<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA: ASDM read-only access in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255953#M334478</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Sunil,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;This can be done with or without ACS. I think with ACS it would be more reliable and centralized.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;I recreated this in our lab few months ago with ACS server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Following are minimum commands that need to be permitted for a read only account for ASA 8.0(4) and ASDM 6.1.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;ACS configuration:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Go to shared profile component &amp;gt; shell command authorization &amp;gt; Edit/add the authorization set and make sure we have these command and respective argument available there. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Argument&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;copy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit all unmatched arguments&lt;BR /&gt;dir&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit disk0:/dap.xml&lt;BR /&gt;enable&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit &lt;CR&gt;&lt;BR /&gt;Perfmon&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit interval 10&lt;BR /&gt;show&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit all unmatched arguments&lt;BR /&gt;write&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit net&lt;BR /&gt;exit&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit all&lt;/CR&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt; These commands are required on ASA/PIX/FWSM in order to implement command authorization through an ACS server:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa-server authserver protocol tacacs+&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa-server authserver host x.x.x.x&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization command authserver&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;With above seetings, you can use privilege 15 on the ACS. It will only allow user to run show commands. user won't be able to make any changes.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;In case it doesn't work, please run the &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;debug tacacs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;debug authorization&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Do rate helpful posts-&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Jun 2010 22:17:51 GMT</pubDate>
    <dc:creator>Jatin Katyal</dc:creator>
    <dc:date>2010-06-08T22:17:51Z</dc:date>
    <item>
      <title>AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255947#M334472</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ACS 4.2 Appliance which is integrated with Cisco ASA. I need to configure the users in ACS with read-only access to ASDM. Can anybody help me to know which commands are required in ASA and what parametrs are needs to configured in ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255947#M334472</guid>
      <dc:creator>sunil.aroraa</dc:creator>
      <dc:date>2019-03-10T23:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255948#M334473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't believe it can be done. ASDM is for configuration and can not be configured strictly for monitoring.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2009 13:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255948#M334473</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-08-05T13:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255949#M334474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sunil,&lt;/P&gt;&lt;P&gt;If you do not have command authorization in place on your ASA, then you can simply pass&lt;/P&gt;&lt;P&gt;down an exec authorization privilege of 1 to that user when they log into ASDM.  This will&lt;/P&gt;&lt;P&gt;allow them to look through all of ASDM like any other user.  But if they were to try to&lt;/P&gt;&lt;P&gt;write something to the configuration, then that would fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do have command authorization in place, or if you would like to have command&lt;/P&gt;&lt;P&gt;authorization, then there is actually a set of commands that are required in order to give read only access for ASDM which you would have to move to a lower privilege.  Luckily, there is a feature in ASDM which will allow you to move a series of commands to Read Only privilege 5 ASDM access, as well as a series of commands to Monitor only privilege 3 ASDM access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently, logging in with a user of privilege 15, navigate to Configuration &amp;gt; Device Administration &amp;gt; AAA Access &amp;gt; Authorization.  There is a button "Predefined User Account Privilege".  If you select this and apply this, it will set a series of commands to a lower privilege based on what ASDM needs to authorize that user for either Read Only or Monitor Only access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would need to create a new user account with privilege 5 access so that ASDM is read only, or create a new user with privilege 3 for monitor-only access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2009 14:18:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255949#M334474</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-08-05T14:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255950#M334475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's helpful info Jagdeep. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2009 14:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255950#M334475</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-08-05T14:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255951#M334476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks JG for your prompt reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now I dont have authorization commnads on ASA but authentication is happening from ACS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in your 1st option:&lt;/P&gt;&lt;P&gt;How to pass privilege level 1 to read-only user which is authenticating from ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And in 2nd option:&lt;/P&gt;&lt;P&gt;I have configured read-only users with privilege 15 due to if I keep the privilege less than 15 then user is unable to login in privilge mode (for command show run etc. in routers)&lt;/P&gt;&lt;P&gt;In this option if user get the privilege level 5 or 3 from ACS then it is very much easy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;Sunil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2009 14:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255951#M334476</guid>
