40-23
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter40 Configuring Management Access
Configuring AAA for System Administrators
The ASDM Defined User Roles Setup dialog box shows the commands and their levels. Click Yes
to use the predefined user account privileges: Admin (privilege level 15, with full access to all CLI
commands; Read Only (privilege level 5, with read-only access); and Monitor Only (privilege level
3, with access to the Monitoring section only).
To manually configure command levels, click Configure Command Privileges.
The Command Privileges Setup dialog box appears. You can view all commands by choosing --All
Modes-- from the Command Mode drop-down list, or you can choose a configuration mode to view
the commands available in that mode. For example, if you choose context, you can view all
commands available in context configuration mode. If a command can be entered in user EXEC or
privileged EXEC mode as well as configuration mode, and the command performs different actions
in each mode, you can set the privilege level for these modes separately.
The Variant column displays show, clear, or cmd. You can set the privilege only for the show, clear,
or configure form of the command. The configure form of the command is typically the form that
causes a configuration change, either as the unmodified command (without the show or clear prefix)
or as the no form.
To change the level of a command, double-click it or click Edit. You can set the level between 0 and
15. You can only configure the privilege level of the main command. For example, you can configure
the level of all aaa commands, but not the level of the aaaauthentication command and the
aaa authorization command separately.
To change the level of all commands that appear, click Select All and then Edit.
Click OK to accept your changes.
Step4 To support administrative user privilege levels from RADIUS, check the Perform authorization for
exec shell access > Enable check box.
Without this option, the ASA only supports privilege levels for local database users and defaults all other
types of users to level 15.
This option also enables management authorization for local, RADIUS, LDAP (mapped), and TACACS+
users. See the “Limiting User CLI and ASDM Access with Management Authorization” section on
page 40-21 for more information.
Step5 Click Apply.
The authorization settings are assigned, and the changes are saved to the running configuration.
Viewing Local Command Privilege Levels
The following commands when entered in the Tools > Command Line Interface tool, let you view
privilege levels for commands.
Examples
For the show running-config all privilege all command, the ASA displays the current assignment of
each CLI command to a privilege level. The following is sample output from this command:
Enter the following command in the Tools > Command Line Interface tool:
show running-config all privilege all
privilege show level 15 command aaa
privilege clear level 15 command aaa
privilege configure level 15 command aaa
privilege show level 15 command aaa-server