EasyManuals Logo

Cisco ASA Series User Manual

Cisco ASA Series
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #874 background imageLoading...
Page #874 background image
1-28
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring AAA Servers and the Local Database
Configuring AAA
Examples
The following example assigns a privilege level of 15 to the admin user account:
hostname(config)# username admin password password privilege 15
The following example creates a user account with no password:
hostname(config)# username user34 nopassword
The following example enables management authorization, creates a user account with a password,
enters username attributes configuration mode, and specifies the service-type attribute:
hostname(config)# aaa authorization exec authentication-server
hostname(config)# username user1 password gOgeOus
hostname(config)# username user1 attributes
hostname(config-username)# service-type nas-prompt
Step 3
username username attributes
Example:
hostname(config)# username exampleuser1
attributes
(Optional) Configures username attributes. The
username argument is the username that you created in
Step 1.
Step 4
service-type {admin | nas-prompt | remote-access}
Example:
hostname(config-username)# service-type admin
(Optional) Configures the user level if you configured
management authorization in Step 2. The admin
keyword allows full access to any services specified by
the aaa authentication console LOCAL commands.
The admin keyword is the default.
The nas-prompt keyword allows access to the CLI when
you configure the aaa authentication {telnet | ssh |
serial} console LOCAL command, but denies ASDM
configuration access if you configure the aaa
authentication http console LOCAL command.
ASDM monitoring access is allowed. If you enable
authentication with the aaa authentication enable
console LOCAL command, the user cannot access
privileged EXEC mode using the enable command (or
the login command).
The remote-access keyword denies management access.
The user cannot use any services specified by the aaa
authentication console LOCAL commands (excluding
the serial keyword; serial access is allowed).
(Optional) If you are using this username for VPN
authentication, you can configure many VPN attributes
for the user. For more information, see the “Configuring
Attributes for Individual Users” section on page 1-89.
Command Purpose

Table of Contents

Other manuals for Cisco ASA Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA Series and is the answer not in the manual?

Cisco ASA Series Specifications

General IconGeneral
ModelASA 5505
InterfacesVaries by model (Fast Ethernet, Gigabit Ethernet, 10 Gigabit Ethernet, etc.)
High AvailabilityActive/Standby or Active/Active (varies by model)
Power SupplyVaries by model
Form FactorVaries by model
Operating SystemCisco ASA Software
IPsec VPNSupported
SSL VPNSupported
IPS ThroughputVaries by model

Related product manuals