<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to make AAA access and prevent conf t? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139278#M124005</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the ACS version that you are using?&lt;/P&gt;&lt;P&gt;can you show us screenshots of the config (user groups, device groups and shell profiles (or shell command set)) that you are using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 23 Feb 2013 05:07:23 GMT</pubDate>
    <dc:creator>Amjad Abdullah</dc:creator>
    <dc:date>2013-02-23T05:07:23Z</dc:date>
    <item>
      <title>How to make AAA access and prevent conf t?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139275#M124002</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;i am trying to setup AAA access to our network switches and routers with following requirements:&lt;/P&gt;&lt;P&gt;Have two groups is ACS server: one ReadWrite (full access), second ReadOnly (full access except conf t command).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Created network device groups. &lt;SPAN style="font-size: 10pt;"&gt;Created ACS groups (NetAdmin); shell (exec) is privilege level 15, Shell command auth set is configured ReadWrite for switches and routers. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With bellow commands i managed to have it working OK for switches but cannot get it right for routers. Basically i get authenticated but still have access to conf t on routers. Switches do not have access to conf t for readonly group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;========================================================&lt;/P&gt;&lt;P&gt;Switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ AAA&lt;/P&gt;&lt;P&gt; server 10.10.10.1&lt;/P&gt;&lt;P&gt; server 10.10.10.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default none&lt;/P&gt;&lt;P&gt;aaa authentication login AAA group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login AAA-LOCAL local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group AAA enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group AAA if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group AAA if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group AAA if-authenticated &lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group AAA&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group AAA&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group AAA&lt;/P&gt;&lt;P&gt;aaa accounting network default start-stop group AAA&lt;/P&gt;&lt;P&gt;aaa accounting connection default start-stop group AAA&lt;/P&gt;&lt;P&gt;aaa accounting system default start-stop group AAA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!line vty 0 4&lt;/P&gt;&lt;P&gt;login authentication AAA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=======================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ AAA&lt;/P&gt;&lt;P&gt; server-private 10.10.10.1 key 11111&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login AAA-LOCAL local&lt;/P&gt;&lt;P&gt;aaa authentication login AAA group AAA local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group AAA enable&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;aaa authorization exec default group AAA if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group AAA if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group AAA if-authenticated &lt;/P&gt;&lt;P&gt;aaa accounting exec default&lt;/P&gt;&lt;P&gt; action-type start-stop&lt;/P&gt;&lt;P&gt; group AAA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default&lt;/P&gt;&lt;P&gt; action-type start-stop&lt;/P&gt;&lt;P&gt; group AAA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default&lt;/P&gt;&lt;P&gt; action-type start-stop&lt;/P&gt;&lt;P&gt; group AAA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa accounting network default&lt;/P&gt;&lt;P&gt; action-type start-stop&lt;/P&gt;&lt;P&gt; group AAA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa accounting connection default&lt;/P&gt;&lt;P&gt; action-type start-stop&lt;/P&gt;&lt;P&gt; group AAA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa accounting system default&lt;/P&gt;&lt;P&gt; action-type start-stop&lt;/P&gt;&lt;P&gt; group AAA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!line vty 0 4&lt;/P&gt;&lt;P&gt; login authentication AAA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=============================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Based on bellow commands how can i setup AAA to fulfill our needs?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Appreciated your help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139275#M124002</guid>
      <dc:creator>endpoint</dc:creator>
      <dc:date>2019-03-11T03:06:30Z</dc:date>
    </item>
    <item>
      <title>How to make AAA access and prevent conf t?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139276#M124003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ACS 4.x&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#backinfo"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#backinfo&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS 5.x&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps9911/products_configuration_example09186a0080bc8514.shtml"&gt;http://www.cisco.com/en/US/products/ps9911/products_configuration_example09186a0080bc8514.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These commands are required on an IOS router or switch in order to implement command authorization through an ACS server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa new-model&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization config-commands&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 0 default&amp;nbsp; group tacacs+ local&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 1 default&amp;nbsp; group tacacs+ local&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 15 default group tacacs+ local&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tacacs-server host 10.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tacacs-server key cisco123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#rou"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#rou&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt; &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 03:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139276#M124003</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-02-20T03:42:18Z</dc:date>
