<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Providing Limited Access via custom RBAC using TACACS+ (ACS 5.4) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221800#M144733</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried using the full command but its a no-go : (&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Jun 2013 16:46:29 GMT</pubDate>
    <dc:creator>jenny conlan</dc:creator>
    <dc:date>2013-06-05T16:46:29Z</dc:date>
    <item>
      <title>Providing Limited Access via custom RBAC using TACACS+ (ACS 5.4) - NX-OS</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221794#M144713</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created the follwoing custom RBAC on NX-OS. &lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;Role: Limited_Admin&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; 11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; deny&amp;nbsp;&amp;nbsp;&amp;nbsp; command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; config t ; interface mgmt 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; 10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&amp;nbsp; command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; read&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; 9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&amp;nbsp; command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; config t ; interface * ; *&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&amp;nbsp; command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; copy running-config startup-config&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; 7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&amp;nbsp; command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ping *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&amp;nbsp; command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; traceroute *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created a Shell Profile with the following attributes that will place the user in the Limited_Admin role and mapped this to the Authorization Policy rule.&lt;/P&gt;&lt;P&gt;Attribute cicso-av-pair &lt;/P&gt;&lt;P&gt;Requirement Mandatory&lt;/P&gt;&lt;P&gt;Vlaue shell:roles="Limited_Admin"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I log in with Test Account - i get mapped to the custom role as seen below however i have priv 15. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;user:testrbac&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; roles:Limited_Admin &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;account created through REMOTE authentication&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Credentials such as ssh server key will be cached temporarily only for this user account&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Local login not possible&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any assistance greatly appreciated. I had this working perfectly on 4.2. but unable to get the rules to work on 5.4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AAA Config from Nexus:&lt;/P&gt;&lt;P&gt;tacacs-server key *****&lt;/P&gt;&lt;P&gt;ip tacacs source-interface mgmt0&lt;/P&gt;&lt;P&gt;tacacs-server host x.x.x.x &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ ACS-SERVERS &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; use-vrf management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ ACS-SERVERS &lt;/P&gt;&lt;P&gt;aaa authentication login default group ACS-SERVERS &lt;/P&gt;&lt;P&gt;aaa authentication login console local &lt;/P&gt;&lt;P&gt;aaa accounting default group ACS-SERVERS &lt;/P&gt;&lt;P&gt;aaa authentication login error-enable &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221794#M144713</guid>
      <dc:creator>jenny conlan</dc:creator>
      <dc:date>2019-03-11T03:29:18Z</dc:date>
    </item>
    <item>
      <title>Providing Limited Access via custom RBAC using TACACS+ (ACS 5.4)</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221795#M144714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This does work as expected however, I was testing success/fail by attempting to configure int mgmt 0 - which should be denied but it is not. &lt;/P&gt;&lt;P&gt;To confirm I &lt;SPAN style="font-size: 10pt;"&gt;logged in as test and went into configuiration mode and did a ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; #config t &lt;/P&gt;&lt;P&gt;(config)# ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I only see the following options - &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; interface&amp;nbsp; Configure interfaces&lt;/P&gt;&lt;P&gt;&amp;nbsp; end&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Go to exec mode&lt;/P&gt;&lt;P&gt;&amp;nbsp; exit&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Exit from command interpreter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just need to know why my deny for int mgmt 0 is not being denied?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jun 2013 18:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221795#M144714</guid>
      <dc:creator>jenny conlan</dc:creator>
      <dc:date>2013-06-04T18:58:25Z</dc:date>
    </item>
    <item>
      <title>Providing Limited Access via custom RBAC using TACACS+ (ACS 5.4)</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221796#M144717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jenny,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I have created the article on this : Kindly check and verify if all the settings are correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-33073"&gt;https://supportforums.cisco.com/docs/DOC-33073&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Minakshi (Do rate the helpful posts)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jun 2013 19:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221796#M144717</guid>
      <dc:creator>minkumar</dc:creator>
      <dc:date>2013-06-04T19:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: Providing Limited Access via custom RBAC using TACACS+ (ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221797#M144721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I checked your configuration and it seems VSA format is correct on the ACS. I didn check the ID of the commands you have added under the role because the RBAC parser accesses a rule from highest to lowest rule number and that is correct too. I'd like to see debugs from Nexus to get to the bottom of this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please run&lt;/P&gt;&lt;P&gt;debug tacacs&lt;/P&gt;&lt;P&gt;debug aaa authen&lt;/P&gt;&lt;P&gt;debug aaa author&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide the output at per your convenience.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Do rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jun 2013 20:05:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221797#M144721</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-04T20:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: Providing Limited Access via custom RBAC using TACACS+ (ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221798#M144726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I appreciate the help. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug tacacs+&lt;/P&gt;&lt;P&gt;debug aaa all (couldnt set to authen and auth)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jun 2013 20:49:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221798#M144726</guid>
      <dc:creator>jenny conlan</dc:creator>
