<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cannot get to privileged enable mode via  console in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078584#M1111610</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1706523"&gt;@kewwa&lt;/a&gt;, Do you use multiple mode or single mode? What kind of firepower is this?&lt;/P&gt;&lt;P&gt;In case of multiple mode, if you login via serial console, "enable" never sends request to RADIUS from the system execution space, no matter what you configured in the "aaa authentication enable console ...". It always uses "enable password" configured in the system execution space, if "enable" is run from the system (and context "enable password" if it is run from the context). Likewise, "login" from the system execution space always uses locally configured "username"s. This is little bit confusing, because for the initial serial console login "admin" context settings are used, i.e. RADIUS or TACACS+ or LOCAL, depending on the admin context configuration ("aaa authentication serial console ..."). There is a caveat here too: privilege level is never assigned during initial login to serial console. If you login via serial console, it is recommended to run "login" command afterwards (which will ask for a username and a password again) and not use "enable". The reason is: "enable" will change username to "enable_15" which may not be what you want (details omitted due to complexity and dependency on software versions).&lt;/P&gt;&lt;P&gt;NB. 1. I don't know if anything was changed in 9.20. 2. I honestly don't remember how things work in single mode. Should be similar.&lt;/P&gt;&lt;P&gt;The recommended config is:&lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication ssh console &amp;lt;ext-server&amp;gt; LOCAL&lt;BR /&gt;enable password ...&lt;BR /&gt;username &amp;lt;local-admin&amp;gt; password ... privilege 15&lt;BR /&gt;aaa authorization exec authentication-server auto-enable&lt;/P&gt;&lt;P&gt;To assign privilege level during ssh/telnet login RADIUS should return Service-Type(6) = Administrative. TACACS+ should return priv-lvl=15.&lt;/P&gt;&lt;P&gt;To troubleshoot use "debug aaa ..." (with options - determine by trial and error), "show curpriv" and RADIUS capture.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 25 Apr 2024 14:25:24 GMT</pubDate>
    <dc:creator>tvotna</dc:creator>
    <dc:date>2024-04-25T14:25:24Z</dc:date>
    <item>
      <title>cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5077799#M1111590</link>
      <description>&lt;P&gt;After searching through other posts, my config seems OK but still strange behaviour&lt;BR /&gt;asa 9.20 running on FPWR chasis&lt;BR /&gt;&lt;BR /&gt;I cannot get in enabled mode when connecting to ASA via console.&lt;BR /&gt;It used to work but stopped after I played (disable and restore) with aaa authentication LOCAL vs remote setting.&lt;BR /&gt;&lt;BR /&gt;Tests done: tried console and telnet for comparison; telne - no problem, console: get stuck with the &amp;gt;&lt;/P&gt;
&lt;P&gt;1. local password test&lt;/P&gt;
&lt;P&gt;with these settings&lt;BR /&gt;/admin# sh run aaa&lt;BR /&gt;aaa authentication http console RADIUS LOCAL&lt;BR /&gt;aaa authentication ssh console RADIUS LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa local authentication attempts max-fail 3&lt;BR /&gt;no aaa authentication login-history&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;and locally configured user&lt;BR /&gt;telnet: OK, enable - OK&lt;BR /&gt;console: NOK &lt;BR /&gt;%Login failed&lt;BR /&gt;and the low privilege prompt from the firewall (ASA) &lt;BR /&gt;ciscoasa&amp;gt;&lt;/P&gt;
&lt;P&gt;I tried one after another&amp;nbsp;&lt;BR /&gt;&amp;gt;en&amp;nbsp;&lt;BR /&gt;&amp;gt; login&lt;BR /&gt;&amp;gt; exit and again login&lt;BR /&gt;all failures. For the login I mange to loging as far as the initial prompt&lt;/P&gt;
&lt;P&gt;2. Remote authentication does not work either&lt;BR /&gt;I tested with aaa authentication and authorisation debug on and the radius debug&lt;BR /&gt;Only radius debug output but not when trying to en on the console:&lt;/P&gt;
&lt;P&gt;with these settings&lt;/P&gt;
&lt;P&gt;admin# sh run aaa&lt;BR /&gt;aaa authentication http console RADIUS LOCAL&lt;BR /&gt;aaa authentication ssh console RADIUS LOCAL&lt;BR /&gt;aaa authentication enable console RADIUS LOCAL&lt;BR /&gt;aaa authentication serial console RADIUS LOCAL&lt;BR /&gt;aaa local authentication attempts max-fail 3&lt;BR /&gt;no aaa authentication login-history&lt;/P&gt;
&lt;P&gt;prompt on console &lt;BR /&gt;hostname&amp;gt;&lt;BR /&gt;---no radius debug&lt;BR /&gt;exit (logoff) and prompt to login&lt;BR /&gt;Username (radius user)&lt;BR /&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;there is a radius debug output; user priv15&lt;BR /&gt;&amp;gt;en&lt;BR /&gt;radius password - Invalid password&lt;BR /&gt;enable local - Invalid password&lt;BR /&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;there is NO radius debug output&lt;/P&gt;
&lt;P&gt;telnet:&lt;BR /&gt;prompt: OK&lt;BR /&gt;en: OK&lt;BR /&gt;in both cases radius debug output&lt;/P&gt;
