The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
kWh
This document describes the instruction steps to reset the password of the admin account on a Firepower system.
The Firepower Management Center (FMC) provide different admin accounts (with separate passwords) for Command Line Interface (CLI)/shell access and web interface access (when available). The admin account on managed devices, such as Firepower, and Adaptive Security Appliance (ASA) Firepower Services appliances, is the same for CLI access, shell access, and web interface access (when available).
These instructions cite the Firepower Management Center.
Note: References to the Firepower Management Center CLI apply only to Versions 6.3+. The 7000 and 8000 Series devices are supported through Version 6.4.
To reset a lost admin password for a Firepower Threat Defense (FTD) logical device on Firepower 9300 and 4100 platforms, perform the instructions in the Change or Recover Password for FTD through FXOS Chassis Manager guide.
For FTD devices run on Firepower 1000/2100/3100, you must reimage the device. See the Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 Series Running Firepower Threat Defense for the Reimage Procedure on these platforms.
For FTD devices run on ASA 5500-X and Integrated Security Appliance (ISA) 3000 models, you must reimage the device. See the Cisco ASA and Firepower Threat Defense Device Reimage Guide for instructions.
For virtual FTD devices, you must replace the device with a new deployment.
Reimage of a physical device erases its configuration and resets the admin password to Admin123
.
With the exception of FTDvs that use Firepower 7.0+ on Amazon Web Services (AWS), a new FTDv deployment has no configurations, and the admin password is Admin123
. For FTDvs that use Firepower 7.0+ on AWS, a new deployment has no configuration and there is no default password; you supply an admin password at deployment time.
Note: If you run Version 6.0.1-6.2.3, you cannot back up the FTD configuration. If you run Version 6.3.0 - 6.6.0, backup and restore from the FMC web interface are not supported for FTD container instances. Although you can apply shared policies from the Firepower Management Center after you reimage, you must manually configure anything device-specific, such as interface, routing policies, and DHCP and DDNS settings.
You can reset the admin password of the ASA Firepower module CLI with the session command of the ASA General Operations CLI. If you have lost the passwords for the ASA CLI, you can recover them as described in the CLI Book 1: Cisco ASA Series General Operations CLI Configuration Guide for your ASA version.
To reset the admin user of the ASA Firepower software module or the ISA 3000 device to the default password, enter this command at the ASA prompt:
session sfr do password-reset
For more information, see the Cisco ASA Series CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide for your ASA version.
To reset the admin user of the ASA Firepower hardware module to the default password enter this command at the ASA prompt:
session 1 do password-reset
For more information, see the Cisco ASA Series CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide for your ASA version.
Use these instructions to reset a known password for these admin accounts:
Procedure:
sudo passwd admin.
Note: If the system displays a BAD PASSWORD
message, this is informational only. The system applies the password you supply even if this message appears. However, Cisco recommends that you use a more complex password for security reasons.
exit
to exit the shell.exit
to exit the CLI.Use these instructions to reset a known password for these admin accounts:
Procedure:
System > Users
and click the Edit
icon for the admin user.Password
and Confirm Password
fields.Save
.Use these instructions to reset a lost password for these admin accounts:
Note: To reset a lost password for these admin accounts, you need to establish a console or SSH connection with the appliance (in the case of a Firepower Management Center with external users configured, you can use an SSH connection). You also need to reboot the appliance whose admin credentials you have lost. You can initiate the reboot in different ways, dependent on what type of device access you have available:
• For the Firepower Management Center, you need the log in credentials for a web interface user with Administrator access, or the log in credentials for an externally authenticated user with CLI/shell access.
• For 7000 or 8000 Series devices, you need the log in credentials for one of these means of access: a web interface user with Administrator access, a CLI user with Configuration access, or a user with Administrator access on the managed Firepower Management Center.
• For NGIPSv, you need log in credentials for a CLI user with Configuration access, or a user with Administrator access on the managed Firepower Management Center.
• For the Firepower Management Center, 7000 and 8000 Series devices, and NGIPSv devices, if you have a console connection (physical or remote), you can perform this task without log in credentials.
If you cannot access the device with one of those methods, you cannot reset the admin password with these instructions; please contact Cisco TAC.
• For Firepower Management Centers, 7000 and 8000 Series, and virtual appliances with a console, press CTRL-ALT-DEL
. (If you use a remote KVM, the KVM interface provides a way to send CTRL-ALT-DEL
to the device without interference with the KVM itself.)
Note: When you reboot your Firepower Management Center or managed device, this logs you out of your appliance, and the system runs a database check that can take up to an hour to complete.
Caution: Do not shut down appliances with the power button, or unplug the power cable; it can corrupt the system database. Shut down appliances completely by use of the web interface.
3. At the appliance console display, observe the reboot process and proceed dependent on the type of appliance that is rebooted:
Note: If the system is in the process of a database check, you can see the message: The system is not operational yet. Checking and repairing the database is in progress. This may take a long time to finish
.
• For Firepower Management Centers models 750, 1500, 2000, 3500, or 4000, or for Firepower 7000 or 8000 Series devices or NGIPSv, interrupt the reboot process:
a. Once the appliance begins to boot up, press any key on your keyboard to cancel the countdown at the LILO Boot Menu.
b. Note the version number displayed in the LILO Boot Menu. In this example, the version number is 6.2.0.
c. At the boot: prompt, type the command version single where the version is the version number (for example 6.2.0 single). If the system has United Capabilities Approved Products List (UCAPL) compliance enabled, you are prompted for a password; enter the password Sourcefire
.
• For Firepower Management Centers models 1000, 1600, 2500, 2600, 4500, or 4600:
When the boot menu appears, select Option 4, Cisco Firepower Management Console Password Restore Mode
.
4. Assign a new admin password; use the instructions appropriate to your device:
• For a new CLI and shell admin password for the Firepower Management Center or NGIPSv:
a. When the system displays an OS prompt that ends with a pound sign (#), enter this command:
passwd admin
b. Enter the new admin password when prompted to do so (twice).
Note: If the system displays a BAD PASSWORD
message, this is informational only. The system applies the password you supply even if this message appears. However, it is recommended that you use a more complex password for security reasons.
• For a new Web and CLI admin password for the 7000 and 8000 Series devices:
At the OS prompt that ends with the pound sign (#), enter this command:
usertool.pl -p 'admin password'
Where a password is the new admin password.
5. If the admin account has been locked down due to too many failed log in attempts, you must unlock the account. Use the instructions appropriate to your device:
• To unlock the CLI and shell admin accounts on a Firepower Management Center or NGIPSv, enter this command at the OS prompt that ends with the pound sign (#):
pam_tally --user admin --reset
• To unlock both the Web and CLI admin accounts on 7000 and 8000 Series devices, enter this command at the OS prompt that ends with a pound sign (#):
usertool.pl -u admin
6. At the OS prompt that ends with the pound sign (#), enter the reboot
command.
7. Allow the reboot process to complete.
If you are in a situation where you still have access to the FMC Web Interface with an account with Administrator access, you can use the External Authentication
feature to gain access to the CLI. This method allows you to log in to the CLI of an FMC, access the Linux shell, elevate to root, and reset the CLI/shell admin password manually. This option does not require a reboot or console access. This option requires that you have properly configured External Authentication (with SSH access) on the Firepower Management Center for which you want to reset the admin password. (See the Firepower Management Center Configuration Guide for your version for instructions.) Once this is configured, perform these steps:
expert
command to access the Linux shell.expert
command to access the Linux shell.sudo passwd admin
Password
prompt, enter the password for the username with which you are currently logged in.Note: If the system displays a BAD PASSWORD message, this is informational only. The system applies the password you supply, even if this message appears. However, Cisco recommends that you use a more complex password for security reasons.
pam_tally
command, and enter your password when prompted:sudo pam_tally --user --reset
exit
to exit the shell.exit
to exit the CLI.Use these instructions to change the password for the admin account used to access the Firepower Management Center web interface.
Procedure:
expert
command to access the Linux shell.expert
command to access the Linux shell.sudo usertool.pl -p 'admin password'
Password
prompt, enter the password for the username with which you are currently logged in.usertool
command, enter your CLI admin password when prompted:sudo usertool.pl -u admin
exit
to exit the shell.exit
to exit the CLI.Revision | Publish Date | Comments |
---|---|---|
3.0 |
17-Mar-2023 |
Revised to comply with current Cisco publication standards. |
2.0 |
18-Jan-2022 |
Addressed CSCvp96865 - if the admin account has been locked out due to too many failed login attempts, you must unlock the account. |
1.0 |
27-Oct-2014 |
Initial Release |