      <dc:creator>sunil.aroraa</dc:creator>
      <dc:date>2009-08-05T14:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255952#M334477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jagdeep,&lt;/P&gt;&lt;P&gt;This doesn't seem to work in ASDM 6.2(1), at least as far as setting up a level 3 or 5.&amp;nbsp; They both seem to have enable privileges.&lt;/P&gt;&lt;P&gt;I'm looking to avoid using AAA, we've been burned in the past.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Jimmyc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jun 2010 18:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255952#M334477</guid>
      <dc:creator>jimmyc_2</dc:creator>
      <dc:date>2010-06-08T18:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255953#M334478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Sunil,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;This can be done with or without ACS. I think with ACS it would be more reliable and centralized.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;I recreated this in our lab few months ago with ACS server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Following are minimum commands that need to be permitted for a read only account for ASA 8.0(4) and ASDM 6.1.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;ACS configuration:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Go to shared profile component &amp;gt; shell command authorization &amp;gt; Edit/add the authorization set and make sure we have these command and respective argument available there. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Argument&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;copy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit all unmatched arguments&lt;BR /&gt;dir&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit disk0:/dap.xml&lt;BR /&gt;enable&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit &lt;CR&gt;&lt;BR /&gt;Perfmon&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit interval 10&lt;BR /&gt;show&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit all unmatched arguments&lt;BR /&gt;write&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit net&lt;BR /&gt;exit&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit all&lt;/CR&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt; These commands are required on ASA/PIX/FWSM in order to implement command authorization through an ACS server:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa-server authserver protocol tacacs+&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa-server authserver host x.x.x.x&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization command authserver&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;With above seetings, you can use privilege 15 on the ACS. It will only allow user to run show commands. user won't be able to make any changes.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;In case it doesn't work, please run the &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;debug tacacs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;debug authorization&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Do rate helpful posts-&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jun 2010 22:17:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255953#M334478</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2010-06-08T22:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255954#M334479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jagdeep,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found a very important step that I was missing, to wit:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;STRONG&gt;Step 7 &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="5" /&gt;In the Access Restriction area, set the management access level for a&amp;nbsp; user. You must first enable management authorization using the &lt;STRONG class="cBold"&gt;Perform authorization for exec shell access&lt;/STRONG&gt; option on the&amp;nbsp; Configuration &amp;gt; Device Management &amp;gt; Users/AAA &amp;gt; AAA Access &amp;gt;&amp;nbsp; Authorization tab. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the link was &lt;SPAN style="color: navy; font-size: 10pt; font-family: Arial; "&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asdm/6_2/user/guide/mgt_acc.html#wp1581382"&gt;http://www.cisco.com/en/US/docs/security/asdm/6_2/user/guide/mgt_acc.html#wp1581382&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was kinda implied that level 5 was read-only, but you must configure it, as per above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jun 2010 15:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255954#M334479</guid>
      <dc:creator>jimmyc_2</dc:creator>
      <dc:date>2010-06-09T15:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255955#M334480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi colin,&lt;/P&gt;&lt;P&gt;It took a bit, but you can do it without AAA.&amp;nbsp; see my recent posts.&amp;nbsp;&amp;nbsp; regards,&amp;nbsp;&amp;nbsp; jimmyc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jun 2010 15:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255955#M334480</guid>
      <dc:creator>jimmyc_2</dc:creator>
      <dc:date>2010-06-09T15:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: AAA: ASDM read-only access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255956#M334481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Yes, you can do but for that you have to define almost all commands on the ASA with their privilege level. Suits those who doesn't have ACS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;Keep posting.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000; font-size: 10pt;"&gt;JK&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jun 2010 15:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-asdm-read-only-access/m-p/1255956#M334481</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2010-06-09T15:33:07Z</dc:date>
    </item>
  </channel>
</rss>