&lt;P&gt;There is no authorisation setting&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the closest issue was described here&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/network-security/unable-to-go-to-enable-mode-of-asa-via-console/td-p/2469186" target="_blank"&gt;https://community.cisco.com/t5/network-security/unable-to-go-to-enable-mode-of-asa-via-console/td-p/2469186&lt;/A&gt;&lt;BR /&gt;but did not help&lt;BR /&gt;I tried the&amp;nbsp;&lt;BR /&gt;aaa authorization exec authentication-server auto-enable described here&amp;nbsp;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-cli-reference/A-H/asa-command-ref-A-H/aa-ac-commands.html#wp6184732320:~:text=the%20AAA%20configuration.-,aaa%20authentication%20console,-To%20authenticate%20users" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-cli-reference/A-H/asa-command-ref-A-H/aa-ac-commands.html#wp6184732320:~:text=the%20AAA%20configuration.-,aaa%20authentication%20console,-To%20authenticate%20users&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;But it did not bring any effect - even for the ssh, which I had always authed by RADIUS&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I have not configured any other authorization as I did not want to log myself out and reload in nor manual reload would not be handy as it is cluster so there would be need to do it simmultaneously&lt;BR /&gt;Looking at the snippets here:&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/td-p/4057264" target="_blank"&gt;https://community.cisco.com/t5/network-security/aaa-for-serial-login-in-asa/td-p/4057264&lt;/A&gt;&lt;BR /&gt;I guess I miss the&amp;nbsp;&lt;BR /&gt;aaa authori command RADIUS LOCAL,&lt;BR /&gt;However I do not really think I need any authorization for my setup to work.&lt;BR /&gt;The reason I touched it was to make the login go directly to priviledged mode. Which did not happen&lt;BR /&gt;&lt;BR /&gt;Any hint will be appreciated&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 22:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5077799#M1111590</guid>
      <dc:creator>kewwa</dc:creator>
      <dc:date>2024-04-24T22:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078165#M1111597</link>
      <description>&lt;P&gt;Add new user (not found in radius) abd give it privilege 15' sure you need to access via telnet&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then try access to console.&lt;/P&gt;
&lt;P&gt;And friend later dont use fallback for console access' use only local user db.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 08:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078165#M1111597</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-25T08:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078228#M1111599</link>
      <description>&lt;P&gt;I used a local user in the first try. It had priv15 and was not existing in RADIUS&lt;BR /&gt;There was no fallback in the config&lt;BR /&gt;&lt;SPAN&gt;aaa authentication enable console LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication serial console LOCAL&lt;BR /&gt;&lt;/SPAN&gt;The telnet was just to have a point of reference if local user works - and it worked&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The goal is actually to have all aaa Radius because if I have ssh auth by Radius and en by LOCAL, it will not work.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 10:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078228#M1111599</guid>
      <dc:creator>kewwa</dc:creator>
      <dc:date>2024-04-25T10:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078242#M1111600</link>
      <description>&lt;P&gt;&lt;SPAN&gt;This what you share&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;admin# sh run aaa&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication http console RADIUS LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication ssh console RADIUS LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication enable console &lt;STRONG&gt;RADIUS&lt;/STRONG&gt; LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa authentication serial console &lt;STRONG&gt;RADIUS&lt;/STRONG&gt; LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;aaa local authentication attempts max-fail 3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no aaa authentication login-history&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If there is issue with radius or the radius send reject not unknown user then sure the access will deny by ASA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That why I mention that dont use same username in local and radius&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 10:05:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078242#M1111600</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-25T10:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078265#M1111601</link>
      <description>&lt;P&gt;This is the second test.&lt;BR /&gt;the first one is in the point 1. of my initial description - I tried to do LOCAL which does not work either (it is not my target config, but it was a test which failed as well)&lt;/P&gt;
&lt;P&gt;In the second test - with a RADIUS, the&amp;nbsp;Radius does not send any reject - I did a packet capture, only accept&lt;BR /&gt;What is strange is that if I login via console (forced logon) The first login is successfull, the radius debug on asa shows sending the auth request and gets accept and I end up with firewall&amp;gt; prompt. In the second step I type "en" and am prompted for a password but after typing in there is no more debug information as if ASA did not bother to send the auth request to radius&lt;BR /&gt;The result is "auth failed"&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 10:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078265#M1111601</guid>
      <dc:creator>kewwa</dc:creator>
      <dc:date>2024-04-25T10:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078269#M1111602</link>
