![]() Thinking that I might also need to set service-type, I set service-type admin on the user in question. See the screenshot on the highlighted portion. Exclude the ssh-rsa and the usernamehostname, only get the key and copy and paste to the cisco asa. Prerequisites Requirements There are no specific requirements for this document. Thesecurity appliance allows a maximum of five concurrent SSH connections for each securitycontext, if available, and a global maximum of 100 connections for all of the contexts combined. Then I get the contents of ciscoidrsa.pub. The ASAallows SSH connections to the security appliance for management purposes. Per the cisco docs, if you specify auto-enable on the aaa authorization exec LOCAL line, it should automatically put an inbound localdb user in enable mode. ssh-keygen -t rsa -b 2048 I rename this asymmetric keys as ciscoidrsa. I am enable to ssh to the asa with the public key and get directly to a non-enabled prompt, but I want that prompt to enter in enabled mode so that I can use the account for automation without storing passwords in a script. I am trying to allow an ssh session to auto-enable on my ASA.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |