<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic yes you can but the problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635711#M196768</link>
    <description>&lt;P&gt;yes you can but the problem is this:&lt;/P&gt;&lt;P&gt;To require a username and password for the serial interface (console) of the ASA you have to issue the 'aaa authentication serial console LOCAL' command in the admin context (as it doesnt not exist in the sys exec space), and if you do this the serial connection looks to the admin context local user database to authenticate the serial connections (and not the system exec user database.)&lt;/P&gt;&lt;P&gt;so while you are correct in that you can create local users in the system exec space, they are not&amp;nbsp;used to authenticate the local console connection, as it appears to use the admin context local user database.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Feb 2015 15:06:09 GMT</pubDate>
    <dc:creator>Lewis Quin</dc:creator>
    <dc:date>2015-02-25T15:06:09Z</dc:date>
    <item>
      <title>securing console in multicontext mode (ASA)</title>
      <link>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635705#M196762</link>
      <description>&lt;P&gt;Seeing as you cannot use AAA commands within the system exec space (when running an ASA in multi-context mode) how can you secure console access? I realize you can set the enable, but are there any other options to force login to console?.&lt;/P&gt;&lt;P&gt;Also do all contexts have to run the same OS&amp;nbsp;version as the system exec?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635705#M196762</guid>
      <dc:creator>Lewis Quin</dc:creator>
      <dc:date>2019-03-12T05:33:18Z</dc:date>
    </item>
    <item>
      <title>You can force AAA or local</title>
      <link>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635706#M196763</link>
      <description>&lt;P&gt;You can force AAA or local login on the console-&lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes all the contexts must run the same version.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 14:33:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635706#M196763</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-02-25T14:33:51Z</dc:date>
    </item>
    <item>
      <title>but you cannot use AAA</title>
      <link>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635707#M196764</link>
      <description>&lt;P&gt;but you cannot use AAA commands from within the system exec space? only the contexts, so how to you secure console access to system&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 14:35:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635707#M196764</guid>
      <dc:creator>Lewis Quin</dc:creator>
      <dc:date>2015-02-25T14:35:47Z</dc:date>
    </item>
    <item>
      <title>The system execution space</title>
      <link>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635708#M196765</link>
      <description>&lt;P&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; line-height: normal;"&gt;The system execution space does not support any AAA commands, but you can configure its own enable password, as well as usernames in the local database to provide individual logins.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 14:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635708#M196765</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-02-25T14:39:25Z</dc:date>
    </item>
    <item>
      <title>okay, so I have found that</title>
      <link>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635709#M196766</link>
      <description>&lt;P&gt;okay, so I have found that you can secure the appliance console access by using AAA from the admin context, however if you do this it uses the local userames stored within admin and not those created in sys exec space.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 14:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635709#M196766</guid>
      <dc:creator>Lewis Quin</dc:creator>
      <dc:date>2015-02-25T14:53:37Z</dc:date>
    </item>
    <item>
      <title>You can create local username</title>
      <link>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635710#M196767</link>
      <description>&lt;P&gt;You can create local username/password in the system execution space as well.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 14:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635710#M196767</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-02-25T14:57:49Z</dc:date>
    </item>
    <item>
      <title>yes you can but the problem</title>
      <link>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635711#M196768</link>
      <description>&lt;P&gt;yes you can but the problem is this:&lt;/P&gt;&lt;P&gt;To require a username and password for the serial interface (console) of the ASA you have to issue the 'aaa authentication serial console LOCAL' command in the admin context (as it doesnt not exist in the sys exec space), and if you do this the serial connection looks to the admin context local user database to authenticate the serial connections (and not the system exec user database.)&lt;/P&gt;&lt;P&gt;so while you are correct in that you can create local users in the system exec space, they are not&amp;nbsp;used to authenticate the local console connection, as it appears to use the admin context local user database.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 15:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-console-in-multicontext-mode-asa/m-p/2635711#M196768</guid>
      <dc:creator>Lewis Quin</dc:creator>
      <dc:date>2015-02-25T15:06:09Z</dc:date>
    </item>
  </channel>
</rss>