    </item>
    <item>
      <title>How to make AAA access and prevent conf t?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139277#M124004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks for quick responce.&lt;/P&gt;&lt;P&gt;Unfortunatelly your suggestions do not work. As i mentioned in my origianl post ACS access to switches is workign fine, readonly user can see all info about the switch but does not have access to conf t.&lt;/P&gt;&lt;P&gt;With router is a different thing. With the same settings as for the switches, user do not have access to show runn command and also not able to get to conf t. &lt;/P&gt;&lt;P&gt;Not being abel to get to conf to is fine but show runninng should be available (as it is available for switches).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2013 22:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139277#M124004</guid>
      <dc:creator>endpoint</dc:creator>
      <dc:date>2013-02-21T22:40:04Z</dc:date>
    </item>
    <item>
      <title>How to make AAA access and prevent conf t?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139278#M124005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the ACS version that you are using?&lt;/P&gt;&lt;P&gt;can you show us screenshots of the config (user groups, device groups and shell profiles (or shell command set)) that you are using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Feb 2013 05:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139278#M124005</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2013-02-23T05:07:23Z</dc:date>
    </item>
    <item>
      <title>How to make AAA access and prevent conf t?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139279#M124006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I am using ACS 4.2 &lt;/P&gt;&lt;P&gt;Release 4.2(1) Build 15 Patch 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/5/5/130556-1.JPG" class="jive-image" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/5/5/130557-2.JPG" class="jive-image" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/5/5/130558-3.JPG" class="jive-image" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/5/5/130559-4.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 21:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139279#M124006</guid>
      <dc:creator>endpoint</dc:creator>
      <dc:date>2013-02-25T21:17:58Z</dc:date>
    </item>
    <item>
      <title>How to make AAA access and prevent conf t?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139280#M124007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to select "Assign a shell authorization set up for any network device"&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/servlet/JiveServlet/showImage/2-3866313-130557/2.JPG"&gt;https://supportforums.cisco.com/servlet/JiveServlet/downloadImage/2-3866313-130557/450-500/2.JPG &lt;/A&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/servlet/JiveServlet/showImage/2-3866313-130558/3.JPG"&gt; &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 21:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139280#M124007</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-02-25T21:37:26Z</dc:date>
    </item>
    <item>
      <title>How to make AAA access and prevent conf t?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139281#M124008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I am assigning "Shell Command auth set on a per network device group basis"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why do you think i need to assing a shell auth setup for any netwrok device?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 22:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139281#M124008</guid>
      <dc:creator>endpoint</dc:creator>
      <dc:date>2013-02-25T22:59:39Z</dc:date>
    </item>
    <item>
      <title>How to make AAA access and prevent conf t?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139282#M124009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your config looks OK from the screenshots you posted.&lt;/P&gt;&lt;P&gt;Just make sure the user you are using belongs does not have different configuration than its group. If the user has a different configuration than its group then the user config will take effect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to test with different users on that group to isolate. Do all users experience same behavior?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amjad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 07:28:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139282#M124009</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2013-03-05T07:28:37Z</dc:date>
    </item>
    <item>
      <title>How to make AAA access and prevent conf t?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139283#M124010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The behaviour is ok for switches; user get # prompt, can read runn-conf but when try to get to conf t, user get non authorize command (which is what i would like to have). Unfortunatelly it does not work for routers. With this config user has all access to routers.&lt;/P&gt;&lt;P&gt;Tested with other users, brand-new users, no any different settings on user level with same result. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 14:34:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-make-aaa-access-and-prevent-conf-t/m-p/2139283#M124010</guid>
      <dc:creator>endpoint</dc:creator>
      <dc:date>2013-03-05T14:34:10Z</dc:date>
    </item>
  </channel>
</rss>

