<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACE RBAC changeto vs. &amp;quot;sh run&amp;quot; in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-rbac-changeto-vs-quot-sh-run-quot/m-p/2344518#M40865</link>
    <description>&lt;P&gt;I have ACE30 in Cat6500 with several contexts configured.&lt;/P&gt;&lt;P&gt;I'd like to restrict some user to be able to access only one context and he should be able enter show commands in this one specific context only.&lt;/P&gt;&lt;P&gt;As soon as&amp;nbsp; I enable "changeto"&amp;nbsp; feature in Admin context, the user is able to enter "sh run" in all contexts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Admin context:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; role PH-Test-role&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule 11 permit monitor feature changeto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Resticted context:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; role PH-Test-role&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Nonrestricted context:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; role PH-Test-role&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule 1 permit monitor exec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule 2 permit monitor probe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only Admin context is configured for management (ssh, telnet) access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this configuration the specific user is able to execute "changeto Restricted" and is also able to execute "sh run" in Restricted context.&lt;/P&gt;&lt;P&gt;Is there a way how to disable show commands in Restricted context in this scenario?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Petr&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 07 Oct 2013 11:42:48 GMT</pubDate>
    <dc:creator>p.hruby</dc:creator>
    <dc:date>2013-10-07T11:42:48Z</dc:date>
    <item>
      <title>ACE RBAC changeto vs. "sh run"</title>
      <link>https://community.cisco.com/t5/application-networking/ace-rbac-changeto-vs-quot-sh-run-quot/m-p/2344518#M40865</link>
      <description>&lt;P&gt;I have ACE30 in Cat6500 with several contexts configured.&lt;/P&gt;&lt;P&gt;I'd like to restrict some user to be able to access only one context and he should be able enter show commands in this one specific context only.&lt;/P&gt;&lt;P&gt;As soon as&amp;nbsp; I enable "changeto"&amp;nbsp; feature in Admin context, the user is able to enter "sh run" in all contexts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Admin context:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; role PH-Test-role&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule 11 permit monitor feature changeto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Resticted context:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; role PH-Test-role&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Nonrestricted context:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; role PH-Test-role&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule 1 permit monitor exec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule 2 permit monitor probe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only Admin context is configured for management (ssh, telnet) access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this configuration the specific user is able to execute "changeto Restricted" and is also able to execute "sh run" in Restricted context.&lt;/P&gt;&lt;P&gt;Is there a way how to disable show commands in Restricted context in this scenario?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Petr&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2013 11:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-rbac-changeto-vs-quot-sh-run-quot/m-p/2344518#M40865</guid>
      <dc:creator>p.hruby</dc:creator>
      <dc:date>2013-10-07T11:42:48Z</dc:date>
    </item>
    <item>
      <title>ACE RBAC changeto vs. "sh run"</title>
      <link>https://community.cisco.com/t5/application-networking/ace-rbac-changeto-vs-quot-sh-run-quot/m-p/2344519#M40866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you have the details of the all existing roles:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA5_1_0/configuration/getting/started/guide/rbac.html#wp1029637"&gt;http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA5_1_0/configuration/getting/started/guide/rbac.html#wp1029637&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA5_1_0/command/reference/role.html"&gt;http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/vA5_1_0/command/reference/role.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Probably something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; rule &lt;NUMBER&gt; deny &lt;STRONG&gt;monitor ...&lt;/STRONG&gt;&lt;/NUMBER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although if you have a user which cannot even run anyway show command, why would you create even it?&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Oct 2013 04:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-rbac-changeto-vs-quot-sh-run-quot/m-p/2344519#M40866</guid>
      <dc:creator>Jorge Bejarano</dc:creator>
      <dc:date>2013-10-08T04:32:20Z</dc:date>
    </item>
    <item>
      <title>ACE RBAC changeto vs. "sh run"</title>
      <link>https://community.cisco.com/t5/application-networking/ace-rbac-changeto-vs-quot-sh-run-quot/m-p/2344520#M40867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jorge,&lt;/P&gt;&lt;P&gt;rule &lt;NUMBER&gt; deny monitor in resticted context doesn't help.&lt;/NUMBER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I forgot to mention that users are created on tacacs+/ACS server and roles are assigned via AV pair for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that the only way to solve my problem is to create management interface on specific context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Petr&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Oct 2013 10:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-rbac-changeto-vs-quot-sh-run-quot/m-p/2344520#M40867</guid>
      <dc:creator>p.hruby</dc:creator>
      <dc:date>2013-10-08T10:04:29Z</dc:date>
    </item>
    <item>
      <title>ACE RBAC changeto vs. "sh run"</title>
      <link>https://community.cisco.com/t5/application-networking/ace-rbac-changeto-vs-quot-sh-run-quot/m-p/2344521#M40868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Probably you may try to do this by using the ACS features and restricts the tasks the users can/cannot do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Oct 2013 16:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-rbac-changeto-vs-quot-sh-run-quot/m-p/2344521#M40868</guid>
      <dc:creator>Jorge Bejarano</dc:creator>
      <dc:date>2013-10-08T16:04:18Z</dc:date>
    </item>
  </channel>
</rss>

