<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Be aware that you have to add in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/limit-asa-login-access-with-local-aaa-database/m-p/3043809#M145340</link>
    <description>&lt;P&gt;Be aware that you have to add aaa&amp;nbsp;authorization even if you use attribute "remote-access" - otherwise ssh and ASDM logins are still working.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;deny SSH&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #1f497d;"&gt;aaa authorization exec LOCAL&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;deny ASDM (new since ASA 9.4)&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'Calibri',sans-serif; color: #1f497d;"&gt;aaa authorization http console LOCAL&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Apr 2017 20:01:03 GMT</pubDate>
    <dc:creator>Anton Hinterleitner</dc:creator>
    <dc:date>2017-04-05T20:01:03Z</dc:date>
    <item>
      <title>Limit ASA login access with LOCAL AAA database</title>
      <link>https://community.cisco.com/t5/network-security/limit-asa-login-access-with-local-aaa-database/m-p/3043807#M145335</link>
      <description>&lt;P&gt;I'm wanting to limit login access to my ASA5515 by changing the priv level for LOCAL user accts&lt;/P&gt;
&lt;P&gt;Quoting Cisco:&lt;BR /&gt;If you do not use command authorization (the aaa authorization console LOCAL command), then the&lt;BR /&gt;default level 2 allows management access to privileged EXEC mode. If you want to limit access to&lt;BR /&gt;privileged EXEC mode, either set the privilege level to 0 or 1, or use the service-type command.&lt;/P&gt;
&lt;P&gt;So I add a user to LOCAL database&lt;BR /&gt;username MyUser password cisco privilege 0&lt;/P&gt;
&lt;P&gt;And I have AAA&amp;nbsp;to LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;/P&gt;
&lt;P&gt;When I SSH to ASA I can login as MyUser&lt;BR /&gt;Granted MyUser still has to know enable password, but why wasn't MyUser denied login?&lt;/P&gt;
&lt;P&gt;ASA5515 v9.4(3)12&lt;/P&gt;
&lt;P&gt;What did I miss in this?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/limit-asa-login-access-with-local-aaa-database/m-p/3043807#M145335</guid>
      <dc:creator>Phil Williamson</dc:creator>
      <dc:date>2019-03-12T09:08:57Z</dc:date>
    </item>
    <item>
      <title>Privilege level 0 and 1 only</title>
      <link>https://community.cisco.com/t5/network-security/limit-asa-login-access-with-local-aaa-database/m-p/3043808#M145338</link>
      <description>&lt;P&gt;Privilege level 0 and 1 only limits access - it does not deny it.&lt;/P&gt;
&lt;P&gt;If you want to more completely restrict access (say for VPN users), the use the username attribute "remote-access".&lt;/P&gt;
&lt;P&gt;Source:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/admin-management.html#ID-2111-0000046a&lt;/P&gt;
&lt;P&gt;To look at it another way, here is a slightly different explanation than the one you cite, taken from the book "AAA Identity Management Security" (Cisco Press, 2010):&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P class="docText"&gt;Similar to Cisco IOS, ASA also provides 16 levels of access called &lt;SPAN class="docEmphasis"&gt;privilege levels&lt;/SPAN&gt;&lt;A name="the device"&gt;&lt;/A&gt;. By default, the following three levels are defined on the device:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P class="docText"&gt;&lt;SPAN class="docEmphStrong"&gt;privilege level 0:&lt;/SPAN&gt; Includes the &lt;SPAN class="docEmphStrong"&gt;show checksum&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;show curpriv&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;enable&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;help&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;show history&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;login&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;logout&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;page&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;show pager&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;clear pager&lt;/SPAN&gt;, &lt;SPAN class="docEmphStrong"&gt;quit&lt;/SPAN&gt;, and &lt;SPAN class="docEmphStrong"&gt;show version&lt;/SPAN&gt;&lt;A name="login the"&gt;&lt;/A&gt; commands. You cannot really access this level because after login the first level accessible is level 1. Hence, the commands defined in this level are available to all users and do not affect the configuration of the device.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="docText"&gt;&lt;SPAN class="docEmphStrong"&gt;privilege level 1:&lt;/SPAN&gt;&lt;A name="at the"&gt;&lt;/A&gt; Normal level on Telnet; includes all user-level commands at the &lt;SPAN class="docEmphasis"&gt;ASA&amp;gt;&lt;/SPAN&gt; prompt. This level is also known as &lt;SPAN class="docEmphasis"&gt;User-EXEC mode&lt;/SPAN&gt;&lt;A name="the configuration"&gt;&lt;/A&gt;. Commands at this level do not affect the configuration of the device.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="docText"&gt;&lt;SPAN class="docEmphStrong"&gt;privilege level 15:&lt;/SPAN&gt;&lt;A name="the"&gt;&lt;/A&gt; Includes all enable-level commands at the &lt;SPAN class="docEmphasis"&gt;ASA#&lt;/SPAN&gt;&lt;A name="any configuration"&gt;&lt;/A&gt; prompt. At this level, all commands are available and any configuration can be viewed or changed. This level is also known as &lt;SPAN class="docEmphasis"&gt;Privileged-EXEC mode&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="docText"&gt;&lt;A name="you login"&gt;&lt;/A&gt;When you login to the device, you arrive at privilege level 1. To get to level 15, you have to use the &lt;SPAN class="docEmphStrong"&gt;enable&lt;/SPAN&gt;&lt;A name="is configured"&gt;&lt;/A&gt; command and enter the configured enable password.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Thu, 30 Mar 2017 08:41:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/limit-asa-login-access-with-local-aaa-database/m-p/3043808#M145338</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-30T08:41:17Z</dc:date>
    </item>
    <item>
      <title>Be aware that you have to add</title>
      <link>https://community.cisco.com/t5/network-security/limit-asa-login-access-with-local-aaa-database/m-p/3043809#M145340</link>
      <description>&lt;P&gt;Be aware that you have to add aaa&amp;nbsp;authorization even if you use attribute "remote-access" - otherwise ssh and ASDM logins are still working.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;deny SSH&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #1f497d;"&gt;aaa authorization exec LOCAL&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;deny ASDM (new since ASA 9.4)&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'Calibri',sans-serif; color: #1f497d;"&gt;aaa authorization http console LOCAL&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 20:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/limit-asa-login-access-with-local-aaa-database/m-p/3043809#M145340</guid>
      <dc:creator>Anton Hinterleitner</dc:creator>
      <dc:date>2017-04-05T20:01:03Z</dc:date>
    </item>
  </channel>
</rss>

