<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Aaa for serial login in asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059171#M1068771</link>
    <description>&lt;P&gt;To cover all bases what if the ASA loses all it's connection and we have to login via the serial console physically.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would this config work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 05 Apr 2020 02:33:19 GMT</pubDate>
    <dc:creator>Alfredcfc</dc:creator>
    <dc:date>2020-04-05T02:33:19Z</dc:date>
    <item>
      <title>Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4057264#M1068612</link>
      <description>&lt;P&gt;Do we need to enable aaa for serial login?.&lt;/P&gt;&lt;P&gt;Currently I have not enabled and it's blank, when I queried the cisco tac whether not having a aaa config for serial cable&amp;nbsp; while having it for others such sab and ht woud work he said.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;He said when I connect serial cable to the asa nothing will prompted no username no passowrd no enable password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this correct ?.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are going for an upgrade I don't want to lockout the asa firewall in the middle of an upgrade,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the current config looks something like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#aaa ssh console Tacacs+ local&amp;nbsp;&lt;/P&gt;&lt;P&gt;#aaa http console&amp;nbsp;Tacacs+ local&amp;nbsp;&lt;/P&gt;&lt;P&gt;#aaa authorization Tacacas+ local&amp;nbsp;&lt;/P&gt;&lt;P&gt;#aaa authorization enable auth-sever local&amp;nbsp;&lt;/P&gt;&lt;P&gt;#aaa accounting Tacacs+&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 01:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4057264#M1068612</guid>
      <dc:creator>Alfredcfc</dc:creator>
      <dc:date>2020-04-02T01:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4057389#M1068622</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Are you doing the upgrade from the console or remote via SSH for example? Post the complete aaa config from the ASA, one missing command or wrongly presented by you, and you could get wrong instructions. For example, there is no "aaaa authorisation enable".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 05:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4057389#M1068622</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-02T05:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059011#M1068740</link>
      <description>The upgrade will be done remotely,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The aaa config is :&lt;BR /&gt;&lt;BR /&gt;aaa authentication enable console TACACS LOCAL&lt;BR /&gt;aaa authentication http console TACACS LOCAL&lt;BR /&gt;aaa authentication ssh console TACACS LOCAL&lt;BR /&gt;aaa authorization command TACACS LOCAL&lt;BR /&gt;aaa accounting enable console TACACS&lt;BR /&gt;aaa accounting ssh console TACACS</description>
      <pubDate>Sat, 04 Apr 2020 14:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059011#M1068740</guid>
      <dc:creator>Alfredcfc</dc:creator>
      <dc:date>2020-04-04T14:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059043#M1068744</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;If you have that configuration and remotely login to the ASA to perform the upgrade, you will only loose access to the ASA as a part of the restart process; when it comes back online, you'll be able to login again. Ensure to use the "verify /md5" and "verify /sha512" to ensure the new image is not corrupted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 16:21:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059043#M1068744</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-04T16:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059086#M1068752</link>
      <description>&lt;P&gt;I have tested in my lab.&lt;/P&gt;
&lt;P&gt;you should be fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ASA
!
username admin password cisco priv 15
!
aaa-server ISE protocol tacacs+
aaa-server ISE (mgmt) host 150.1.7.212
key cisco
!
aaa authentication ssh console ISE LOCAL
aaa authentication enable console ISE LOCAL
aaa authentication http console ISE LOCAL
aaa authentication telnet console ISE LOCAL
!
aaa authorization command ISE LOCAL
aaa authentication secure-http-client
aaa authorization exec authentication-server auto-enable
aaa authorization http console ISE
!
aaa accounting ssh console ISE
aaa accounting serial console ISE
aaa accounting enable console ISE
aaa accounting command ISE
aaa accounting telnet console ISE&lt;/PRE&gt;</description>
      <pubDate>Sat, 04 Apr 2020 19:20:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059086#M1068752</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-04-04T19:20:38Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059171#M1068771</link>
      <description>&lt;P&gt;To cover all bases what if the ASA loses all it's connection and we have to login via the serial console physically.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would this config work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2020 02:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059171#M1068771</guid>
      <dc:creator>Alfredcfc</dc:creator>
      <dc:date>2020-04-05T02:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059205#M1068775</link>
      <description>Hi Alfred,&lt;BR /&gt;&lt;BR /&gt;With the current ASA configuration, you should not be facing any authentication issues on serial port.&lt;BR /&gt;However if you are upgrading remotely one of the used cases that we have seen is that sometimes reachability to AAA server is lost temporarily, so you should be having a local username configured on the device, this will help in the fallback mechanism.&lt;BR /&gt;&lt;BR /&gt;Here is a link to command reference which talks about this command :&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a1.html#pgfId-1594161" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a1.html#pgfId-1594161&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Go ahead with the upgrade. Good Luck!!&lt;BR /&gt;&lt;BR /&gt;-&lt;BR /&gt;Pulkit</description>
      <pubDate>Sun, 05 Apr 2020 06:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059205#M1068775</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2020-04-05T06:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059225#M1068780</link>
      <description>&lt;P&gt;hi Saxena,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the info,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For my understanding what will happen when i connect to the serial port since I have not enabled any aaa for the serial port, I &lt;STRONG&gt;wouldn't be prompt for any the login username, password and enable password?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2020 08:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059225#M1068780</guid>
      <dc:creator>Alfredcfc</dc:creator>
      <dc:date>2020-04-05T08:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059258#M1068781</link>
      <description>&lt;P&gt;earlier in post you mentioned your config&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;aaa authentication enable console TACACS+ LOCAL

