<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASDM Authentication in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790469#M1003346</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi  ..  can you check you have also AAA configured for accessing the ASA by https. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication http console group-tag&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Jun 2007 00:26:47 GMT</pubDate>
    <dc:creator>Fernando_Meza</dc:creator>
    <dc:date>2007-06-22T00:26:47Z</dc:date>
    <item>
      <title>ASDM Authentication</title>
      <link>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790466#M1003323</link>
      <description>&lt;P&gt;I currently have an ACS Appliance performing tacacs authentication for my network devices.  I have a few user groups in there to assign access to certain devices and at certain priviledge levels.  One of the groups allows the user to authenticate to any network device, but only with a max priviledge level of 1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When these users log into my ASA's, they are unable to go into enable mode, which is good.  But when they log into the ASA via ASDM, they can perform changes and write them to flash.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASDM reports they are logged in at priviledge level 15. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone else noticed a similar issue?  If so, where you able to mitigate it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790466#M1003323</guid>
      <dc:creator>lou_young</dc:creator>
      <dc:date>2019-03-11T10:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM Authentication</title>
      <link>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790467#M1003330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No one?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2007 15:06:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790467#M1003330</guid>
      <dc:creator>lou_young</dc:creator>
      <dc:date>2007-06-14T15:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM Authentication</title>
      <link>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790468#M1003337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As long as the ASA is set to authorize all commands, create a command authorization set in ACS.  In the command authorization set, permit ?show? and ?write? (and permit unmatched arguments) and deny all other unmatched commands.  You then need to apply the command authorization set to the user, or if the user access devices besides the ASA, you may may to limit the devices the command authorization set is applied to for the user.  To limit it, create a network device group for the ASAs and then assign the shell command authorization set on a per network device group basis for the user.  With this setup, even if a user has priv 15, the command set will limit the commands they can use at prvi 15.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jun 2007 19:30:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790468#M1003337</guid>
      <dc:creator>d-rathman</dc:creator>
      <dc:date>2007-06-21T19:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM Authentication</title>
      <link>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790469#M1003346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi  ..  can you check you have also AAA configured for accessing the ASA by https. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication http console group-tag&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2007 00:26:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790469#M1003346</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-06-22T00:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM Authentication</title>
      <link>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790470#M1003352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you need to configure authentication and command authorization on ASA to limit access to the users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;have a look ta following link :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/config/mgaccess.htm#wp1047288" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/config/mgaccess.htm#wp1047288&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2007 02:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-authentication/m-p/790470#M1003352</guid>
      <dc:creator>rochopra</dc:creator>
      <dc:date>2007-06-22T02:33:56Z</dc:date>
    </item>
  </channel>
</rss>

