<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASDM and privilege level (using TACACS) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/asdm-and-privilege-level-using-tacacs/m-p/1400623#M322655</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASDM will not prompt for an enable password, here is an explaination of the privilege use with ASDM:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asdm/6_2/user/guide/mgt_acc.html#wp1581275"&gt;http://www.cisco.com/en/US/docs/security/asdm/6_2/user/guide/mgt_acc.html#wp1581275&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Depending on what user logs in is what privilege the user will get in ASDM.&amp;nbsp; Where are the users logging&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; into ASDM stored?&amp;nbsp; Local? Radius? Tacacs? LDAP?&lt;/P&gt;&lt;P&gt;--Jesse&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Mar 2010 00:55:52 GMT</pubDate>
    <dc:creator>jedubois</dc:creator>
    <dc:date>2010-03-09T00:55:52Z</dc:date>
    <item>
      <title>ASDM and privilege level (using TACACS)</title>
      <link>https://community.cisco.com/t5/network-access-control/asdm-and-privilege-level-using-tacacs/m-p/1400622#M322654</link>
      <description>&lt;P&gt;Hi experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Initial question:&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; How can I force ASDM to ask for the enable password when the user click on Apply ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Environment description:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I have an &lt;STRONG&gt;&lt;EM&gt;ASA 5510&lt;/EM&gt;&lt;/STRONG&gt; connected to an &lt;EM&gt;&lt;STRONG&gt;ACS 5.0&lt;/STRONG&gt;&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Security policy:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I want the user defined on my ACS to be able to gain privilege level 15 but only after using their enable password. But by default the user must be in no privileged mode (&amp;lt;15).&lt;/P&gt;&lt;P&gt;A SNMP alert is sent when the ASA catches a "User priv level changed" syslog message. (logging customization)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;ACS configuration:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Maybe I misunderstand the TACACS privilege level parameters on ACS.&lt;/P&gt;&lt;P&gt;I set a &lt;STRONG&gt;&lt;EM&gt;Shell Profile&lt;/EM&gt;&lt;/STRONG&gt; which gives the user the following privilege levels:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Default Privilege Level = 7&lt;/EM&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Maximum Privilege Level = 15&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;1st config tested on ASA:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication ssh console grp-tacacs LOCAL&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication http console grp-tacacs LOCA&lt;/EM&gt;L&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication enable console grp-tacacs LOCAL&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;! no authorization set&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Results:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;On CLI&lt;/SPAN&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;&lt;EM&gt;perfect&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;My user authenticates with his &lt;STRONG&gt;&lt;EM&gt;network password&lt;/EM&gt;&lt;/STRONG&gt; to get EXEC access. Then he gains privilege access using the &lt;STRONG&gt;&lt;EM&gt;enable &lt;/EM&gt;&lt;/STRONG&gt;command and his &lt;STRONG&gt;&lt;EM&gt;enable password&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;On ASDM&lt;/SPAN&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;&lt;STRONG&gt;policy security failure&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;When the user connects through ASDM, he gains privilege level 15 directly&lt;/P&gt;&lt;P&gt;It seems that if authorization is not set, ASDM always gives privilege level 15 to any user&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;So OK for CLI, but NOK pour ASDM&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;2nd config tested on ASA:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication ssh console grp-tacacs LOCAL&lt;BR /&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication&amp;nbsp; http console grp-tacacs LOCA&lt;/EM&gt;L&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication enable console grp-tacacs LOCAL&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authorization exec authentication-server&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;! no authorization command set&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG style="text-decoration: underline; "&gt;Results:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;On CLI&lt;/SPAN&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;&lt;STRONG&gt;lose enable access&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I can't gain privilege level 15 access anymore. When I use the &lt;EM&gt;&lt;STRONG&gt;enable&lt;/STRONG&gt;&lt;/EM&gt; command, I move to privilege level 7 only. So in this case ASA use the &lt;EM&gt;&lt;STRONG&gt;TACACS Default Privilege Level&lt;/STRONG&gt;&lt;/EM&gt; value.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;On ASDM&lt;/SPAN&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;&lt;STRONG&gt;policy security failure&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;When the user connects through ASDM, he gains privilege level 7 as describe on the bottom of the ASDM window &lt;STRONG&gt;BUT &lt;/STRONG&gt;the user has full rights and can change settings.