<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA privilege levels/views in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570950#M603928</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sachin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate your effort in this post, most informative however it doesnt address my question. Ie. Does the ASA support views/roles, as IOS does?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Sep 2010 23:11:07 GMT</pubDate>
    <dc:creator>Scott Cannon</dc:creator>
    <dc:date>2010-09-09T23:11:07Z</dc:date>
    <item>
      <title>ASA privilege levels/views</title>
      <link>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570947#M603925</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone tell me if the ASA supports views in the same manner IOS does? If so, can you tell me what version this functionlaity was made available in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570947#M603925</guid>
      <dc:creator>Scott Cannon</dc:creator>
      <dc:date>2019-03-11T18:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA privilege levels/views</title>
      <link>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570948#M603926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you enable command authorization, then only you have the option of manually assigning privilege levels to individual commands or groups of commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;To configure privilege access levels on cisco asa commands there are 4 steps involved in this&amp;nbsp; as follows:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;1. Enable command authorization ( LOCAL in this case means , keep the command authorization configuration on the firewall ) :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authorization command LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. You can define commands you want to use on a certain level, for example these commands will enable a user in privilege level 5 to view and clear crypto tunnels&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;privilege show level 5 command crypto&lt;BR /&gt;privilege clear level 5 command crypto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Create a user and assign the privilege level to her/him :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username userName password userPass privilege 5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Create an enable password for the new privilege level :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;enable password enablePass level 5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when the user logs in she/he can type :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;enable 5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enter the password from step for and they will be able to run the above crypto commands.&lt;/P&gt;&lt;P&gt;---&lt;BR /&gt;To add a user to the security appliance database, enter the username command in global configuration mode. To remove a user, use the no version of this command with the username you want to remove. To remove all usernames, use the no version of this command without appending a username.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username name {nopassword | password password [mschap | encrypted | nt-encrypted]} [privilege priv_level]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This privilege level is used with command authorization.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no username name&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;In general you can use this version of username command as well for simple config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username &lt;NAME&gt; password &lt;PASSWORD&gt; privilege &lt;LEVEL&gt;&lt;/LEVEL&gt;&lt;/PASSWORD&gt;&lt;/NAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;e.i.&amp;nbsp; (lever 15 allows full EXEC mode access - as well as all ASDM features)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;username sachingarg password &lt;/STRONG&gt;&lt;A href="https://community.cisco.com/"&gt;&lt;STRONG&gt;HC!@%$&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;#@! privilege 15&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;The default privilege level is 2.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please remember as I have said above that access levels (1-15) aren't relevant much unless you authorize command authorization:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;aaa authorization command LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Viewing Command Privilege Levels&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The following commands let you view privilege levels for commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•To show all commands, enter the following command:&lt;/P&gt;&lt;P&gt;hostname(config)# &lt;STRONG&gt;show running-config all privilege all&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;•To show commands for a specific level, enter the following command:&lt;/P&gt;&lt;P&gt;hostname(config)# &lt;STRONG&gt;show running-config privilege level level&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The level is an integer between 0 and 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•To show the level of a specific command, enter the following command:&lt;/P&gt;&lt;P&gt;hostname(config)# &lt;STRONG&gt;show running-config privilege command command&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;For example, for the show running-config all privilege all command, the system displays the current assignment of each CLI command to a privilege level. The following is sample output from the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname(config)# &lt;STRONG&gt;show running-config all privilege all&lt;BR /&gt;&lt;/STRONG&gt;privilege show level 15 command aaa&lt;BR /&gt;privilege clear level 15 command aaa&lt;BR /&gt;privilege configure level 15 command aaa&lt;BR /&gt;privilege show level 15 command aaa-server&lt;BR /&gt;privilege clear level 15 command aaa-server&lt;BR /&gt;privilege configure level 15 command aaa-server&lt;BR /&gt;privilege show level 15 command access-group&lt;BR /&gt;privilege clear level 15 command access-group&lt;BR /&gt;privilege configure level 15 command access-group&lt;BR /&gt;privilege show level 15 command access-list&lt;BR /&gt;privilege clear level 15 command access-list&lt;BR /&gt;privilege configure level 15 command access-list&lt;BR /&gt;privilege show level 15 command activation-key&lt;BR /&gt;privilege configure level 15 command activation-key&lt;BR /&gt;....