This configuration configures a tacacs + server for user authentication for console access.
aaa new-model aaa authentication login console group tacacs+ local aaa authentication enable console group tacacs+ enable aaa authorization exec console group tacacs+ local if-authenticated aaa accounting exec console start-stop group tacacs+ aaa session-id common tacacs-server host 10.10.10.1 tacacs-server directed-request tacacs-server key test ip access-list standard VTY-ACCESS remark VTY ACCESS permit 172.24.0.0 0.0.255.255 deny any log line con 0 exec-timeout 5 0 login authentication console
authorization exec console
transport output telnet stopbits 1 line vty 0 4 access-class VTY-ACCESS in exec-timeout 5 0 transport input telnet transport output telnet line vty 5 15 transport input none transport output none
#Please post comments if there are any queries and rate if useful
Wanted to know about VxLAN configuration on Cisco-FTD. Also need information about deep-packet inspecting the VxLAN traffic. Does it require any additional configuration. A configuration document would be helpful.
Thanks in advance!
Hi, I've encountered a strange issue on one of my customers virtual FMC. When deploying configuration to a FTD 2100, there is no deployment or task status showing the progress of the deployment and when it's completed. The configuration is deplo...
Hello.I have some FTD 2110, managed by FMC. I make site2site ipsec (hub and spoke topology).So on spokes I start to connect secondary ISP for failover. How I can make failover site2site? for extranet type of spoke I could set peer IP and backup IP. B...
Hello!I'm using FTD 2110 managed by FMC. So I want working traceroute and made a threat defence policy with decrement ttl option like it described here.Traceroute starts working, but all connections (tcp, udp, icmp) after policy applying now has idle time...