1-28
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring AAA Servers and the Local Database
Configuring AAA
Examples
The following example assigns a privilege level of 15 to the admin user account:
hostname(config)#
username admin password password privilege 15
The following example creates a user account with no password:
hostname(config)#
username
user34
nopassword
The following example enables management authorization, creates a user account with a password,
enters username attributes configuration mode, and specifies the
service-type
attribute:
hostname(config)#
aaa authorization exec authentication-server
hostname(config)#
username user1 password gOgeOus
hostname(config)#
username user1 attributes
hostname(config-username)#
service-type nas-prompt
Step 3
username
username
attributes
Example:
hostname(config)# username exampleuser1
attributes
(Optional) Configures username attributes. The
username
argument is the username that you created in
.
Step 4
service-type
{
admin
|
nas-prompt
|
remote-access
}
Example:
hostname(config-username)# service-type admin
(Optional) Configures the user level if you configured
management authorization in
. The
admin
keyword allows full access to any services specified by
the
aaa authentication console LOCAL
commands.
The
admin
keyword is the default.
The
nas-prompt
keyword allows access to the CLI when
you configure the
aaa authentication
{
telnet | ssh |
serial} console
LOCAL
command, but denies ASDM
configuration access if you configure the
aaa
authentication http console
LOCAL
command.
ASDM monitoring access is allowed. If you enable
authentication with the
aaa authentication enable
console
LOCAL
command, the user cannot access
privileged EXEC mode using the
enable
command (or
the
login
command).
The
remote-access
keyword denies management access.
The user cannot use any services specified by the
aaa
authentication console LOCAL
commands (excluding
the
serial
keyword; serial access is allowed).
(Optional) If you are using this username for VPN
authentication, you can configure many VPN attributes
for the user. For more information, see the
Attributes for Individual Users” section on page 1-89
.
Command
Purpose
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......