<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unfortunately, there is no in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074256#M135614</link>
    <description>&lt;P&gt;Unfortunately, there is no way to clear the console session. Only telnet, ssh and asdm sessions are allowed to be clear since they are a tcp session to the firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you have made a config that got you locked out, you can restart the ASA. This will help if config was not saved.&lt;/P&gt;
&lt;P&gt;If the config has been saved somehow after you got locked out, you can then do a password recovery to get back into the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
    <pubDate>Fri, 12 May 2017 20:02:31 GMT</pubDate>
    <dc:creator>Ajay Saini</dc:creator>
    <dc:date>2017-05-12T20:02:31Z</dc:date>
    <item>
      <title>Force ASA to disconnect console session</title>
      <link>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074255#M135613</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;i tried to google but can only see how to kill or clear SSH or telnet session to an ASA.&lt;/P&gt;
&lt;P&gt;could someone tell me how to kill the console session?&lt;/P&gt;
&lt;P&gt;we got a OOB server that console to the ASA and got locked when i applied the AAA when via another SSH session.&lt;/P&gt;
&lt;P&gt;was thinking to remove the AAA serial line but it doesn't have it.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;no aaa authentication serial console ACS LOCAL&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa/pri/act(config)# end&lt;BR /&gt;Command authorization failed&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:21:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074255#M135613</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-03-12T09:21:14Z</dc:date>
    </item>
    <item>
      <title>Unfortunately, there is no</title>
      <link>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074256#M135614</link>
      <description>&lt;P&gt;Unfortunately, there is no way to clear the console session. Only telnet, ssh and asdm sessions are allowed to be clear since they are a tcp session to the firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you have made a config that got you locked out, you can restart the ASA. This will help if config was not saved.&lt;/P&gt;
&lt;P&gt;If the config has been saved somehow after you got locked out, you can then do a password recovery to get back into the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 20:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074256#M135614</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-12T20:02:31Z</dc:date>
    </item>
    <item>
      <title>Do you know why it lock you</title>
      <link>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074257#M135615</link>
      <description>&lt;P&gt;Do you know why it lock you out or if you can tell what changes were made?&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 20:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074257#M135615</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-05-12T20:58:48Z</dc:date>
    </item>
    <item>
      <title>hi,</title>
      <link>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074258#M135616</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;looks like there's no other way to kill/clear the console session as you've said.&lt;/P&gt;
&lt;P&gt;i've applied AAA via OOB console and then tested SSH remote access.&lt;/P&gt;
&lt;P&gt;i can't exit out from global config on the console session.&lt;/P&gt;
&lt;P&gt;might just wait for routing to ACS to die for me use the LOCAL password and able to execute commands on the console.&lt;/P&gt;
&lt;P&gt;not sure if unplug/re-plug console would work as i haven't tried it and DC is unmanned.&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2017 01:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074258#M135616</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-05-13T01:01:01Z</dc:date>
    </item>
    <item>
      <title>You can create an ACL on the</title>
      <link>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074259#M135617</link>
      <description>&lt;P&gt;You can create an ACL on the device closer to affected firewall blocking its access to ACS, once that happens firewall will failover to local credentials.&lt;/P&gt;
&lt;P&gt;i guess you are only having issues accessing firewall via its console port through avocent or something similar. What about shut-no shut on the device that's connected to fw console port. Can you access the firewall via ssh? Or is it completely locked out? In either case blocking connectivity to ACS will work . Also asdm is not affected when changes are only made to ssh authentication .&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2017 02:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3074259#M135617</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-05-13T02:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: Force ASA to disconnect console session</title>
      <link>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3811642#M135618</link>
      <description>&lt;P&gt;Fix for this one is to set a console timeout to a low value and then it will automatically log the session off, you can then disable the timeout again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;console timeout 2&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 11:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/3811642#M135618</guid>
      <dc:creator>mlewis756494</dc:creator>
      <dc:date>2019-02-28T11:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: Do you know why it lock you</title>
      <link>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/4549129#M1087248</link>
      <description>&lt;P&gt;I am experiencing this right now.&amp;nbsp; It's a configuration issue on the firewall.&amp;nbsp; With a multiple context firewall, connecting via the serial port (console) puts the user into the System context.&amp;nbsp; And it's configured to use AAA (TACACS) for serial authentication, and then LOCAL as a fallback method.&amp;nbsp; But if, while on the console, you change contexts (changeto context foo), when you try to log out of the firewall console, or change context, it doesn't associate the user with your authenticated connection on the console port, so it fails command authorization.&amp;nbsp; And you can't exit the firewall.&amp;nbsp; Even typing 'exit' fails to be authorized.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Solution I found that works&amp;nbsp; (another post in this thread) is to set the console timeout to a lower value, then disconnect from the console and wait for that timer to expire.&amp;nbsp; The default command is 'console timeout 0' which means it never times out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, just like you probably configure a exec-timeout on the vty lines of your Cisco routers and switches, you should probably set the console timeout to a similar value, and not leave it at 0.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 01:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-asa-to-disconnect-console-session/m-p/4549129#M1087248</guid>
      <dc:creator>ronbuchalski</dc:creator>
      <dc:date>2022-02-10T01:23:22Z</dc:date>
    </item>
  </channel>
</rss>