      <description>&lt;P&gt;If this is lab then try below&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;aaa authorization exec RADIUS local&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;It seem to me issue with exec&lt;/P&gt;
&lt;P&gt;If this is not lab' please mention that to make me try suggestion before you in my lab.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 10:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078269#M1111602</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-25T10:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078545#M1111609</link>
      <description>&lt;P&gt;One thing to keep in mind when you enable the enable aaa authentication with the command "aaa authentication enable console" is that with that command applied the enable password the users need to type in is going to be their own passwords, not the global enable password/secret you configured on the ASA. However, when that command is not applied, then all the users would need to type in the global enable password.&lt;/P&gt;
&lt;P&gt;Also, as you mentioned, the authorization command is not required in your case because the ASA by default allows the exec authorization, this is why the users are placed into the user mode (&amp;gt;) when they logged in. Another thing is that with RADIUS both authentication and authorization are combined into a single call, no separate transaction for authorization. A common use case of using the authorization command would be if you want the users to be placed into privilege 15 after they logged in, you can use the authorization command with the keyword "auto-enable" as you showed in your original post.&lt;/P&gt;
&lt;P&gt;One thing you can do to trying to find out the issue is to connect with an SSH session to the firewall, and then trying to console into it and see what logs get generated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 14:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078545#M1111609</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-25T14:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078584#M1111610</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1706523"&gt;@kewwa&lt;/a&gt;, Do you use multiple mode or single mode? What kind of firepower is this?&lt;/P&gt;&lt;P&gt;In case of multiple mode, if you login via serial console, "enable" never sends request to RADIUS from the system execution space, no matter what you configured in the "aaa authentication enable console ...". It always uses "enable password" configured in the system execution space, if "enable" is run from the system (and context "enable password" if it is run from the context). Likewise, "login" from the system execution space always uses locally configured "username"s. This is little bit confusing, because for the initial serial console login "admin" context settings are used, i.e. RADIUS or TACACS+ or LOCAL, depending on the admin context configuration ("aaa authentication serial console ..."). There is a caveat here too: privilege level is never assigned during initial login to serial console. If you login via serial console, it is recommended to run "login" command afterwards (which will ask for a username and a password again) and not use "enable". The reason is: "enable" will change username to "enable_15" which may not be what you want (details omitted due to complexity and dependency on software versions).&lt;/P&gt;&lt;P&gt;NB. 1. I don't know if anything was changed in 9.20. 2. I honestly don't remember how things work in single mode. Should be similar.&lt;/P&gt;&lt;P&gt;The recommended config is:&lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication ssh console &amp;lt;ext-server&amp;gt; LOCAL&lt;BR /&gt;enable password ...&lt;BR /&gt;username &amp;lt;local-admin&amp;gt; password ... privilege 15&lt;BR /&gt;aaa authorization exec authentication-server auto-enable&lt;/P&gt;&lt;P&gt;To assign privilege level during ssh/telnet login RADIUS should return Service-Type(6) = Administrative. TACACS+ should return priv-lvl=15.&lt;/P&gt;&lt;P&gt;To troubleshoot use "debug aaa ..." (with options - determine by trial and error), "show curpriv" and RADIUS capture.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 14:25:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078584#M1111610</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-25T14:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078596#M1111613</link>
      <description>&lt;P&gt;Use exec and since you use enable auth let radius check each user, auto-enable meaning you dont need anymore enable auth.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 14:34:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078596#M1111613</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-25T14:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078744#M1111617</link>
