<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Authentication ASA/PIX Telnet/SSH access using ACS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729595#M242761</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After having another look at this this morning the command "aaa authentication enable console TLS-ACS5 LOCAL" can be used to authenticate the users exec-priv password against TACACS+.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Aug 2011 10:15:08 GMT</pubDate>
    <dc:creator>alecchris</dc:creator>
    <dc:date>2011-08-03T10:15:08Z</dc:date>
    <item>
      <title>Authentication ASA/PIX Telnet/SSH access using ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729591#M242757</link>
      <description>&lt;P&gt;I am trying to get our ACS to authenticate login sessions to our PIX and ASA devices. Can anyone provide a sample configuration that will push all access to these devices to the ACS for TACACS? THE ACS has been configured and is ready for authentication based on username credentials; it is just the configuration on the firewall I am having problems with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any help :- )&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729591#M242757</guid>
      <dc:creator>alecchris</dc:creator>
      <dc:date>2019-03-11T01:11:36Z</dc:date>
    </item>
    <item>
      <title>Authentication ASA/PIX Telnet/SSH access using ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729592#M242758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming following&lt;/P&gt;&lt;P&gt;ACS-SERVER-IP=172.16.10.25&lt;/P&gt;&lt;P&gt;ACS-SERVER-NAME: TLS-ACS5&lt;/P&gt;&lt;P&gt;ACS-ASA shared secret: mysecret&lt;/P&gt;&lt;P&gt;user-in-acs: myfirewall&lt;/P&gt;&lt;P&gt;password: myasa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run this command in ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server TLS-ACS5 protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server TLS-ACS5 (inside) host 172.16.10.25&lt;/P&gt;&lt;P&gt; key mysecret&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication ssh console TLS-ACS5 LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console TLS-ACS5 LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Test Authentication&lt;/P&gt;&lt;P&gt;test aaa authentication TLS-ACS5 host 172.16.10.25 username myfirewall password myasa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Test result should come OK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2011 06:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729592#M242758</guid>
      <dc:creator>roshan.maskey</dc:creator>
      <dc:date>2011-06-30T06:14:15Z</dc:date>
    </item>
    <item>
      <title>Authentication ASA/PIX Telnet/SSH access using ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729593#M242759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi thanks for that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tested this on a PIX and everything worked!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 14:59:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729593#M242759</guid>
      <dc:creator>alecchris</dc:creator>
      <dc:date>2011-07-19T14:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication ASA/PIX Telnet/SSH access using ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729594#M242760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Roshan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you advise how I might go about authenticating access to exec-privialge on the FW against the ACS?&amp;nbsp; I cannot find any any configuration examples. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Aug 2011 16:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729594#M242760</guid>
      <dc:creator>alecchris</dc:creator>
      <dc:date>2011-08-02T16:14:15Z</dc:date>
    </item>
    <item>
      <title>Authentication ASA/PIX Telnet/SSH access using ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729595#M242761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After having another look at this this morning the command "aaa authentication enable console TLS-ACS5 LOCAL" can be used to authenticate the users exec-priv password against TACACS+.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 10:15:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729595#M242761</guid>
      <dc:creator>alecchris</dc:creator>
      <dc:date>2011-08-03T10:15:08Z</dc:date>
    </item>
    <item>
      <title>Authentication ASA/PIX Telnet/SSH access using ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729596#M242762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On testing the above even further, I seem to have an issue...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the following configuration loaded...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa-server TLS-ACS5 protocol tacacs+ &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa-server TLS-ACS5 (inside) host 10.0.20.200&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;key passme123&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication ssh console TLS-ACS5 LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication telnet console TLS-ACS5 LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication ssh console TLS-ACS5 LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication telnet console TLS-ACS5 LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication enable console TLS-ACS5 LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the PIX in communication with the ACS the above works well, with me successfully logging in with credentials added to the ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On testing this further I have taken the link down between the PIX and the ACS (to recreate a failure scenario).&amp;nbsp; I can still login using the internal (LOCAL) username &amp;amp; password.&amp;nbsp; This seems to work fine, however if I try to access the exec-privilege mode (i.e. enable) the PIX does not except the enable password added to the configuration moreover it prefers the same password used for creating the initial user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username admin-user password adminpass123 encrypted&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;enable password enablepass123 encrypted&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example; with the above lines in the running configuration of the PIX , I can login into PIX using admin-user and enter the password adminpass123. However, if I try and then go onto access exec-privilege mode (i.e. enable) the PIX does &lt;SPAN style="text-decoration: underline;"&gt;not&lt;/SPAN&gt; except the password "enablepass123" put does except "adminpass123"... this is even with "aaa authentication enable console TLS-ACS5 LOCAL" added to the running configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone else seen this issue on a PIX/FW. Am I missing something from my configuration? Does anyone know of a workaround to this issue or is it just something I have to live with?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 12:13:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-asa-pix-telnet-ssh-access-using-acs/m-p/1729596#M242762</guid>
      <dc:creator>alecchris</dc:creator>
      <dc:date>2011-08-08T12:13:33Z</dc:date>
    </item>
  </channel>
</rss>

