Privilege Access Levels Cisco
Privilege Access Levels Cisco
To configure privilege access levels on cisco asa commands there are 4 steps involved
in this as follows:
1. Enable command authorization ( LOCAL in this case means , keep the command
authorization configuration on the firewall ) :
2. You can define commands you want to use on a certain level, for example these
commands will enable a user in privilege level 5 to view and clear crypto tunnels
enable 5
Enter the password from step for and they will be able to run the above crypto
commands.
---
To add a user to the security appliance database, enter the username command in global
configuration mode. To remove a user, use the no version of this command with the
username you want to remove. To remove all usernames, use the no version of this
command without appending a username.
no username name
----------
In general you can use this version of username command as well for simple config:
username password privilege
e.i. (lever 15 allows full EXEC mode access - as well as all ASDM features)
Please remember as I have said above that access levels (1-15) aren't relevant much
unless you authorize command authorization:
---
The following commands let you view privilege levels for commands.
•To show commands for a specific level, enter the following command:
•To show the level of a specific command, enter the following command:
For example, for the show running-config all privilege all command, the system
displays the current assignment of each CLI command to a privilege level. The
following is sample output from the command.
The following command displays the command assignment for the access-list
command:
-----