You are using ASDM to verify a clientless SSL VPN configuration made by a junior administrator on an ASA. Please click exhibit to answer the following questions.
Which of the following user accounts will be able to connect to the ASA by using ASDM? (Select the best answer.)
- only john
- only boson
- only jane
- both john and jane
- both jane and boson
- john, jane, and boson
Both the jane and the boson user accounts will be able to connect to the Cisco Adaptive Security Appliance (ASA) by using Cisco Adaptive Security Device Manager (ASDM). When you add a user to the local Authentication, Authorization, and Accounting (AAA) database on an ASA, you can specify security parameters for the user. One security option you can specify is whether the user can establish a management connection to the ASA. This option is configured in the Add or Edit User Account dialog box in ASDM. Under Access Restriction, you can select Full Access (ASDM, SSH, Telnet and Console), CLI login prompt for SSH, Telnet and console (no ASDM access), or No ASDM, SSH, Telnet or Console access. The Full Access (ASDM, SSH, Telnet and Console) option will let the user use ASDM or the command line interface (CLI) to administer the ASA. In this scenario, this option is selected for both the jane and the boson user accounts, as shown in the following exhibits:
You can access the Add or Edit User Account dialog box in ASDM by clicking Configuration, clicking the Remote Access VPN button, expanding AAA/Local Users, and clicking Local Users. To open the Edit User Account dialog box, you should double click the user account that you want to open.
The john user account is configured with the No ASDM, SSH, Telnet or Console access option. This option will prevent the user from establishing a management connection to the device by using ASDM, SSH, Telnet, or the console.