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;So NOK for CLI and ASDM&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;/EM&gt;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt; &lt;/STRONG&gt;Why do I have more access rights with ASDM as on CLI with the same settings ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;3rd config tested on ASA:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication ssh console grp-tacacs LOCAL&lt;BR /&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication&amp;nbsp; http console grp-tacacs LOCA&lt;/EM&gt;L&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication enable console grp-tacacs LOCAL&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authorization exec authentication-server&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authorization &lt;/EM&gt;command LOCAL&lt;/P&gt;&lt;P&gt;&lt;EM&gt;! specific authorization command set&lt;/EM&gt; for ASDM applied&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG style="text-decoration: underline; "&gt;Results:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;On CLI&lt;/SPAN&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;&lt;STRONG&gt;lose enable access &lt;/STRONG&gt;&lt;/EM&gt;(same as config 2)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;On ASDM&lt;/SPAN&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;&lt;STRONG&gt;unenable to gain privilege level 15 --&amp;gt; acceptable&lt;BR /&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;When the user connects through ASDM, he gains privilege level 7 as describe on the bottom of the ASDM window AND the user really has level 7 access rights.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;So NOK for CLI and Acceptable for ASDM&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="text-decoration: underline; "&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there no possibility to move to enable mode on ASDM ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;4th config tested on ASA:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication ssh console grp-tacacs LOCAL&lt;BR /&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication&amp;nbsp; http console grp-tacacs LOCA&lt;/EM&gt;L&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authorization exec authentication-server&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authorization &lt;/EM&gt;command LOCAL&lt;/P&gt;&lt;P&gt;&lt;EM&gt;! no aaa authentication for 'enable access&lt;/EM&gt;', using local enable_15 account&lt;/P&gt;&lt;P&gt;&lt;EM&gt;! specific authorization command set&lt;/EM&gt; for ASDM applied&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Results:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;On CLI&lt;/SPAN&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;&lt;STRONG&gt;acceptable&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;My user authenticates with his &lt;STRONG&gt;&lt;EM&gt;network password&lt;/EM&gt;&lt;/STRONG&gt; to get EXEC access. Then he gains privilege access using the &lt;STRONG&gt;&lt;EM&gt;enable &lt;/EM&gt;&lt;/STRONG&gt;command and the local &lt;STRONG&gt;&lt;EM&gt;enable password&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;On ASDM&lt;/SPAN&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;&lt;STRONG&gt;unenable to gain privilege level 15 --&amp;gt; acceptable&lt;/STRONG&gt;&lt;/EM&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;(same as config 3)&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;So Acceptable for CLI and ASDM&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Questions review:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1 - &lt;/STRONG&gt;&lt;STRONG&gt;Is it possible to force ASDM to ask for the enable password when the user click on Apply ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2 - Why do I have different access rights using ASDM as on CLI with the same settings ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3 -&amp;nbsp; Is there no possibility to move to enable mode on ASDM when the user is on privilege level 7 whereas he has &lt;EM&gt;Maximum Privilege Level = 15&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt; ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4 - How may I understand these parameters on TACACS:&lt;/STRONG&gt; &lt;STRONG&gt;&lt;EM&gt;Default Privilege Level &lt;/EM&gt;and &lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;Maximum Privilege Level ?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asdm-and-privilege-level-using-tacacs/m-p/1400622#M322654</guid>
      <dc:creator>joan.ballaud</dc:creator>
      <dc:date>2019-03-10T23:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM and privilege level (using TACACS)</title>
      <link>https://community.cisco.com/t5/network-access-control/asdm-and-privilege-level-using-tacacs/m-p/1400623#M322655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASDM will not prompt for an enable password, here is an explaination of the privilege use with ASDM:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asdm/6_2/user/guide/mgt_acc.html#wp1581275"&gt;http://www.cisco.com/en/US/docs/security/asdm/6_2/user/guide/mgt_acc.html#wp1581275&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Depending on what user logs in is what privilege the user will get in ASDM.&amp;nbsp; Where are the users logging&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; into ASDM stored?&amp;nbsp; Local? Radius? Tacacs? LDAP?&lt;/P&gt;&lt;P&gt;--Jesse&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Mar 2010 00:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asdm-and-privilege-level-using-tacacs/m-p/1400623#M322655</guid>
      <dc:creator>jedubois</dc:creator>
      <dc:date>2010-03-09T00:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM and privilege level (using TACACS)</title>