      <description>&lt;P&gt;You are right, the service type 6 would be used to allow administrative accesses to the firewall. However, and I'm not sure if this works only on the IOS devices, with RADIUS we can still push the "priv-lvl=15" value over RADIUS as you can see in my post link below.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bluenetsec.com/priv-level-15-with-cisco-ise/" target="_blank"&gt;Privilege Level 15 with Cisco ISE | Blue Network Security (bluenetsec.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Also, I think we still can do the "enable" authentication via RADIUS, in fact on a Cisco U ISE training I remember going through a scenario where it was showing an example of ISE configuration where the enable authentication rule is configured, but I can't remember if I ever tested that myself.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 16:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078744#M1111617</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-25T16:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078785#M1111618</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;, maybe priv-lvl=15 Cisco VSA can also be used, but the most natural way to control user privileges with RADIUS is the standard RADIUS attribute Service-Type: 6 - "administrative" (privileged), 7 - "nas-prompt" (unprivileged) and 5 - "outbound" or "remote-access" (no access to CLI). This is inline with ASA CLI:&lt;/P&gt;&lt;PRE&gt;username cisco attributes&lt;BR /&gt;&amp;nbsp;service-type {admin | nas-prompt | remote-access}&lt;/PRE&gt;&lt;P&gt;Of course, enable authentication can be performed via RADIUS too and you're correct that user must enter his own password (not a separate enable password) in response to enable prompt. (This is helpful if auto-enable authorization is not configured for some reason and the user is not assigned privilege level during login). The RADIUS behavior is different from TACACS+ where enable password for the user is configured separately on the TACACS+ server. What I meant in my previous post is that serial console is special (&lt;U&gt;in multiple context mode&lt;/U&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; if user logged on via serial console, "enable" command doesn't even try to contact external authentication server and that is why "debug radius" is empty. See below for a bug id which has never been fixed.&lt;/P&gt;&lt;P&gt;Also, if RADIUS login authentication is configured, the user logs in via telnet or ssh and RADIUS server returns anything but 6, subsequent "enable" command fails even though RADIUS sends back Access-Accept. This makes sense, because the user has been restricted to unprivileged "NAS prompt" during initial RADIUS authentication.&lt;/P&gt;&lt;P&gt;CSCsw18455 admin context enable mode credentials compared to system context DB&lt;BR /&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt; In multi-mode configuration, user credentials for entering privileged mode (enable mode) via serial console are not sent to external server for authentication purpose. &lt;STRONG&gt;Conditions:&lt;/STRONG&gt; ASA/PIX is in multi-mode. serial console and enable console authentication are configured to use external aaa server in admin context. &lt;STRONG&gt;Workaround:&lt;/STRONG&gt; Option 1: Configure enable password in system context. Option 2: Avoid the use of the serial console interface and rely on telnet or ssh console access. From ssh or telnet consoles, attempts to enter enabled mode will be authenticated as specified by the aaa configuration in the "admin" context. &lt;STRONG&gt;Further Problem Description:&lt;/STRONG&gt; When authentication is enabled for serial console and for enable console in admin context via an external aaa server(eg: tacacs+ or radius), serial console authentcation is done against external aaa server, but enable mode credentials are compared against enable db in system context.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;CSCsz93058 System Context only allows local enable password&lt;BR /&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt; Enable authentication in the system context can only use local the local enable password. It should be able to be authenticated against AAA. &lt;STRONG&gt;Conditions:&lt;/STRONG&gt; ASA 8.1 ASA 8.2 Multi-Context mode. &lt;STRONG&gt;Workaround:&lt;/STRONG&gt; None if the serial console is used, the local enable password must be used in the system context. If the ssh or telnet consoles are used, attempts to enter enabled mode will be authenticated as specified by the aaa configuration in the "admin" context. &lt;STRONG&gt;Further Problem Description:&lt;/STRONG&gt; This is an enhancement request to have aaa enable authentication added to the system context. When logging in via the serial console the username/password can already be authenticated against an aaa server.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 18:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078785#M1111618</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-25T18:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078800#M1111619</link>
      <description>&lt;P&gt;Documentation:&lt;/P&gt;&lt;P class=""&gt;&lt;EM&gt;The RADIUS IETF &lt;STRONG&gt;service-type&lt;/STRONG&gt; attribute, when sent in an access-accept message as the result of a RADIUS authentication and authorization request, is used to designate which type of service is granted to the authenticated user&lt;/EM&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;EM&gt;The RADIUS Cisco VSA &lt;STRONG&gt;privilege-level&lt;/STRONG&gt; attribute (Vendor ID 3076, sub-ID 220), when sent in an access-accept message, is used to designate the level of privilege for the user.&lt;/EM&gt;&lt;/P&gt;&lt;P class=""&gt;So, this appears to be legacy Altiga VSA (as you remember, the company which developed entire RA VPN technology which was ported to ASA 7.0 when the company was acquired by Cisco), although documentation can be obsolete.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 18:26:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5078800#M1111619</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-25T18:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079446#M1111663</link>
      <description>&lt;P&gt;Not exactly but the hint about the global/system context password helped to solve my issue&lt;/P&gt;
