<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: aaa authorisation exec and aaa authorisation commands in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3717120#M1762</link>
    <description>&lt;P&gt;Most people accomplish this on their ACS or ISE AAA server. For that, you can see some good videos on labminutes. For example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=ywYSJ7i7HV4" target="_blank"&gt;https://www.youtube.com/watch?v=ywYSJ7i7HV4&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 02 Oct 2018 07:09:53 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2018-10-02T07:09:53Z</dc:date>
    <item>
      <title>aaa authorisation exec and aaa authorisation commands</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3715296#M1755</link>
      <description>&lt;P&gt;I'm trying to understand whats the difference between two commands above? I have created two local users on my router, one with privilege level of 15 and the other with Pri level of 7. then I deployed aaa authorisation commands 15 and aaa authorisation commands 1. I tested my config using both users, and although they had different level set, I could get to all commands with both&amp;nbsp; users account until I added 'aaa authorisation exec' command and that fixed the issue. now it seems to me that users with different privilege mode doesn't work until we configure 'aaa authorisation exec', but&amp;nbsp;my question is whats the point of configuring aaa authorisation commands then ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had a very basic aaa config on my router:&lt;/P&gt;
&lt;P&gt;aaa new-model&lt;BR /&gt;aaa authentication login default group tacacs+ group radius local&lt;BR /&gt;aaa authentication enable default none&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default local&lt;BR /&gt;aaa authorization commands 15 default group tacacs+ local&lt;BR /&gt;aaa session-id common&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;username&amp;nbsp;lele privilege 15 password 7 023F05480A0B062F6C1F504151&lt;BR /&gt;username admin privilege 3 password 7 033D5A18070228426E58405D43&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 19:01:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3715296#M1755</guid>
      <dc:creator>D@1984</dc:creator>
      <dc:date>2020-02-21T19:01:54Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authorisation exec and aaa authorisation commands</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3715319#M1756</link>
      <description>&lt;P&gt;commands -&amp;nbsp;Runs authorization for all commands at the specified privilege level.&lt;/P&gt;
&lt;P&gt;exec -&amp;nbsp;Runs authorization to determine if the user is allowed to run an EXEC shell. This facility might return user profile information such as&amp;nbsp;autocommand&amp;nbsp;information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Privilege level 0 — includes the disable, enable, exit, help, and logout commands.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Privilege level 1 — Normal level on Telnet; includes all user-level commands at the router&amp;gt; prompt.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Privilege level 15 — includes all enable-level commands at the router# prompt.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 21:22:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3715319#M1756</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2018-09-28T21:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authorisation exec and aaa authorisation commands</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3715795#M1757</link>
      <description>Thanks but I still dont understand the differenc. From my lab, I found out that I need aaa authorisation exec If I have users with different privilege mode. each privilege mode has set of commands defined that based on that I have access to those commands, now whats aaa authorization commands does?</description>
      <pubDate>Sun, 30 Sep 2018 19:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3715795#M1757</guid>
      <dc:creator>D@1984</dc:creator>
      <dc:date>2018-09-30T19:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authorisation exec and aaa authorisation commands</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3715892#M1759</link>
      <description>&lt;P&gt;To authorize administrative sessions at differentiated levels, you have to use the exec service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When EXEC authorization has been enabled, the device will send a TACACS+ authorization request to the AAA server immediately after authentication to check whether the user is allowed to start an administrative session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Without it, the device cannot distinguish between the authorization levels allowed for the various users' privilege levels. If you only have a single privilege level then "aaa authorization" alone suffices.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 01:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3715892#M1759</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-01T01:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authorisation exec and aaa authorisation commands</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3716962#M1761</link>
      <description>&lt;P&gt;many thanks.&lt;/P&gt;
&lt;P&gt;Is there any lab that you could refer me to so I could understand this better? I&amp;nbsp;also have configured RBAC and assign the view to a user:&lt;/P&gt;
&lt;P&gt;username test1 view test secret TEST123&lt;/P&gt;
&lt;P&gt;parser view test&lt;/P&gt;
&lt;P&gt;secret TEST123&lt;/P&gt;
&lt;P&gt;commands exec include show version&lt;/P&gt;
&lt;P&gt;commands configure include all intreface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when I ssh to my router using test1 username, unless I type enable view test, then I have access to all commands!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what I'm trying to achieve is to have different users, and control what access they can have each.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;many thanks&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 23:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3716962#M1761</guid>
      <dc:creator>D@1984</dc:creator>
      <dc:date>2018-10-01T23:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authorisation exec and aaa authorisation commands</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3717120#M1762</link>
      <description>&lt;P&gt;Most people accomplish this on their ACS or ISE AAA server. For that, you can see some good videos on labminutes. For example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=ywYSJ7i7HV4" target="_blank"&gt;https://www.youtube.com/watch?v=ywYSJ7i7HV4&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 07:09:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorisation-exec-and-aaa-authorisation-commands/m-p/3717120#M1762</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-02T07:09:53Z</dc:date>
    </item>
  </channel>
</rss>

