<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA RADIUS for SSH and LOCAL for Serial in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5222577#M1117460</link>
    <description>&lt;P&gt;Sorry for delay, we are still yet to reload this as it's an integral device. We have copied the config from this firewall exactly as below and it still doesn't work on console cable (but this firewall works as expected), it is a bit of an odd one:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa-server nps-radius protocol radius&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa-server nps-radius (management) host 172.x.x.x&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication ssh console nps-radius&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication enable console LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication serial console LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authorization exec authentication-server auto-enable&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication login-history&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;user-identity default-domain LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;username admin password ***** pbkdf2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;enable password ***** pbkdf2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Nov 2024 09:00:07 GMT</pubDate>
    <dc:creator>m.s.rees1</dc:creator>
    <dc:date>2024-11-11T09:00:07Z</dc:date>
    <item>
      <title>Cisco ASA RADIUS for SSH and LOCAL for Serial</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5212910#M1116833</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have just come across a problem. Just wondering if anyone can point us in the right direction. We have RADIUS set up for SSH access on our ASA firewall, which is working fine. We would like to use a console lead and login using the local account (not RADIUS) but we're getting issues doing so and can't log in. Here is our config:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa-server RAD-SERV protocol radius&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa-server RAD-SERV (mgmt) host x.x.x.x&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication serial console LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication enable console LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication ssh console RAD-SERV LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authorization exec authentication-server auto-enable&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication login-history&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;enable password ***** pbkdf2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username cisco password ***** pbkdf2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;It doesn't prompt for the username only for the enable password... the enable password we have set doesn't work.&lt;/P&gt;&lt;P&gt;Is there something we've missed or got wrong? - appreciate any help. Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 12:13:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5212910#M1116833</guid>
      <dc:creator>m.s.rees1</dc:creator>
      <dc:date>2024-10-22T12:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA RADIUS for SSH and LOCAL for Serial</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5212928#M1116838</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/19630"&gt;@m.s.rees1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;How your " line con 0"&amp;nbsp; is configured?&lt;/P&gt;
&lt;P&gt;And give your user privilege 15&lt;/P&gt;
&lt;P&gt;username test privilege 15 password cisco123&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 12:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5212928#M1116838</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-10-22T12:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA RADIUS for SSH and LOCAL for Serial</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5213001#M1116843</link>
      <description>&lt;P&gt;It doesn't accept the "line con 0" think it's because it's a firewall not a switch?&lt;/P&gt;&lt;P&gt;I'll try adding the extra privilege.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 15:02:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5213001#M1116843</guid>
      <dc:creator>m.s.rees1</dc:creator>
      <dc:date>2024-10-22T15:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA RADIUS for SSH and LOCAL for Serial</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5213020#M1116845</link>
      <description>&lt;P&gt;Do you see any interesting logs if you enable "debug aaa authentication"?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 15:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5213020#M1116845</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-22T15:45:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA RADIUS for SSH and LOCAL for Serial</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5213024#M1116846</link>
      <description>&lt;P&gt;I will enable this and have look. Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 15:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5213024#M1116846</guid>
      <dc:creator>m.s.rees1</dc:creator>
      <dc:date>2024-10-22T15:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA RADIUS for SSH and LOCAL for Serial</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5216777#M1117065</link>
      <description>&lt;P&gt;I have tested other devices with the same config and they work as expected, so it seems like there is an issue with the device. We will likely try a reload to see if this solves it.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 13:09:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5216777#M1117065</guid>
      <dc:creator>m.s.rees1</dc:creator>
      <dc:date>2024-10-29T13:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA RADIUS for SSH and LOCAL for Serial</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5217085#M1117093</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Use the "&lt;STRONG&gt;login"&amp;nbsp;&lt;/STRONG&gt;command to get username login prompt; afterwards, when using "&lt;STRONG&gt;enable&lt;/STRONG&gt;" to get into exec mode, use the user's password instead of the configured enable password.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Your test fails as bad on your config, when you type "&lt;STRONG&gt;enable"&amp;nbsp;&lt;/STRONG&gt;it will ask for the user's password, however since there's no user logged in, it will fail.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 23:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5217085#M1117093</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-29T23:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA RADIUS for SSH and LOCAL for Serial</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5222577#M1117460</link>
      <description>&lt;P&gt;Sorry for delay, we are still yet to reload this as it's an integral device. We have copied the config from this firewall exactly as below and it still doesn't work on console cable (but this firewall works as expected), it is a bit of an odd one:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa-server nps-radius protocol radius&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa-server nps-radius (management) host 172.x.x.x&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication ssh console nps-radius&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication enable console LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication serial console LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authorization exec authentication-server auto-enable&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authentication login-history&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;user-identity default-domain LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;username admin password ***** pbkdf2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;enable password ***** pbkdf2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Nov 2024 09:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5222577#M1117460</guid>
      <dc:creator>m.s.rees1</dc:creator>
      <dc:date>2024-11-11T09:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA RADIUS for SSH and LOCAL for Serial</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5225755#M1117613</link>
      <description>&lt;P&gt;We solved this. I failed to mention (apologies, I thought I had!) that this is a virtual firewall. We realised that when resetting the enable password, it was only done on the admin context and not the system context. Once we realised this, it all worked as expected. Thanks for your input.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2024 08:25:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-radius-for-ssh-and-local-for-serial/m-p/5225755#M1117613</guid>
      <dc:creator>m.s.rees1</dc:creator>
      <dc:date>2024-11-18T08:25:28Z</dc:date>
    </item>
  </channel>
</rss>