&lt;P&gt;Indeed I am using the context mode and the en password for the en on the console in the system context enable password and that one works&lt;BR /&gt;Even if I have RADISU authentication, the login is with the radius account, however to get to enable mode I need to give the enable password configured in the system. Now it works.&lt;/P&gt;
&lt;P&gt;Thank you all for the discussion that helped to solve my issue&lt;/P&gt;
&lt;P&gt;My working setup is:&lt;BR /&gt;# sh run aaa&lt;BR /&gt;aaa authentication http console RADIUS LOCAL&lt;BR /&gt;aaa authentication ssh console RADIUS LOCAL&lt;BR /&gt;aaa authentication enable console RADIUS LOCAL&lt;BR /&gt;aaa authentication serial console RADIUS LOCAL&lt;BR /&gt;aaa local authentication attempts max-fail 3&lt;BR /&gt;no aaa authentication login-history&lt;/P&gt;
&lt;P&gt;to login in a console:&lt;BR /&gt;Login: my radius user (to be clear: it is a different user name than any of the locally configured users)&lt;BR /&gt;Password: Radius user password&lt;BR /&gt;&amp;gt; en&lt;BR /&gt;enable password configured in a system&lt;BR /&gt;(Out of curiosity I also tested the radius password and the enable password configured in the admin context and neither of them worked)&lt;/P&gt;
&lt;P&gt;This also explains why there were no radius requests sent from asa&amp;nbsp; when trying to use the radius password for the "enable".&lt;/P&gt;
&lt;P&gt;No authorization was needed&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;As additional out-of-curiosity test I configured:&lt;BR /&gt;# sh run aaa&lt;BR /&gt;aaa authentication http console RADIUS LOCAL&lt;BR /&gt;aaa authentication ssh console RADIUS LOCAL&lt;BR /&gt;aaa authentication serial console RADIUS LOCAL&lt;BR /&gt;aaa local authentication attempts max-fail 3&lt;BR /&gt;no aaa authentication login-history&lt;BR /&gt;(no enable configuration)&lt;BR /&gt;It does not have effect on my login via console. It just does not allow me to go to enable mode after I login with my radius user. Neither Radius, no enable global password work&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 12:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079446#M1111663</guid>
      <dc:creator>kewwa</dc:creator>
      <dc:date>2024-04-26T12:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079473#M1111665</link>
      <description>&lt;P&gt;debug aaa common 255 &amp;lt;&amp;lt;- share this, and note disable debug after end&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 12:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079473#M1111665</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T12:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079483#M1111667</link>
      <description>&lt;P&gt;I'm with you now&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;, thanks for the clarification.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 13:01:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079483#M1111667</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-26T13:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079485#M1111668</link>
      <description>&lt;P&gt;I cannot share that information however, as mentioned in the initial description - I did the aaa debugs:&lt;BR /&gt;for the console connection:&lt;BR /&gt;- there is output when I login&amp;nbsp;&lt;BR /&gt;- there is no output when I am loggin to the priviledged mode&lt;BR /&gt;&lt;BR /&gt;for the ssh connection:&lt;BR /&gt;- there is output when I login&amp;nbsp;&lt;BR /&gt;- there is output when I am loggin to the priviledged mode&lt;BR /&gt;&lt;BR /&gt;My comment was jsut proving that the console enabled mode doe snot use remote authentication&lt;BR /&gt;&lt;BR /&gt;In any case: the issue is solved&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 13:03:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079485#M1111668</guid>
      <dc:creator>kewwa</dc:creator>
      <dc:date>2024-04-26T13:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079494#M1111669</link>
      <description>&lt;P&gt;Glad you came to the bottom of this and that the issue is now solved which is matching what was pointed out by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 13:08:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079494#M1111669</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-26T13:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079723#M1111677</link>
      <description>&lt;P&gt;Good. Please mark the issue as solved then.&lt;/P&gt;&lt;P&gt;Also, I still recommend enabling authorization with "aaa authorization exec authentication-server auto-enable" provided that you configured RADIUS correctly to send Service-Type attribute.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 15:30:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079723#M1111677</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-26T15:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: cannot get to privileged enable mode via  console</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079741#M1111679</link>
      <description>&lt;P&gt;I dont need to share anything here sensitive,&amp;nbsp;&lt;BR /&gt;I already do that, in night I will share where you can located important value to solve this issue&lt;BR /&gt;until that time&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 15:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-to-privileged-enable-mode-via-console/m-p/5079741#M1111679</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T15:41:11Z</dc:date>
    </item>
  </channel>
</rss>

