ASA local command authorization - permitting all show commands
Using an ASA 8.2(3) I'm trying to use local command authorization to restrict users in a multiple context, multi-tenant firewall from executing commands which could negatively impact other contexts. Ideally I will not use radius/tacacs for this. I want context administrators to use ASDM and SSH. For the ASDM to function correctly it looks like it needs to be able to execute lots of different 'show' commands. I also want to give context administrators sufficient commands to be able to carry out common administrative functions.
So my first shot at config looks like this:
username test password test privilege 5 aaa authorization command LOCAL aaa authorization exec LOCAL
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...