So, here's the aaa setup on this firewall services module; firewall# sho aaa aaa authentication ssh console <tag> aaa authentication enable console <tag> firewall# sho aaa-server aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local aaa-server <tag> protocol tacacs+ aaa-server <tag> (inside) host <ip> <tag> timeout 5 aaa-server <tag> (inside) host <ip> <tag> timeout 5 That setup allows me to use SSH to access the FWSM under normal operations. Normal being that the TACACS servers are up and operation. Well, what about abnormal? Abnormal would be when the TACACS servers are down and under those circumstances it seems I am *NOT* able to loging via SSH. Since there is no username to authenticate and no method to authenticate too other than local - would that mean that if I have disabled all other forms of access - in this case I would be S O L on access until the TACACS servers were available again? There was some speculation that I could use "pix" as the username and then the enable password as the password but that did not with either. I'm just trying to plan for emergencies, bear in mind that in this scenario I can still "telnet" in via the switch that the FWSM is in via the "session" command. I was hoping to lock that down a bit as well though. Let me know what your experience is, The Mikester