This basically tells the ASA use the local usermane and password database not the enable password.

If you want to authenticate using the locally configured enabled password just remove

aaa authentication enable console TACACS+ LOCAL &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;now if this below config still exist on production which going to upgrade. in that case you will&lt;/P&gt;
&lt;PRE&gt;aaa authentication enable console TACACS LOCAL
aaa authentication http console TACACS LOCAL
aaa authentication ssh console TACACS LOCAL
aaa authorization command TACACS LOCAL
aaa accounting enable console TACACS
aaa accounting ssh console TACACS &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;BR /&gt;aaa authentication serial console LOCAL ISE&lt;BR /&gt;&lt;BR /&gt;than local user authentication come in place.&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2020 09:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059258#M1068781</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-04-05T09:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059282#M1068783</link>
      <description>Hi Alfred,&lt;BR /&gt;&lt;BR /&gt;So i just checked this out, with your configuration, ASA being a security device it will still prompt for enable option on console.&lt;BR /&gt;When you will put "enable", which is tied to a username and not to a device on AAA server, it will point to username/password on the screen, which you will have to put.&lt;BR /&gt;So in your case, when you will connect to console/serial, you will type "enable", and this will prompt to username/password option.&lt;BR /&gt;So as a backup, you can configure a local username/password with privilege 15, and local enable password as well.&lt;BR /&gt;This will ensure that in case after a reboot, AAA server is not reachable, local credentials will let you in the box.&lt;BR /&gt;&lt;BR /&gt;Hope this helped.&lt;BR /&gt;&lt;BR /&gt;-&lt;BR /&gt;Pulkit&lt;BR /&gt;Please keep rating helpful posts.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 05 Apr 2020 10:54:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059282#M1068783</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2020-04-05T10:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059420#M1068796</link>
      <description>&lt;P&gt;Hi salim,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your input, If I am understanding correctly you are meaning to say that the command:&lt;/P&gt;&lt;PRE&gt;aaa authentication enable console TACACS+ LOCAL&lt;/PRE&gt;&lt;P&gt;will authenticate the enable password typed by the user with TACACS+ database in the ISE server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for me to login in to the serial port with using the local username and password do I have to configure the below command ?.&lt;/P&gt;&lt;PRE&gt;aaa authentication serial console LOCAL.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when i type the &amp;gt;enable command the password i will use will be sent to the TACACS+ server and I will not be able to login because the below command is still active.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication enable console TACACS+ LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I don't want to remove the above command because I want all users enable pass to be authenticated by TACACS+ ISE server,&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2020 17:12:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059420#M1068796</guid>
      <dc:creator>Alfredcfc</dc:creator>
      <dc:date>2020-04-05T17:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059424#M1068797</link>
      <description>&lt;P&gt;Will I be prompted for username and password ?. since I have not configured the below command for serial authentcation&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication serial console&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my doubt I have never logged into the serial port before.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Apr 2020 17:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059424#M1068797</guid>
      <dc:creator>Alfredcfc</dc:creator>
      <dc:date>2020-04-05T17:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: Aaa for serial login in asa</title>
      <link>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059650#M1068820</link>
      <description>Hi Alfred,&lt;BR /&gt;&lt;BR /&gt;You will be prompted because you have "aaa authentication enable console TACACS+ LOCAL", however enable is binded with username, so ASA will send you a username/password prompt which you can put.&lt;BR /&gt;&lt;BR /&gt;Long story short, if after upgrade ASA is reachable to AAA server, console access will work with any user configured on AAA server. For backup in case AAA server reachability has some issues, configure a local username and password and you will be good to go.&lt;BR /&gt;&lt;BR /&gt;-&lt;BR /&gt;Pulkit</description>
      <pubDate>Mon, 06 Apr 2020 07:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/m-p/4059650#M1068820</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2020-04-06T07:32:29Z</dc:date>
    </item>
  </channel>
</rss>

