<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using AAA for PDM Access in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-aaa-for-pdm-access/m-p/138364#M438033</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"aaa authorization command LOCAL" is required to enable the authorization for PDM.  For telnet or other access, unlike PDM, you are forced  to enter the enable password, which in your case the same password as your user password.  So, user's enable access (i.e.,  what commands users are allowed to execute)  is limited to the user priv level defined for your user, in your case thats 1.   But you don't have that option (to enter the enable password) when use PDM.  Thats why "aaa authorization command" is required. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope its clear !  Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mynul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Jun 2003 02:49:16 GMT</pubDate>
    <dc:creator>mhoda</dc:creator>
    <dc:date>2003-06-12T02:49:16Z</dc:date>
    <item>
      <title>Using AAA for PDM Access</title>
      <link>https://community.cisco.com/t5/network-access-control/using-aaa-for-pdm-access/m-p/138362#M438031</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have AAA authentication enabled for PDM connections on a 515E Firewall. However i am able to connect using a username (with privilege level 1) to PDM and can make ANY Changes\Modifcations and SAVE them to Flash.&lt;/P&gt;&lt;P&gt;However with the same user "telnet" to PIX doesn't get any privilege commands as desired.&lt;/P&gt;&lt;P&gt;With reference to the below config, i can login with username "yyyy" to PDM and have FULL Access. Why ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username zzzzz password xxxxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;username yyyyy password xxxxx encrypted privilege 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show aaa&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 14:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-aaa-for-pdm-access/m-p/138362#M438031</guid>
      <dc:creator>mnlatif</dc:creator>
      <dc:date>2019-03-10T14:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using AAA for PDM Access</title>
      <link>https://community.cisco.com/t5/network-access-control/using-aaa-for-pdm-access/m-p/138363#M438032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;--begin ciscomoderator note-- The following post has been edited to remove potentially confidential information. Please refrain from posting confidential information on the site to reduce security risks to your network. -- end ciscomoderator note -- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PDM does default to giving users full access, don't ask me why. To restrict certain users to only being able to look at the config, assign those PDM users to a specific privilege level, then move certain commands down to that level and enable command authorization. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following works in my PIX: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username --moderator edit-- password --moderator edit-- encrypted privilege 9 &lt;/P&gt;&lt;P&gt;privilege show level 9 command interface &lt;/P&gt;&lt;P&gt;privilege show level 9 command running-config &lt;/P&gt;&lt;P&gt;privilege show level 9 command aaa &lt;/P&gt;&lt;P&gt;privilege show level 9 command privilege &lt;/P&gt;&lt;P&gt;privilege show level 9 command pdm &lt;/P&gt;&lt;P&gt;privilege show level 9 command blocks &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The commands listed are the ones PDM runs on your PIX when it first starts up, you have to give that user privilege to run those commands at their privilege level, that way PDM will start up fine. Whenever they make a change and try and apply it though, since that is a level 15 function they'll get an error. If they Telnet/SSh directly into the PIX, they can still type "en" to get to level 15 and do whatever they like from there, so it shouldn't make any difference that way. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a read of &lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/110/pix_command.shtml" target="_blank"&gt;http://www.cisco.com/warp/public/110/pix_command.shtml&lt;/A&gt; for more info on the command authorization stuff if you like. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2003 01:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-aaa-for-pdm-access/m-p/138363#M438032</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2003-06-12T01:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: Using AAA for PDM Access</title>
      <link>https://community.cisco.com/t5/network-access-control/using-aaa-for-pdm-access/m-p/138364#M438033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"aaa authorization command LOCAL" is required to enable the authorization for PDM.  For telnet or other access, unlike PDM, you are forced  to enter the enable password, which in your case the same password as your user password.  So, user's enable access (i.e.,  what commands users are allowed to execute)  is limited to the user priv level defined for your user, in your case thats 1.   But you don't have that option (to enter the enable password) when use PDM.  Thats why "aaa authorization command" is required. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope its clear !  Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mynul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2003 02:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-aaa-for-pdm-access/m-p/138364#M438033</guid>
      <dc:creator>mhoda</dc:creator>
      <dc:date>2003-06-12T02:49:16Z</dc:date>
    </item>
  </channel>
</rss>

