

This can also be achieved using the following CLI command: ciscoasa(config)# aaa-server TACACS+ protocol tacacs+ This can be achieved using the following steps in ASDM:Ĭonfiguration -> Device Management -> Users/AAA -> AAA Server Groups. Click “Add“, and choose the TACACS+ protocol. To configure the Cisco ASA to use TACACS+ AAA, you can use the following steps:

We will discuss three common methods for AAA: TACACS+, RADIUS and LDAP. This simplifies account management processes, and ensures that users’ accounts can easily be disabled across all network devices once they leave the organisation. The use of a central AAA service allows organisations to easily and centrally manage user accounts. This article provides a guide or references other articles for hardening Cisco ASA firewalls and addressing the most common vulnerabilities observed during these firewall reviews.Ĭonfiguring your Cisco ASA to use central AAA (Authentication, Authorisation and Accounting) services ensures that an extra level of protection is in place for user access to the device. A common theme observed during these reviews is that most organisations do not have a firewall hardening procedure and/or do not conduct a regular firewall review which covers user accounts, exposed administrative interfaces, patch management and review of firewall rules. I have conducted numerous firewall review for various types of organisations over the years.
