Sorry I wasn't paying attention and did not notice that you are asking about ASA :) Can you post the output of the following command:
show run aaa
You need to have a few commands in place to make this work on the ASA. For instance, the following syntax would authenticate and authorize the user admin to priv level 15. Now keep in mind that the user will have to login with the configured username and password. Then the user would have to type enable and use the same configured password to be authorized and allowed in the exec shell:
username admin password cisco privilege 15
aaa authentication serial console LOCAL
aaa authentication enable console LOCAL
aaa authorization exec LOCAL
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...