&lt;BR /&gt;The following command displays the command assignments for privilege level 10:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname(config)# &lt;STRONG&gt;show running-config privilege level 10&lt;/STRONG&gt;&lt;BR /&gt;privilege show level 10 command aaa&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The following command displays the command assignment for the access-list command:&lt;/P&gt;&lt;P&gt;hostname(config)# &lt;STRONG&gt;show running-config privilege command access-list&lt;BR /&gt;&lt;/STRONG&gt;privilege show level 15 command access-list&lt;BR /&gt;privilege clear level 15 command access-list&lt;BR /&gt;privilege configure level 15 command access-list&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa5520# &lt;STRONG&gt;show run all username&lt;/STRONG&gt;&lt;BR /&gt;ciscoasa5520# &lt;STRONG&gt;show run all privilege | grep pwd&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;Kindly find some useful references in this regard as follows:&lt;BR /&gt;username&amp;nbsp; cli syntax&lt;BR /&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/uz.html#wp1568449"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/uz.html#wp1568449&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Additional reference for aaa authorization command &lt;BR /&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/a1.html#wp1537175"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/a1.html#wp1537175&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For ASDM:&lt;BR /&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/asdm52/user/guide/devaccss.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/asdm52/user/guide/devaccss.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Managing System Access (best for beginners)&lt;BR /&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mgaccess.html#wp1042040"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mgaccess.html#wp1042040&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure privilege levels on the ASA through the AAA configuration.&amp;nbsp; Take a look at: &lt;BR /&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/asdm52/user/guide/devaccss.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/asdm52/user/guide/devaccss.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Master Collection of&amp;nbsp; Cisco ASA Config&amp;nbsp; Examples links kindly refer the following URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="heading"&gt;And seek more examples in the secion for Authentication, Authorization and Accounting (AAA) :&lt;/DIV&gt;&lt;DIV class="heading"&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/prod_configuration_examples_list.html"&gt;http://www.cisco.com/en/US/products/ps6120/prod_configuration_examples_list.html&lt;/A&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please keep in touch for any further query in this regard. Please rate if you find the above mentioned information of any use to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sachin Garg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: sachinga.hcl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Sep 2010 11:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570948#M603926</guid>
      <dc:creator>sachinga.hcl</dc:creator>
      <dc:date>2010-09-09T11:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA privilege levels/views</title>
      <link>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570949#M603927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No is the simple answer to your Q, the ASA does NOT support views.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although if you want to restrict access to the device then you can use AAA, see the post above for details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Sep 2010 21:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570949#M603927</guid>
      <dc:creator>golly_wog</dc:creator>
      <dc:date>2010-09-09T21:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA privilege levels/views</title>
      <link>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570950#M603928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sachin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate your effort in this post, most informative however it doesnt address my question. Ie. Does the ASA support views/roles, as IOS does?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Sep 2010 23:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570950#M603928</guid>
      <dc:creator>Scott Cannon</dc:creator>
      <dc:date>2010-09-09T23:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA privilege levels/views</title>
      <link>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570951#M603929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Golly, not the answer I wanted to hear but appreciated all the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Sep 2010 23:12:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/1570951#M603929</guid>
      <dc:creator>Scott Cannon</dc:creator>
      <dc:date>2010-09-09T23:12:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA privilege levels/views</title>
      <link>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/3214619#M603930</link>
      <description>&lt;P&gt;Thank you for not only answering the question, but providing the equivalent to IOS VIEWS in ASA using the PRIVILEGE command.&amp;nbsp; Very thorough.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2017 15:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-privilege-levels-views/m-p/3214619#M603930</guid>
      <dc:creator>bcoverstone</dc:creator>
      <dc:date>2017-11-10T15:51:46Z</dc:date>
    </item>
  </channel>
</rss>

