

Type help or '?' for a list of available commands.ĪSA5505# show conn all | include Identity ! Defining source addresses that can initiate Telnet Access to the Firewall ! Telnet access is authenticated using the LOCAL Data Base
#RESET CISCO 5505 ASA SSH CONNECT PASSWORD#
Username admin password cisco123 privilege 15 Configuring and Verifying Telnet Access ! Creating a local user The username admin is included in the LOCAL database.Įxample 3-15 also displays a sample Telnet session coming from address 192.168.1.201.(LOCAL is a reserved keyword for ASA and FWSM.) The authentication of users who have permission to Telnet to the firewall is done using the LOCAL database.Further, the packets must arrive through the logical interface called mgmt. Telnet access is accepted only when it is initiated from source addresses on network 192.168.1.0/24.The commands shown in Example 3-15 specify the following: It is highly recommended you replace it with SSH, which provides confidentiality.Īt any rate, Telnet can still be useful for testing purposes mainly during initial setup. Telnet is a classic terminal access protocol that has received much criticism because of its clear text nature. Chapter 14 covers the use of AAA services for centralized control of administrative access. This chapter assumes that the LOCAL user database is employed to authenticate users who start remote management connections to Firewall devices.
