asa01(config)# username vpnuser password p@ssw0rd privilege 0
asa01(config)# username vpnuser attributes
asa01(config-username)# service-type remote-access
asa01(config-username)# exit
asa01(config)#
You might think that specifying privilege 0 and service-type remote access as shown above would be enough to prevent this user from logging in through SSH. However, this may not be the case. Let's look at the following example:asa01# sh run user vpnuser
username vpnuser password jpCK6VfivhvBp0Pn encrypted privilege 0
username vpnuser attributes
service-type remote-access
asa01# sh run aaa
aaa authentication ssh console LOCAL
aaa authorization exec LOCAL
asa01#
With this configuration, it is still possible for "vpnuser" to log in through SSH:vpnuser@asa01's password:
login as: vpnuser
vpnuser@asa01's password:
Type help or '?' for a list of available commands.
asa01>
This is possible because the above configuration only specifies AAA authentication, not authorization. Therefore the local user account's password is checked against the local database, but no check is performed to determine whether or not this local user is authorized for EXEC shell access. This behavior can be changed by enabling management authorization with the following command:asa01(config)# aaa authorization exec LOCAL
asa01(config)#
Now if we attempt to log in with this same account, the login will fail:login as: vpnuser
vpnuser@asa01's password:
Access denied
vpnuser@asa01's password:
The ASA configuration guide goes into more detail about this feature here:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/admin_management.html#86134