<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FWSM on a 6500 - read only user addition in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642058#M559383</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks heaps Paul, really appreciate your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 21 Mar 2011 23:21:17 GMT</pubDate>
    <dc:creator>warren rautenbach</dc:creator>
    <dc:date>2011-03-21T23:21:17Z</dc:date>
    <item>
      <title>FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642052#M559374</link>
      <description>&lt;P&gt;Hey Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a customer that has a FWSM on a 6500, I want to create a read only account for them, i believe user privelage of lvl_3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I log into the firewall it prompts me for a password straight away.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way that i can create a login that when it prompts me for a password, I can have a password setup to put into that prompt to get a certain level of access, instead of the standard lvl_15 access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any assistance will be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waz&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642052#M559374</guid>
      <dc:creator>warren rautenbach</dc:creator>
      <dc:date>2019-03-11T20:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642053#M559375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not sure if I got right your question. If you want to create a user with privilege level 3 you can add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username user3 privilege 3 password pass3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 23:02:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642053#M559375</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-21T23:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642054#M559377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the reply mate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yea tried that, but i still have to use the standard password to get into the device, the new password i created didnt work....didnt get the oppertunity to use the u/n then p/w&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres what i found out:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; once i put in the initial password to get the the firewall&amp;gt; prompt i was able to type in "login"&lt;/P&gt;&lt;P&gt;-&amp;gt; then i was able to put in u/n and p/w&lt;/P&gt;&lt;P&gt;-&amp;gt; but even then the access was of level 15, i was able to change and save config&lt;/P&gt;&lt;P&gt;-&amp;gt; so i need to be able to configure a password that i can enter initially to get to the firewall&amp;gt; prompt then pump in an enable password as well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hmm how can i describe this a tad better...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* i telnet to the device&lt;/P&gt;&lt;P&gt;* Password:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; this prompt is provided (need to configure another password for this stage)&lt;/P&gt;&lt;P&gt;* firewall&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if i get a new password that gets me to this stage ill need to configure another enable password&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to configure TWO enable passwords??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 23:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642054#M559377</guid>
      <dc:creator>warren rautenbach</dc:creator>
      <dc:date>2011-03-21T23:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642055#M559378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can create an enable secret for a specified level:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable secret level &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't tested it today but that should allow you to access only for your desidere level&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 23:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642055#M559378</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-21T23:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642056#M559380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry, I was telling you the commands for IOS not for the FW, give me a second to test this out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 23:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642056#M559380</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-21T23:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642057#M559382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think just creating a username and password for privilege 3 is not enough.&lt;/P&gt;&lt;P&gt;You would also need to define what commands are allowed in privilege 3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To confirm that the privilege level is working, you can run "show curpriv" command.&lt;/P&gt;&lt;P&gt;If it shows that the privilege is 3, means that its working correctly. Now you just need to map commands to the privilege level.By default all commands are either privilege&amp;nbsp; 0 or 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is an ASA configuration guide for mapping commands to privilege levels. I think it should be the same on FWSM as well.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_management.html#wp1145888"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/access_management.html#wp1145888&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 23:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642057#M559382</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-03-21T23:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642058#M559383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks heaps Paul, really appreciate your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 23:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642058#M559383</guid>
      <dc:creator>warren rautenbach</dc:creator>
      <dc:date>2011-03-21T23:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642059#M559384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you are correct, the user can authenticate on any privilege level and still be able to change the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how you can create a user and assign a specific level:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; username test password test privilege 3&lt;/P&gt;&lt;P&gt; aaa authentication enable console LOCAL&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;aaa authentication ssh console LOCAL&amp;nbsp; &lt;/DIV&gt;&lt;DIV&gt;aaa authentication enable console LOCAL&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;With those commands I get authenticated on the same priv level when doing SSH and when entering the enable password.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Here are the logs:&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = test&lt;/P&gt;&lt;P&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = test&lt;/P&gt;&lt;P&gt;%ASA-6-611101: User authentication succeeded: Uname: test&lt;/P&gt;&lt;P&gt;%ASA-6-611101: User authentication succeeded: Uname: test&lt;/P&gt;&lt;P&gt;%ASA-6-605005: Login permitted from 172.16.130.101/58750 to inside:172.16.129.210/ssh for user "test"&lt;/P&gt;&lt;P&gt;%ASA-6-113015: AAA user authentication Rejected : reason = Invalid password : local database : user = test&lt;/P&gt;&lt;P&gt;%ASA-6-611102: User authentication failed: Uname: test&lt;/P&gt;&lt;P&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = test&lt;/P&gt;&lt;P&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = test&lt;/P&gt;&lt;P&gt;%ASA-6-611101: User authentication succeeded: Uname: test&lt;/P&gt;&lt;P&gt;%ASA-5-502103: User priv level changed: Uname: test From: 1 To: 3&lt;/P&gt;&lt;P&gt;%ASA-5-111008: User 'test' executed the 'enable' command.&lt;/P&gt;&lt;P&gt;%ASA-7-111009: User 'test' executed cmd: show uauth&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;You can still make changes on the config so you will need to change the priv level for some commands so that they can be executed by that priv level.&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 23:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642059#M559384</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-21T23:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642060#M559385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sick, thanks Paul.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ill try that out right now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ill let you know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again mate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 23:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642060#M559385</guid>
      <dc:creator>warren rautenbach</dc:creator>
      <dc:date>2011-03-21T23:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM on a 6500 - read only user addition</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642061#M559387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know you are on the FWSM on a 6500. With an ASA using ASDM, you can have ASDM provide all of those privileged commands for you under Configuration&amp;gt;Device Management&amp;gt;Users/AAA-&amp;gt;AAA Access&amp;gt;Authorization&amp;gt;Set ASDM Defined User Roles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The commands should be the same. Here is what it generates which amounts to read-only access to the ASA. Create the user as level 5 then:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command perfmon&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command ping&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command who&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command failover&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command packet-tracer&lt;/P&gt;&lt;P&gt;privilege show level 5 mode exec command import&lt;/P&gt;&lt;P&gt;privilege show level 5 mode exec command running-config&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command reload&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command mode&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command firewall&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command asp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command cpu&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command interface&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command clock&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command access-list&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vlan&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ip&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ipv6&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command failover&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command asdm&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command arp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command route&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ospf&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command aaa-server&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command aaa&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command eigrp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command crypto&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ssh&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpnclient&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpn&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dhcpd&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command blocks&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command wccp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dynamic-filter&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command webvpn&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command module&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command uauth&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command compression&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command interface&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command clock&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command access-list&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command logging&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command ip&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command failover&lt;/P&gt;&lt;P&gt;privilege show level 5 mode configure command asdm&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command arp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command route&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command aaa-server&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command aaa&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command crypto&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command ssh&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command dhcpd&lt;/P&gt;&lt;P&gt;privilege show level 5 mode configure command privilege&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command arp&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command aaa-server&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command crypto&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command dynamic-filter&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode configure command failover&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command logging&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command arp&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command crypto&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command aaa-server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Mar 2011 00:45:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-on-a-6500-read-only-user-addition/m-p/1642061#M559387</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-03-22T00:45:05Z</dc:date>
    </item>
  </channel>
</rss>

