Overview
Creating local user accounts on a Cisco Adaptive Security Appliance (ASA) is an essential task for Network Administrators, and is done to secure their network resources. Local user accounts are useful for managing user access to the ASA and to the resources behind the ASA, through the use of a VPN client, such as Cisco AnyConnect. This document describes how to create local user accounts on the Cisco ASA, using both the command-line interface (CLI) and the Adaptive Security Device Manager (ASDM). This document is intended for those who are managing the subscribed Cisco ASA appliance and want to learn how to create local user accounts. The details in this document are based on a Cisco ASA virtual firewall that runs ASA code version 9.14(3)18 and ASDM version 7.18.(1)152, and was created from these devices in a specific lab environment.The device used in this document started with a cleared (default) configuration.
Getting Started
To begin the steps on how to create additional local user accounts, obtain the existing account information from the IP Plan.Install Options
Updating the Cisco Adaptive Security Appliance (ASA) can be done two different ways: Via Command Line Interface (CLI) Using a CLI allows you to write script changes in a notepad and have those changes reviewed by someone before running them. This method is good for writing scripts. Via Cisco Adaptive Security Device Manager (ASDM) Using an ASDM allows you to make line-by-line changes, while using a graphical user interface (GUI).Via Command Line Interface (CLI)
- Establish a VPN connection to the MacStadium environment.
-
Connect to the Cisco ASA using SSH.
- For more information, see the section Connect to the Cisco ASA using SSH.
- Use the credential documented in the IP Plan to authenticate; when prompted, enter a username and password.
-
Enter global configuration mode by typing the command
configure terminal -
Create the new user account by typing the command in the following format:
username username password password privilege priv_level
- The
usernamekeyword is a string from 3 to 64 characters long. The space and question mark characters cannot be used for usernames. - The
passwordkeyword is a string from 3 to 127 characters long. The space and question mark characters cannot be used within the passwords. - The
privilege priv_levelkeyword sets the privilege level for the created user account. Thepriv_levelis a numeric value ranging from 0 to 15. - By default, a user account has a privilege level of 2.
- A level of 15 grants the user account the highest level of access.
- Example:
ciscoasa(config)# username exampleuser1 password examplepassword privilege 1
- Save the configuration with the command
write memory - Type the exit or end command to return to privileged mode of the ASA.
running-config username
This command displays all the user accounts configured on the ASA.
Testing a Newly Created Account
- In privilege mode, enter the command
disable - Enter the command
login - At the Username prompt, enter the created username.
- At the Password prompt, enter the created password.
no version with the username that is being removed.
Removing a User Account
- Log into the firewall with an account different from the account being removed.
- Enter global configuration mode by typing the command
configure terminal - Enter the
no versionof the username command. - Enter the
exitorend commandto return to privilege mode. - Save the configuration with the command
write memory - Verify the changes made with the command
show running-config username.
Via Cisco Adaptive Security Device Manager (ASDM)
Creating a Local User Account with ASDM- Open the ASDM and connect to the Cisco Adaptive Security Appliance (ASA).
-
Click Configuration.\

-
Click Device Management.\

-
Click Users/AAA.\

- Click Add to create a new user account.
-
In the Add User Account window, confirm that Identity is selected at the left of the window and then enter the username and password for the new user account.
- Specify a Access Restriction by selecting an option in the section below.\

- Specify a Access Restriction by selecting an option in the section below.\
- Click OK to save the new user account
- Click Apply located at the bottom of the ASDM
- Click Save
Test the new account by logging out of the ASDM and then logging back in with the new credentials.
Removing an Account from the Local Database
- Under the User Accounts of the ASDM, select the user account to be removed.
- Click Delete
- Click Apply
- Click Save
For information on Advanced Options for user account creations and management, see the following guides:
Connect to the Cisco ASA using SSH
- Configure aaa to use local database for ssh and console:
aaa = authentication (permitting access), authorization (specify commands when granted access), accounting (keeps track of utilization reports of users after logged in and generates accounting reports for billing). LOCAL = local database.- Create admin username with privilege 15:
priv 15 = top privilege level (full superuser, can give different command access to different privilege levels).- Turn on password for enable:
- Turn on serial console authentication:
- Save changes:
- Log out console and verify access.
ciscoasa(config)# end
ciscoasa# exit
Username: username
Logoff
Password: ********
- Generate ssh key pair:
SSH is an encrypted protocol that uses RSA to generate public and private keys.
4096 = block size, rsa = encryption algorithm. The prompt will show Keypair generation process begin. Please wait… followed by ciscoasa(config)#.- Allow access to the inside interface:
- Force ssh version 2:
- Add a 15-minute timeout to ssh:
- Verify login with ssh through 192.168.1.1 in putty.

