<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS 4.2 Shell Command Authorization Set permissions in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-4-2-shell-command-authorization-set-permissions/m-p/2279012#M130049</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the post.&amp;nbsp; I'm have a similar requirement using Secure ACS 5.4.&amp;nbsp; Configuration on the switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa group server tacacs+ CISCOACS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; server 1.2.3.4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; server 5.6.7.8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authentication login default group CISCOACS local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authentication enable default group CISCOACS none&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authorization config-commands&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authorization exec default group CISCOACS local &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authorization commands 15 default group CISCOACS local &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa accounting exec default start-stop group CISCOACS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa accounting commands 15 default start-stop group CISCOACS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ACS, I want to let a certain class of users change the vlan for Gigabit ports, but not 10GB.&amp;nbsp; I first create this command set:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/9/4/165494-ACS_Command_set.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I add a line to the Device Admin authorization policy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/9/4/165495-ACS_Admin_Policy.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Nov 2013 19:52:45 GMT</pubDate>
    <dc:creator>johnnylingo</dc:creator>
    <dc:date>2013-11-08T19:52:45Z</dc:date>
    <item>
      <title>ACS 4.2 Shell Command Authorization Set permissions</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-2-shell-command-authorization-set-permissions/m-p/2279010#M129925</link>
      <description>&lt;P&gt;I know that 4.2 is pretty old but it could be relevant in future versions with 5.3 and ISE.&amp;nbsp; I dont know.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Topic:&amp;nbsp; Implementing (permitting) subcommands under an Authorization Set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was somehwat difficult for me to get working for the final step that I wanted.&amp;nbsp; That was to Allow FastEthernet interfaces to be allowed by the help desk and deny GigabitEthernet.&amp;nbsp; Reasoning being is all Gigabit ports are reserved for trunking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How I was able to solve this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;SWITCH&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Previous AAA settings on 3750 switch&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ CSACS&lt;/P&gt;&lt;P&gt;aaa authentication login default group CSACS local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group CSACS enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group CSACS local &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group CSACS local &lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group CSACS&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Added command on switch&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This allows you to specify individual commands (to my understanding).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;ACS&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Shell Command Authorization Set&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to allow fastethernet and deny gigabitethernet then do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;COMMAND&lt;/P&gt;&lt;P&gt;interface&lt;/P&gt;&lt;P&gt;ARGUMENT&lt;/P&gt;&lt;P&gt;permit FasEthernet&amp;nbsp; (case-sensitive!!!!!!)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow switchport commands&lt;STRONG&gt;:&lt;/STRONG&gt; switchport mode access and switchport access vlan denying explicitly switchport mode trunk.&lt;/P&gt;&lt;P&gt;COMMAND&lt;/P&gt;&lt;P&gt;switchport&lt;/P&gt;&lt;P&gt;ARGUMENT&lt;/P&gt;&lt;P&gt;deny mode trunk&lt;/P&gt;&lt;P&gt;permit mode access&lt;/P&gt;&lt;P&gt;permit access&amp;nbsp; vlan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Items to consider:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1. User settings trump group settings so if you give someone priviledge level 15 in their user settings instead of following group settings then they have acess to everything.)&lt;/P&gt;&lt;P&gt;2. shell exec needs to be turned on for user and group&lt;/P&gt;&lt;P&gt;3. The five ITEMS in 4.2 that you need to look at.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User Setup&lt;/P&gt;&lt;P&gt;Advanced TACACS+ Settings&lt;/P&gt;&lt;P&gt;TACACS+ Enable Password&lt;/P&gt;&lt;P&gt;Shell (exec)&amp;nbsp; (RIGHT ABOVE ----&amp;gt;&amp;nbsp; Shell Command Authorization Set)&lt;/P&gt;&lt;P&gt;Shell Command Authorization Set&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-2-shell-command-authorization-set-permissions/m-p/2279010#M129925</guid>
      <dc:creator>nathan demers</dc:creator>
      <dc:date>2019-03-11T03:58:20Z</dc:date>
    </item>
    <item>
      <title>ACS 4.2 Shell Command Authorization Set permissions</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-2-shell-command-authorization-set-permissions/m-p/2279011#M129980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for sharing your findings. It would be great if you can add a screen shot of the shared profile component &amp;gt; command authorization set. It would surely help community users to understand it better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Oct 2013 08:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-2-shell-command-authorization-set-permissions/m-p/2279011#M129980</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-10-08T08:12:46Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 4.2 Shell Command Authorization Set permissions</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-4-2-shell-command-authorization-set-permissions/m-p/2279012#M130049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the post.&amp;nbsp; I'm have a similar requirement using Secure ACS 5.4.&amp;nbsp; Configuration on the switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa group server tacacs+ CISCOACS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; server 1.2.3.4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&amp;nbsp; server 5.6.7.8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authentication login default group CISCOACS local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authentication enable default group CISCOACS none&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authorization config-commands&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authorization exec default group CISCOACS local &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa authorization commands 15 default group CISCOACS local &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa accounting exec default start-stop group CISCOACS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;aaa accounting commands 15 default start-stop group CISCOACS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ACS, I want to let a certain class of users change the vlan for Gigabit ports, but not 10GB.&amp;nbsp; I first create this command set:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/9/4/165494-ACS_Command_set.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I add a line to the Device Admin authorization policy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/9/4/165495-ACS_Admin_Policy.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Nov 2013 19:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-4-2-shell-command-authorization-set-permissions/m-p/2279012#M130049</guid>
      <dc:creator>johnnylingo</dc:creator>
      <dc:date>2013-11-08T19:52:45Z</dc:date>
    </item>
  </channel>
</rss>

