40-33
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter 40 Configuring Management Access
Feature History for Management Access
Increased SSH security; the SSH default
username is no longer supported.
8.4(2) Starting in 8.4(2), you can no longer connect to the ASA
using SSH with the pix or asa username and the login
password. To use SSH, you must configure AAA
authentication using the aaa authentication ssh console
LOCAL command (CLI) or Configuration > Device
Management > Users/AAA > AAA Access >
Authentication (ASDM); then define a local user by
entering the username command (CLI) or choosing
Configuration > Device Management > Users/AAA > User
Accounts (ASDM). If you want to use a AAA server for
authentication instead of the local database, we recommend
also configuring local authentication as a backup method.
Common Criteria certification and FIPS support
for maximum number of management sessions
allowed and Diffie-Hellman Key Exchange
Group 14 support for SSH.
8.4(4.1) The maximum number of simultaneous ASDM, SSH, and
Telnet sessions allowed was added. Support for
Diffie-Hellman Key Exchange Group 14 for SSH was
added.
We introduced or modified the following screens:
Configuration > Device Management > Management
Access > Management Session Quota
Configuration > Device Management > Management
Access > ASDM/HTTPS/Telnet/SSH.
Table 40-3 Feature History for Management Access (continued)
Feature Name
Platform
Releases Feature Information