<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5520 username password invalid,what is the reason? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060853#M396106</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have the following configured:&lt;/P&gt;&lt;P&gt;aaa local authentication attempts max-fail 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which will only allows 3 fails attempt, and it won't allow you to connect anymore after 3 fails attempt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To check if your username is locked out, you can issue:&lt;/P&gt;&lt;P&gt;show aaa local user&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the user is locked out, you can clear it by using:&lt;/P&gt;&lt;P&gt;clear aaa local user lockout username ciscocc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 Nov 2012 09:23:58 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-11-05T09:23:58Z</dc:date>
    <item>
      <title>ASA5520 username password invalid,what is the reason?</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060849#M396097</link>
      <description>&lt;P align="left" style="text-align: left;"&gt;Two 5520 firewall configuration of the failover and SSH, the first remote landing SSH, can use user and password successful landing, again landing, to prompt the user name password is invalid, what is the reason?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:18:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060849#M396097</guid>
      <dc:creator>CSCO11685325</dc:creator>
      <dc:date>2019-03-12T00:18:52Z</dc:date>
    </item>
    <item>
      <title>ASA5520 username password invalid,what is the reason?</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060850#M396101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you saying that when you try to SSH, the first time you can successfully login, however, when you try to access the same ASA the second time, it doesn't?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which interface are you trying to SSH on?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you pls share your configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 13:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060850#M396101</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-04T13:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 username password invalid,what is the reason?</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060851#M396102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Password must be true, because just used, interval minute again remote landing, SSH authentication password is invalid, access through HTTPS ASDM, also prompts the user password error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;DIV&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FIREWALL&lt;/P&gt;&lt;P&gt;domain-name cife.com&lt;/P&gt;&lt;P&gt;enable password ciscocc&lt;/P&gt;&lt;P&gt;passwd ciscocc&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 1.1.1.1 255.255.255.240 standby 1.1.1.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.1.1.5 255.255.255.248 standby 10.1.1.6&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name cife.com&lt;/P&gt;&lt;P&gt;access-list 115 extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface failoverint GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;failover replication http&lt;/P&gt;&lt;P&gt;failover link failoverint GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;failover interface ip failoverint 192.168.10.1 255.255.255.0 standby 192.168.10.2&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group&amp;nbsp; 115 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa local authentication attempts max-fail 3&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;ssh version 1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username ciscocc password ciscocc&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Cryptochecksum:62171bdb273626844a351aecee7e4ed7&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 15:43:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060851#M396102</guid>
      <dc:creator>CSCO11685325</dc:creator>
      <dc:date>2012-11-04T15:43:27Z</dc:date>
    </item>
    <item>
      <title>ASA5520 username password invalid,what is the reason?</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060852#M396104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am surprised to see the output above with plain text passwords. I would expect the output of "show run" to include encrypted (hashed) values for passwords. How did you generate the output - using "more:system running-config"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 16:49:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060852#M396104</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-11-04T16:49:04Z</dc:date>
    </item>
    <item>
      <title>ASA5520 username password invalid,what is the reason?</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060853#M396106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have the following configured:&lt;/P&gt;&lt;P&gt;aaa local authentication attempts max-fail 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which will only allows 3 fails attempt, and it won't allow you to connect anymore after 3 fails attempt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To check if your username is locked out, you can issue:&lt;/P&gt;&lt;P&gt;show aaa local user&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the user is locked out, you can clear it by using:&lt;/P&gt;&lt;P&gt;clear aaa local user lockout username ciscocc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2012 09:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-username-password-invalid-what-is-the-reason/m-p/2060853#M396106</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-05T09:23:58Z</dc:date>
    </item>
  </channel>
</rss>

