<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACE 4710 Domain Roles Users access &amp; WWW discrepancy... in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163016#M24092</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;.....contd page 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following objects are user-configurable items: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Access lists &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Defined interfaces &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Policy maps &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Health probes &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Real servers &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Server farms &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Scripts &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Sticky groups &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The objects that you create are specific to the context that you are in while creating the object. If the context is partitioned into multiple domains, you allocate objects within each domain. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly find the config for database roles in detail here as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_1_0/configuration/virtualization/guide/ovrview.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_1_0/configuration/virtualization/guide/ovrview.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 May 2009 11:25:20 GMT</pubDate>
    <dc:creator>sachinga.hcl</dc:creator>
    <dc:date>2009-05-13T11:25:20Z</dc:date>
    <item>
      <title>ACE 4710 Domain Roles Users access &amp; WWW discrepancy...</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163013#M24089</link>
      <description>&lt;P&gt;I am working with Ace A1.7 image. I am attempting to setup users in a context for limited access. Here is config snippet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;domain DOM_APP&lt;/P&gt;&lt;P&gt;  add-object serverfarm SF1&lt;/P&gt;&lt;P&gt;  add-object probe PROBE2&lt;/P&gt;&lt;P&gt;  add-object probe PROBE3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username appmonitor role Network-Monitor domain DOM_APP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once setup, I _can_ login with the user above using CLI. I â&amp;#128;&amp;#156;can and cannotâ&amp;#128;&amp;#157; do a show on the certain objects that are â&amp;#128;&amp;#156;in and not inâ&amp;#128;&amp;#157; the Domain objects list. This all works fine. I get an error if I try to do a show on non-included SF's and Probes for example. However, what is concerning:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) I can do a "show run" while logged in as this monitor user. And I can view the entire context config! Is this normal? How do I prevent this?&lt;/P&gt;&lt;P&gt;2) I cannot web browse into this context with this user or any other user, even and Admin. How do you configure a limited-roles user to web browse?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WR&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2009 17:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163013#M24089</guid>
      <dc:creator>will</dc:creator>
      <dc:date>2009-05-08T17:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: ACE 4710 Domain Roles Users access &amp; WWW discrepancy...</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163014#M24090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Will, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of the most challenging problems in managing large networks is the complexity of security administration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACE appliance allows you to determine the commands and resources available to each user through RBAC. In RBAC, users are associated with domains and roles. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A domain is a collection of physical and virtual network resources such as real servers and virtual servers. &lt;/P&gt;&lt;P&gt;User roles determine a user's privileges, such as the commands that the user can enter and the actions the user can perform in a particular context. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACE provides a number of predefined roles. In addition, administrators in any context can define new roles. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACE provides the following predefined roles, which you cannot delete or modify: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• &lt;STRONG&gt;Admin&lt;/STRONG&gt;—If created in the Admin context, has complete access to, and control over, all contexts, domains, roles, users, resources, and objects in the entire ACE. If created in a user context, gives a user complete access to and control over all policies, roles, domains, server farms, real servers, and other objects in that context.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;• &lt;STRONG&gt;Network Admin&lt;/STRONG&gt;—Has complete access to and control over the following features: &lt;/P&gt;&lt;P&gt;– Interfaces &lt;/P&gt;&lt;P&gt;– Routing &lt;/P&gt;&lt;P&gt;– Connection parameters &lt;/P&gt;&lt;P&gt;– Network Address Translation (NAT) &lt;/P&gt;&lt;P&gt;– VIPs &lt;/P&gt;&lt;P&gt;– Copy configurations &lt;/P&gt;&lt;P&gt;– changeto command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• &lt;STRONG&gt;Network-Monitor&lt;/STRONG&gt;—Has access to all show commands and to the changeto command. If you do not explicitly assign a role to a user with the username command, this is the default role. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• &lt;STRONG&gt;Security-Admin&lt;/STRONG&gt;—Has complete access to and control over the following security-related features within a context: &lt;/P&gt;&lt;P&gt;– ACLs &lt;/P&gt;&lt;P&gt;– Application inspection &lt;/P&gt;&lt;P&gt;– Connection parameters &lt;/P&gt;&lt;P&gt;– Interfaces &lt;/P&gt;&lt;P&gt;– Authentication, authorization, and accounting (AAA) &lt;/P&gt;&lt;P&gt;– NAT &lt;/P&gt;&lt;P&gt;– Copy configurations &lt;/P&gt;&lt;P&gt;– changeto command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• &lt;STRONG&gt;Server-Appln-Maintenance&lt;/STRONG&gt;—Has complete access to and control over the following features: &lt;/P&gt;&lt;P&gt;– Real servers &lt;/P&gt;&lt;P&gt;– Server farms &lt;/P&gt;&lt;P&gt;– Load balancing &lt;/P&gt;&lt;P&gt;– Copy configurations &lt;/P&gt;&lt;P&gt;– changeto command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• &lt;STRONG&gt;Server-Maintenance&lt;/STRONG&gt;—Can perform real server maintenance, monitoring, and debugging for the following features: &lt;/P&gt;&lt;P&gt;– Real servers—Modify permission &lt;/P&gt;&lt;P&gt;– Server farms—Debug permission &lt;/P&gt;&lt;P&gt;– VIPs—Debug permission &lt;/P&gt;&lt;P&gt;– Probes—Debug permission &lt;/P&gt;&lt;P&gt;– Load balancing—Debug permission &lt;/P&gt;&lt;P&gt;– changeto