<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That is not correct. You can in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607123#M559067</link>
    <description>&lt;P&gt;That is not correct. You can do the following:&lt;/P&gt;
&lt;P&gt;conf t&lt;/P&gt;
&lt;P&gt;username cisco password cEYEsc00 privilege 15&lt;/P&gt;
&lt;P&gt;aaa authorization exec LOCAL auto-enable&lt;/P&gt;
&lt;P&gt;exit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This will get you into enable mode when you ssh to it.&lt;/P&gt;</description>
    <pubDate>Tue, 23 Aug 2016 19:08:25 GMT</pubDate>
    <dc:creator>oschaul2</dc:creator>
    <dc:date>2016-08-23T19:08:25Z</dc:date>
    <item>
      <title>SSH to ASA 5500 into privileged exec mode without "enable"</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607120#M559064</link>
      <description>&lt;P&gt;Is there a way to configure a ASA 5500 firewall so that when i access the firewall via SSH, my user is in privileged exec mode immediately after i have entered the login credentials? So no need to enter "enable" anymore. I know how to do that with a router but couldn't figure it out for the ASA. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; best regards&lt;/P&gt;&lt;P&gt;Frank.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:13:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607120#M559064</guid>
      <dc:creator>Frank Anstoetz</dc:creator>
      <dc:date>2019-03-11T20:13:33Z</dc:date>
    </item>
    <item>
      <title>Re: SSH to ASA 5500 into privileged exec mode without "enable"</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607121#M559065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Being a security device, this feature is not available on ASA/PIX. Unlike in IOS, using AAA we cannot go directly to privileged exec mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Mar 2011 13:08:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607121#M559065</guid>
      <dc:creator>padatta</dc:creator>
      <dc:date>2011-03-28T13:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSH to ASA 5500 into privileged exec mode without "enable"</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607122#M559066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the info, paps!&lt;/P&gt;&lt;P&gt;Cheers F.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Mar 2011 13:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607122#M559066</guid>
      <dc:creator>Frank Anstoetz</dc:creator>
      <dc:date>2011-03-28T13:29:40Z</dc:date>
    </item>
    <item>
      <title>That is not correct. You can</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607123#M559067</link>
      <description>&lt;P&gt;That is not correct. You can do the following:&lt;/P&gt;
&lt;P&gt;conf t&lt;/P&gt;
&lt;P&gt;username cisco password cEYEsc00 privilege 15&lt;/P&gt;
&lt;P&gt;aaa authorization exec LOCAL auto-enable&lt;/P&gt;
&lt;P&gt;exit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This will get you into enable mode when you ssh to it.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 19:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607123#M559067</guid>
      <dc:creator>oschaul2</dc:creator>
      <dc:date>2016-08-23T19:08:25Z</dc:date>
    </item>
    <item>
      <title>Thanks, you are right.</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607124#M559068</link>
      <description>&lt;P&gt;Thanks, you are right.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On the other hand, I am looking how to chance the default port 22 to a different value on an ASA. I always do it on IOS, but I couldn't find it for ASA so far.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2017 10:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-asa-5500-into-privileged-exec-mode-without-quot-enable/m-p/1607124#M559068</guid>
      <dc:creator>Gerardo Marciales</dc:creator>
      <dc:date>2017-06-18T10:55:21Z</dc:date>
    </item>
  </channel>
</rss>

