The original "remote-access" attribute answer was correct, but that command assumes that you are using AAA for login management of the ASA. Ensure that AAA authentication and authorization are enabled on the ASA (as opposed to just telnet-ing in with the 'password xyz' command).
Access Restriction—This section sets the management access level for a user. You must first enable management authorization using the Perform authorization for exec shell access option on the Configuration > Device Management > Users/AAA > AAA Access > Authorization tab.
So, I first enabled "perform authorization for exec sheel access" under Device Management>AAA Access>Authorization Tab and then I set the user to er to 'No access to ASDM' under User Accounts.
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...