command—Create permission &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• &lt;STRONG&gt;SLB-Admin&lt;/STRONG&gt;—Has complete access to and control over the following ACE features within a context: &lt;/P&gt;&lt;P&gt;– Real servers &lt;/P&gt;&lt;P&gt;– Server farms &lt;/P&gt;&lt;P&gt;– VIPs &lt;/P&gt;&lt;P&gt;– Probes &lt;/P&gt;&lt;P&gt;– Load balancing (Layer 3/4 and Layer 7) &lt;/P&gt;&lt;P&gt;– NAT &lt;/P&gt;&lt;P&gt;– Interfaces &lt;/P&gt;&lt;P&gt;– Copy configurations &lt;/P&gt;&lt;P&gt;– changeto command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• &lt;STRONG&gt;SSL-Admin&lt;/STRONG&gt;—Can administer all SSL features: &lt;/P&gt;&lt;P&gt;– SSL—Create permission &lt;/P&gt;&lt;P&gt;– PKI—Create permission &lt;/P&gt;&lt;P&gt;– Interfaces—Modify permission &lt;/P&gt;&lt;P&gt;– Copy configurations—Create permission &lt;/P&gt;&lt;P&gt;– changeto command—Create permission &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.....contd page 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 May 2009 10:39:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163014#M24090</guid>
      <dc:creator>sachinga.hcl</dc:creator>
      <dc:date>2009-05-13T10:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: ACE 4710 Domain Roles Users access &amp; WWW discrepancy...</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163015#M24091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;page 2.... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can create a user and assign them privileges through RBAC as follows: &lt;/P&gt;&lt;P&gt;________________________________________ &lt;/P&gt;&lt;P&gt;Step 1 Create a domain and choose network resources for the domain. &lt;/P&gt;&lt;P&gt;Step 2 Create a user and associate the user with the following: &lt;/P&gt;&lt;P&gt;• A role (predefined or custom) &lt;/P&gt;&lt;P&gt;• A domain &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configure RBAC using the CLI by following these steps: &lt;/P&gt;&lt;P&gt;________________________________________ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1 Verify that you are operating in the desired context by checking the CLI prompt. If necessary, change to the correct context. &lt;/P&gt;&lt;P&gt;host1/Admin# &lt;STRONG&gt;changeto&lt;/STRONG&gt; VC_web &lt;/P&gt;&lt;P&gt;host1/VC_web# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 2 Enter configuration mode. &lt;/P&gt;&lt;P&gt;host1/VC_web# &lt;STRONG&gt;Config&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;host1/VC_web(config)# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 3 Create a domain for the context. &lt;/P&gt;&lt;P&gt;host1/VC_web(config)# &lt;STRONG&gt;domain&lt;/STRONG&gt; Domain1 &lt;/P&gt;&lt;P&gt;host1/VC_web(config-domain)# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 4 Allocate all objects in the VC_web context to the domain. &lt;/P&gt;&lt;P&gt;host1/VC_web(config-domain)# add-object all &lt;/P&gt;&lt;P&gt;host1/VC_web(config-domain)# exit &lt;/P&gt;&lt;P&gt;host1/VC_web(config)# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 5 Configure new user user1, and assign the predefined role TECHNICIAN and the domain Domain1 to the user. &lt;/P&gt;&lt;P&gt;host1/VC_web(config)# username user1 password 5 MYPASSWORD role &lt;/P&gt;&lt;P&gt;TECHNICIAN domain Domain1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;(Have you done step 4 and 5)&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;________________________________________ &lt;/P&gt;&lt;P&gt;Note The parameter 5 for password is for an MD5-hashed strong encryption password. Use 0 for a clear text password. &lt;/P&gt;&lt;P&gt;________________________________________ &lt;/P&gt;&lt;P&gt;host1/VC_web(config)# exit &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 6 Display the user and domain configurations. &lt;/P&gt;&lt;P&gt;host1/VC_web# &lt;STRONG&gt;show running-config role&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;host1/VC_web# &lt;STRONG&gt;show running-config domain&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please revert if want to discuss further as limit of 4000 chars can be posted at a time. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly rate to let me access to more people if you find this of any use to you. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sachin garg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 May 2009 10:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163015#M24091</guid>
      <dc:creator>sachinga.hcl</dc:creator>
      <dc:date>2009-05-13T10:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: ACE 4710 Domain Roles Users access &amp; WWW discrepancy...</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163016#M24092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;.....contd page 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following objects are user-configurable items: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Access lists &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Defined interfaces &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Policy maps &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Health probes &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Real servers &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Server farms &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Scripts &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•Sticky groups &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The objects that you create are specific to the context that you are in while creating the object. If the context is partitioned into multiple domains, you allocate objects within each domain. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly find the config for database roles in detail here as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_1_0/configuration/virtualization/guide/ovrview.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA3_1_0/configuration/virtualization/guide/ovrview.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 May 2009 11:25:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163016#M24092</guid>
      <dc:creator>sachinga.hcl</dc:creator>
      <dc:date>2009-05-13T11:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: ACE 4710 Domain Roles Users access &amp; WWW discrepancy...</title>
      <link>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163017#M24093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you find this information of any use to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly tell.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sachin garg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jun 2009 17:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-4710-domain-roles-users-access-www-discrepancy/m-p/1163017#M24093</guid>
      <dc:creator>sachinga.hcl</dc:creator>
      <dc:date>2009-06-01T17:42:29Z</dc:date>
    </item>
  </channel>
</rss>