      <dc:date>2013-06-04T20:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: Providing Limited Access via custom RBAC using TACACS+ (ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221799#M144728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182300 aaa: aaa_create_local_acct_req: user=testrbac, session_id=@pts/14, log=configure terminal ; interface mgmt0 (SUCCESS) &lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182320 aaa: aaa_req_process for accounting. session no 0 &lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182328 aaa: MTS request reference is NULL. LOCAL request &lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182335 aaa: Setting AAA_REQ_RESPONSE_NOT_NEEDED&lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182344 aaa: aaa_req_process: General AAA request from appln: default appln_subtype: default&lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182353 aaa: try_next_aaa_method&lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182365 aaa: aaa_method_config: GET request for accounting default default &lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182384 aaa: aaa_method_config: GET methods group ACS-SERVERS&amp;nbsp; &lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182393 aaa: got back the return value of aaa method configuration operation:success &lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182402 aaa: total methods configured is 1, current index to be tried is 0 &lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182411 aaa: handle_req_using_method&lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182418 aaa: AAA_METHOD_SERVER_GROUP&lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182427 aaa: do parallel local accounting&lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182435 aaa: aaa_local_accounting_msg&lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182444 aaa: update:@pts/14:testrbac:&lt;STRONG&gt;configure terminal ; interface mgmt0 &lt;/STRONG&gt;(SUCCESS)&lt;/P&gt;&lt;P&gt;2013 Jun&amp;nbsp; 4 15:44:03.182452 aaa: av list is null. No vsan id&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;not much difference I see in the debugs and the way you have defined. However still try to push it as it is and see how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;like this&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;Role: Limited_Admin&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; deny&amp;nbsp;&amp;nbsp;&amp;nbsp; command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;configure terminal ; interface mgmt0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll check in the backround if something else need to be tweaked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jun 2013 21:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221799#M144728</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-04T21:21:17Z</dc:date>
    </item>
    <item>
      <title>Providing Limited Access via custom RBAC using TACACS+ (ACS 5.4)</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221800#M144733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried using the full command but its a no-go : (&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 16:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221800#M144733</guid>
      <dc:creator>jenny conlan</dc:creator>
      <dc:date>2013-06-05T16:46:29Z</dc:date>
    </item>
    <item>
      <title>Providing Limited Access via custom RBAC using TACACS+ (ACS 5.4)</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221801#M144748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;please share the NX-OS code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 16:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221801#M144748</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-05T16:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Providing Limited Access via custom RBAC using TACACS+ (ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221802#M144763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NX-OS - &lt;SPAN style="font-size: 10pt;"&gt;5.0(3)N1(1c)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco ACS VERSION INFORMATION&lt;/P&gt;&lt;P&gt;-----------------------------&lt;/P&gt;&lt;P&gt;Version : 5.4.0.46.0a&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tested NX-OS &lt;SPAN style="font-size: 10pt;"&gt; 5.1(3)N2(1) - same result.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 17:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221802#M144763</guid>
      <dc:creator>jenny conlan</dc:creator>
      <dc:date>2013-06-05T17:07:51Z</dc:date>
    </item>
    <item>
      <title>Providing Limited Access via custom RBAC using TACACS+ (ACS 5.4)</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221803#M144791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;have you tried assiging a role to the local user itself. Just wanted to rule out NX-OS issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can map the role with local created user and test the interface mgmt0 command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me kno.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 17:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221803#M144791</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-05T17:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: Providing Limited Access via custom RBAC using TACACS+ (ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221804#M144823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Success!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Changed the rule to deny command config t ; interface mgmt0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The interface name is mgmt0, not mgmt –space- 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Although it will accept int mgmt -space- 0&amp;nbsp; the deny command woudl not work unless it was entered without the space! &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This worked on the both verisons: &lt;/P&gt;&lt;P&gt;5.0(3)N1(1c)&lt;/P&gt;&lt;P&gt;5.2(1)N1(2a)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 21:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221804#M144823</guid>
      <dc:creator>jenny conlan</dc:creator>
      <dc:date>2013-06-05T21:01:30Z</dc:date>
    </item>
    <item>
      <title>Re:Providing Limited Access via custom RBAC using TACACS+ (ACS 5</title>
      <link>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221805#M144877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I saw that and that is what I wanted to see and use as a format/syntax on nx under role&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ike this&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;Role: Limited_Admin&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; deny&amp;nbsp;&amp;nbsp;&amp;nbsp; command&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;configure terminal ; interface mgmt0&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; however I think you tried and confirmed that it didn't' work so I started thinking that it could be a Os bug. Glad it's working for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin&lt;BR /&gt;*Do rate help posts*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 21:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/providing-limited-access-via-custom-rbac-using-tacacs-acs-5-4-nx/m-p/2221805#M144877</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-06-05T21:53:48Z</dc:date>
    </item>
  </channel>
</rss>

