<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Failover exec and command authorization in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/failover-exec-and-command-authorization/m-p/1182254#M877788</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply, but you didn't really address the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Jan 2009 14:34:09 GMT</pubDate>
    <dc:creator>diogo</dc:creator>
    <dc:date>2009-01-20T14:34:09Z</dc:date>
    <item>
      <title>Failover exec and command authorization</title>
      <link>https://community.cisco.com/t5/network-security/failover-exec-and-command-authorization/m-p/1182252#M877785</link>
      <description>&lt;P&gt;Hi, got into a dead end here. I have a pair of ASA firewalls running as active/standby. I'd like to use the 'failover exec' to issue commands on the standby firewall via the active one. This shouldn't be a problem, but we have AAA command authorization configured. And when the active ASA tries to issue a command on the stadby ASA, it gets a 'authorization denied' message. At the ACS we see the auth request being denied, the ASA sends the request using the 'enable_1' user, instead of using the same user connected to the active ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any clues on how to go around this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:35:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failover-exec-and-command-authorization/m-p/1182252#M877785</guid>
      <dc:creator>diogo</dc:creator>
      <dc:date>2019-03-11T14:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: Failover exec and command authorization</title>
      <link>https://community.cisco.com/t5/network-security/failover-exec-and-command-authorization/m-p/1182253#M877787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remote command execution lets you send commands entered at the command line to a specific failover peer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because configuration commands are replicated from the active unit or context to the standby unit or context, you can use the failover exec command to enter configuration commands on the correct unit, no matter which unit you are logged-in to. For example, if you are logged-in to the standby unit, you can use the failover exec active command to send configuration changes to the active unit. Those changes are then replicated to the standby unit. Do not use the failover exec command to send configuration commands to the standby unit or context; those configuration changes are not replicated to the active unit and the two configurations will no longer be synchronized. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To send a command to a failover peer, perform the steps given in the below URL:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/failover.html#wp1154924" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/failover.html#wp1154924&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below URL helps you in configuring the Active/standby failover:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/failover.html#wp1058096" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/failover.html#wp1058096&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jan 2009 14:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failover-exec-and-command-authorization/m-p/1182253#M877787</guid>
      <dc:creator>smalkeric</dc:creator>
      <dc:date>2009-01-20T14:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: Failover exec and command authorization</title>
      <link>https://community.cisco.com/t5/network-security/failover-exec-and-command-authorization/m-p/1182254#M877788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply, but you didn't really address the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jan 2009 14:34:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failover-exec-and-command-authorization/m-p/1182254#M877788</guid>
      <dc:creator>diogo</dc:creator>
      <dc:date>2009-01-20T14:34:09Z</dc:date>
    </item>
    <item>
      <title>Failover exec and command authorization</title>
      <link>https://community.cisco.com/t5/network-security/failover-exec-and-command-authorization/m-p/1182255#M877789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most probably you are being affected by this bug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCti22636"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCti22636&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently Standby ASA uses "enable_1"&amp;nbsp; username for authorization requests when "failover exec standby" command&amp;nbsp; is run on the Active ASA in failover pair. This leads to authorization&amp;nbsp; failures on TACACS+ server unless the "enable_1" user is created there&amp;nbsp; and privilege 15 is granted to this user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;&lt;STRONG&gt;Conditions&lt;/STRONG&gt;:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a limitation of all software releases where the "failover exec standby" feature is implemented.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workaround is:&lt;/P&gt;&lt;P&gt;- create a user account "enable_1" on TACACS+ server with any random password;&lt;/P&gt;&lt;P&gt;- grant "privilege = 15" and full access on all commands to this user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Feb 2012 08:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/failover-exec-and-command-authorization/m-p/1182255#M877789</guid>
      <dc:creator>Elie Bassil</dc:creator>
      <dc:date>2012-02-07T08:24:53Z</dc:date>
    </item>
  </channel>
</rss>

