<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix/Radius and enable mode in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036030#M493558</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you know if there is a plan to support this in any later versions? In my work enviroment shared passwords are not allowed. Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 25 Aug 2008 14:25:13 GMT</pubDate>
    <dc:creator>nobleton3366</dc:creator>
    <dc:date>2008-08-25T14:25:13Z</dc:date>
    <item>
      <title>Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036025#M493549</link>
      <description>&lt;P&gt;Hi all, I am trying to get a pix 6.3 to authenticate telnet users via radius with a Microsoft IAS server.  This works well, but Im trying to get it where when they log in, it just dumps them into enable mode, instead of typing in the enable AD credential again.  Anyone have any insight on how to do this?  Its a IAS configuration thing I know, but not sure what to do with it.  Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 10:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036025#M493549</guid>
      <dc:creator>jjoseph01</dc:creator>
      <dc:date>2020-02-21T10:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036026#M493551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you mean on firewall,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Username: alfa&lt;/P&gt;&lt;P&gt;Password: ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rather then,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Username: alfa&lt;/P&gt;&lt;P&gt;Password: ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall&amp;gt;&lt;/P&gt;&lt;P&gt;pixfirewall&amp;gt;enable&lt;/P&gt;&lt;P&gt;Password: ********&lt;/P&gt;&lt;P&gt;pixfirewall#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The unfortunately, Pix firewall does not have this concept, like IOS devices have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On IOS you can get the user log directly into enable (Privileged exec) mode by passing attribute,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cisco av-pair as shell:priv-lvl=n or on some IOS only using Service Type as Administrative will do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where, n is the privilege level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AND, there has to be an EXEC authorization command on the IOS device, e.g.,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization exec &lt;LIST-NAME&gt; group radius....&lt;/LIST-NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, that is not the case for the Pix firewall, they have a different OS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if it helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Aug 2008 20:34:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036026#M493551</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2008-08-22T20:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036027#M493552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even tough the exec authorization feature in the Cisco PIX/ASA is not 'completely' implemented, it does not mean you cannot do things like command authorization on the PIX/ASA. So let us know what exactly do you want to achieve and maybe we could help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Aug 2008 18:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036027#M493552</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-24T18:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036028#M493554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, thanks.  When I telnet into the device, and successfully log in, Id like it to dump me directly into enable mode.  routername# instead of routername&amp;gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Aug 2008 21:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036028#M493554</guid>
      <dc:creator>jjoseph01</dc:creator>
      <dc:date>2008-08-24T21:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036029#M493556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately, this kind of functionality is not included in the PIX/ASA OS as of now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2008 10:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036029#M493556</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2008-08-25T10:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036030#M493558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you know if there is a plan to support this in any later versions? In my work enviroment shared passwords are not allowed. Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2008 14:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036030#M493558</guid>
      <dc:creator>nobleton3366</dc:creator>
      <dc:date>2008-08-25T14:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036031#M493560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You might want to contact your accounts team for the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If sharing of password is not allowed, then you can enable, enable password authentication on firewall, i.e.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication enable console &lt;AAA-TAG&gt; LOCAL&lt;/AAA-TAG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And on the ACS server, under user's profile, make sure that enable password is selected as the user's account password against the respective database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2008 14:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036031#M493560</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2008-08-25T14:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036032#M493562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks works great thanks. One more question...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On my IOS equipment, I am able to make it check the LOCAL db first then radius rather than radius first. Is there a way to do it this way on the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 12:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036032#M493562</guid>
      <dc:creator>nobleton3366</dc:creator>
      <dc:date>2008-08-26T12:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036033#M493565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the AAA method list functionality is identical on both platforms. The IOS 'local-case' is the 'LOCAL' on ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 12:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036033#M493565</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-26T12:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036034#M493571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think on your IOS this is how you are doing the authentication,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default local group radius...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Local first and then Radius, right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand you situation correctly, then that functionality/behavior is not how ASA/PIX firewall works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you specify LOCAL, then there is no other method available, i.e.,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, you can specify the fallback as LOCAL in the event your Radius/Tacacs server is not available,&lt;/P&gt;&lt;P&gt;aaa authentication telnet console &lt;SERVER-TAG&gt; LOCAL&lt;/SERVER-TAG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if it helps!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 12:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036034#M493571</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2008-08-26T12:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036035#M493577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was afraid of that, but we can make it work. Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 13:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036035#M493577</guid>
      <dc:creator>nobleton3366</dc:creator>
      <dc:date>2008-08-26T13:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Pix/Radius and enable mode</title>
      <link>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036036#M493581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I forgot to rate this, so came back to do so.  Thanks for all your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2008 14:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-radius-and-enable-mode/m-p/1036036#M493581</guid>
      <dc:creator>jjoseph01</dc:creator>
      <dc:date>2008-08-28T14:33:09Z</dc:date>
    </item>
  </channel>
</rss>

