01-10-2017 06:47 AM - edited 02-21-2020 09:07 PM
AnyConnect service-type remote-access is the recommended access type for remote VPN users. The remote-access variable is suggested to prevent management access to the ASA and seems this is what you would want for your remote users. Assigning the remote user community remote-access service should not allow management access to the ASA; However if you add ssh 0.0.0.0 0.0.0.0 inside (as-well-as creating the crypto keys and the ssh variables) suddenly you provide admin access to the ASA for all remote and local users as-well.
We understand the recommended approach is to use the AnyConnect service-type admin for remote VPN administrators but it seems the service-type remote-access has a hole . ? !
Thanks
Frank
Solved! Go to Solution.
01-10-2017 09:53 AM
I assume that you are just missing the command
aaa authorization exec LOCAL
Without that, the service-type is not used to decide if a
01-10-2017 09:53 AM
I assume that you are just missing the command
aaa authorization exec LOCAL
Without that, the service-type is not used to decide if a
01-10-2017 10:23 AM
Hi Karsten,
Ahhh, This is what we have (below); We do not have the exec option.
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authorization command LOCAL
I'l go back and amend the configuration, more soon!!!
Thank you
Frank
01-11-2017 09:17 AM
Hi Karsten,
That did the trick!
Thank you
Frank
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide