<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom privilege level for CSM commands in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586083#M11086</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No. I don't think there is way to creat a custom privilege level to allow a user access to only CSM config commands while in config mode&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 May 2006 13:08:43 GMT</pubDate>
    <dc:creator>fmeetz</dc:creator>
    <dc:date>2006-05-18T13:08:43Z</dc:date>
    <item>
      <title>Custom privilege level for CSM commands</title>
      <link>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586082#M11085</link>
      <description>&lt;P&gt;Is there a way to creat a custom privilege level to allow a user access to only CSM config commands while in config mode?? I'm trying to allow members of our server/web team to check on the status of the web servers and to take them out of service for maintenance....and not allow them access to change any other configs on the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks...Jeff&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2006 13:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586082#M11085</guid>
      <dc:creator>jrichterkessing</dc:creator>
      <dc:date>2006-05-12T13:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Custom privilege level for CSM commands</title>
      <link>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586083#M11086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No. I don't think there is way to creat a custom privilege level to allow a user access to only CSM config commands while in config mode&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 May 2006 13:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586083#M11086</guid>
      <dc:creator>fmeetz</dc:creator>
      <dc:date>2006-05-18T13:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: Custom privilege level for CSM commands</title>
      <link>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586084#M11087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can do it with TACACS config authorization enabled.&lt;/P&gt;&lt;P&gt;Create a shell command list on ACS/TACACS and apply to the user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 May 2006 06:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586084#M11087</guid>
      <dc:creator>savyer</dc:creator>
      <dc:date>2006-05-21T06:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Custom privilege level for CSM commands</title>
      <link>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586085#M11088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is an exampel for enable 5&lt;/P&gt;&lt;P&gt;enable secret level 5&lt;/P&gt;&lt;P&gt;privilege slb-lam-mode-real level 5 no inservice    &lt;/P&gt;&lt;P&gt;privilege slb-lam-mode-real level 5 inservice    &lt;/P&gt;&lt;P&gt;     &lt;/P&gt;&lt;P&gt;privilege slb-lam-mode-real level 5 inservice standby &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;privilege slb-lam-mode-csm-sfarm level 5 real      &lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;P&gt;privilege slb-lam-mode-csm-sfarm level 5 real name   &lt;/P&gt;&lt;P&gt;privilege slb-lam-mode-csm level 5 server          &lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;P&gt;privilege configure level 5 module csm      &lt;/P&gt;&lt;P&gt;          &lt;/P&gt;&lt;P&gt;privilege exec level 5 conf t                    &lt;/P&gt;&lt;P&gt;     &lt;/P&gt;&lt;P&gt;privilege exec level 5 exit                        &lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 May 2006 13:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586085#M11088</guid>
      <dc:creator>mruuth</dc:creator>
      <dc:date>2006-05-30T13:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Custom privilege level for CSM commands</title>
      <link>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586086#M11089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the responses. I am currently running aaa with Radius, so I had to use local accounts to assign custom priviledge levels. Thanks Mats for the command strings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 May 2006 12:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/custom-privilege-level-for-csm-commands/m-p/586086#M11089</guid>
      <dc:creator>jrichterkessing</dc:creator>
      <dc:date>2006-05-31T12:10:16Z</dc:date>
    </item>
  </channel>
</rss>