      <link>https://community.cisco.com/t5/network-access-control/asdm-and-privilege-level-using-tacacs/m-p/1400624#M322656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry I didn't directly answer your questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) No ASDM will not ask for the enable password, rights are assigned to the local user it is a type of&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; role based authentication.&lt;/P&gt;&lt;P&gt;2) That is the way it is designed, with either monitor or configuration access for ASDM.&amp;nbsp; It is&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; more role based.&amp;nbsp; If you give the user Privilege 15 they will get Configuration Access if less&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; they will get monitor access.&lt;BR /&gt;3) No you can not move into configuration mode if you log into ASDM with a user that only has&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; monitor access.&lt;/P&gt;&lt;P&gt;4) Privilege level is the level that is passed to the NAS during user authentication.&amp;nbsp; Maximum privilege&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; level is for enable authentication, for example if a user has a maximum enable privilege as 7 and they&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type enable 7 in IOS they would be granted level 7.&amp;nbsp; If they type enable 10 they would be denied enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; How many privilege levels are you planning to use?&lt;/P&gt;&lt;P&gt;--Jesse&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Mar 2010 01:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asdm-and-privilege-level-using-tacacs/m-p/1400624#M322656</guid>
      <dc:creator>jedubois</dc:creator>
      <dc:date>2010-03-09T01:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM and privilege level (using TACACS)</title>
      <link>https://community.cisco.com/t5/network-access-control/asdm-and-privilege-level-using-tacacs/m-p/1400625#M322657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your answer jedubois.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In fact, my &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;security policy&lt;/STRONG&gt;&lt;/SPAN&gt; is like this:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;A) Authentication has to be nominative with password enforcement policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; I'm using CS ACS v5.1 appliance with local user database on it&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;B) Every "network" user can be granted priviledge level 15&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; max user priviledged level is set to 15 in my authentication mechanism on ACS&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;C) A "network" user can log onto the network equipments (RTR, SW and FW) but having monitor access only first.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;D) A "network" user can be granted priviledged level 15 after a second authentication which generates a log message&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; SNMP trap sent to supervision server&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;E) The user password and enable password have to be personal.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I need only 2 priviledged level:&lt;/P&gt;&lt;P&gt;- monitor (any level from 1 to 14. I set 7)&lt;/P&gt;&lt;P&gt;- admin (level 15)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For RTR, SW and FW (on CLI), it works as wanted: the "network" users connect to the equipment in monitor mode. They type "enable" and they use their private enable password to be granted priviledged level 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASDM interface is requested by the customer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For ASDM, as I were not able to satisfy the security policy, I apply this:&lt;/P&gt;&lt;P&gt;1- I activated Exec Shell Access authorization to get the default user priviledge level value from ACS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; Then, when I log onto the ASDM using a "network" user, I have priviledge level 7 but I am able to change the parameter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- I activated LOCAL Command authorization (adding "ASDM defined User Roles")&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; Then, when I log onto the ASDM using a "network" user, I have priviledge level 7 and I can't push any modification.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; The issue is that I can't push any modification on CLI either ... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; because my user is stuck on "default priviledge level" 7 and can't get access to "max priviledge level 15" as defined on ACS when LOCAL authorization is set&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (ok I go on my ACS and move the default priviledge level to 15 to restore an admin access to the ASA and apply 3- before resetting it to default priviledge level to 7)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- I remove "aaa authorization enable console TACACS" to use local enable password&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; now I can't get admin access on ASDM: OK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; and I can get admin access on CLI entering the local enable password&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the end, I satisfy my policy security tokens &lt;STRONG&gt;A&lt;/STRONG&gt; to &lt;STRONG&gt;D&lt;/STRONG&gt; but not &lt;STRONG&gt;E&lt;/STRONG&gt;. That's a good compromise but do you see a solution to satisfy E either ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Mar 2010 11:24:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/asdm-and-privilege-level-using-tacacs/m-p/1400625#M322657</guid>
      <dc:creator>joan.ballaud</dc:creator>
      <dc:date>2010-03-09T11:24:08Z</dc:date>
    </item>
  </channel>
</rss>

