11-04-2009 12:02 PM - edited 03-11-2019 09:36 AM
Hi,
Here's my aaa config:
aaa-server RADIUS1 protocol radius
aaa-server RADIUS1 host 172.30.10.24
key SuperSecretKey
aaa authentication ssh console LOCAL
aaa authentication enable console LOCAL
aaa authorization command LOCAL
http server enable
Whenever I try to add the radius server to ssh console it fails:
asa1(config)# aaa authentication ssh console RADIUS1 LOCAL
Range already exists.
Any hints?
Thanks!
Jeff
11-04-2009 11:30 PM
First remove the existing config:
no aaa authentication ssh console LOCAL
Then apply the new config:
aaa authentication ssh console RADIUS1 LOCAL
11-05-2009 06:04 AM
If I do this, will it mean that anyone who can be authenticated on the radius server can log into the firewall?
11-05-2009 06:15 AM
Yes.
Depending on what Radius server it is, you may or may not be able to configure it to accept/reject the authentication based on some parameters like the ip address of the radius client.
But as far as the ASA is concerned, if the Radius server says it's ok, it lets the user in.
I assumed that that is what you wanted, since you were trying to implement this command?
11-05-2009 07:24 AM
I think what I was trying to do was use my radius box like a tacacs box. It doesn't seem like that would work. I'm using Windows 2003 IAS as a radius server to authenticate vpn clients, and don't want anyone who can vpn in login to the firewall. May have to look into setting up a tacas box.
Thanks for your help!
11-05-2009 10:25 AM
You could pass back the IETF service-type attribute on the radius server. You can then use this to restrict the access for these users.
Here is what is required for the
radius delivered service-type attribute to be enforced for CLI access:
"aaa authorization exec authentication-server" must be enabled
"aaa authentication enable console
IETF RADIUS Service-Type attribute must be returned in the
access-accept packet.
Also note, make sure you are using a version of code with the fix for CSCsk89452
If you are using local authentication instead of radius this can also be done with the following commands:
username
service-type <(admin,nas-prompt,remote-access)>
-heather
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide