentication-server auto-enable&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sh ver&lt;/P&gt;
&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.14(4)17&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 14:22:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/4734098#M578693</guid>
      <dc:creator>ccie4297</dc:creator>
      <dc:date>2022-12-07T14:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,Actually it is possible -</title>
      <link>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/4945038#M584760</link>
      <description>&lt;P&gt;Thank you Ravi, it works!!&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 13:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/login-to-asa-with-enable-mode/m-p/4945038#M584760</guid>
      <dc:creator>chambiyal</dc:creator>
      <dc:date>2023-10-20T13:59:15Z</dc:date>
    </item>
  </channel>
</rss>

