<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.x Auth for VPN and SSH/managment users in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242701#M183201</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Again I came, I made two rules, the first Management access-Admin group, and Network Access VPN, the first match TACACS, Radius second, first I made Shell Profiles (static level 15) and Command Sets, (I managed to adjust to helpdesk group only are allowed commands specified below, users helpdesk group can again all the commands that are used (conf t etc ....), they have the privilege level 10)&lt;/P&gt;&lt;P&gt;To get back to the first question, Admin group has all rights, it can use all the commands, they are not the problem, how configure VPN group, which only authenticate the ASA over the radius, which value to put the privileges of Shell Profiles for VPN, Default Privilege and Privilege Maximum static 0 or NULL in field Shell Profile:, and what to do with Command Sets for VPN group, the same NULL or DenyAllCommands?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me for Command Sets &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show ip int&lt;/P&gt;&lt;P&gt;show int&lt;/P&gt;&lt;P&gt;show ver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/2/6/146624-acs.png" class="jive-image" /&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCNA R&amp;amp;S, CCNA Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 21 Jul 2013 23:30:55 GMT</pubDate>
    <dc:creator>Nedeljko Scepanovic</dc:creator>
    <dc:date>2013-07-21T23:30:55Z</dc:date>
    <item>
      <title>ACS 5.x Auth for VPN and SSH/managment users</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242694#M182928</link>
      <description>&lt;P&gt;Hi, this is my test lab &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;, I have ASA 5505 and a few routers 1841, how can I make 2 groups for authentication on ACS via ssh and vpn, first&amp;nbsp; is managment ssh, and I make this via tacacs, second is vpn and autentication for that users work via radius, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I make 2 user group in ACS, first is gr_Admins for ssh/managment via TACACS, and second is gr_VPN for VPN via radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there some way that I divide these two groups, if I gr_Admins, put autentication with radius, they would be able to log in with VPN, and it does not want, I want a group for ssh, and the other only for VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;English is not my native language, so I apologize for bad writing. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCNA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:35:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242694#M182928</guid>
      <dc:creator>Nedeljko Scepanovic</dc:creator>
      <dc:date>2019-03-11T03:35:38Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x Auth for VPN and SSH/managment users</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242695#M182957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;About ssh and vpn, you can use the default "Service Selection Rules". the service called "Default network access" will take care of vpns and the service called "device admin" will take care of tacacs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/0/4/144407-ACS%20Service%20Selection%20Rules.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About users you could create "attributes". For example you could create a user attribute called "vpn-attribute" and then create an "access service rule" that will let this user to access the vpn only if the "vpn-attribute" is set to "true" &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you could create the "ssh" attribute, and create an "access service rule" that will let this user to access a device by using ssh only if the ssh attribute is set to true&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/0/4/144408-SSH-policy.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;That way you can have all the options for your users (user that only&amp;nbsp; can ssh, users that only can use the vpn, users that can use both ssh&amp;nbsp; and vpns, and user that can't use nothing).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jul 2013 04:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242695#M182957</guid>
      <dc:creator>Eduardo Aliaga</dc:creator>
      <dc:date>2013-07-04T04:29:41Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x Auth for VPN and SSH/managment users</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242696#M183006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will now try your solution &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCNA R&amp;amp;S, CCNA Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jul 2013 19:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242696#M183006</guid>
      <dc:creator>Nedeljko Scepanovic</dc:creator>
      <dc:date>2013-07-18T19:06:14Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x Auth for VPN and SSH/managment users</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242697#M183027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried your solution, but I can not create any rules, and when I click on Create, a new window appears with an error ErrorCode: 500 has occured, I use ACS 5.4 trial.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a nice day &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/4/2/146246-1.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/4/2/146247-3.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 09:48:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242697#M183027</guid>
      <dc:creator>Nedeljko Scepanovic</dc:creator>
      <dc:date>2013-07-20T09:48:19Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x Auth for VPN and SSH/managment users</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242698#M183104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What broswer and code are you using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 10:21:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242698#M183104</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-20T10:21:30Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x Auth for VPN and SSH/managment users</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242699#M183139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hahahha, that is problem &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;, I look on google, and find what I must do to, I use Xubunu FF 20, and Chrome, I have installed on VirtualBox WindowsXP, and I install Firefox 3,and now is OK &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCNA R&amp;amp;S, CCNA Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 10:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242699#M183139</guid>
      <dc:creator>Nedeljko Scepanovic</dc:creator>
      <dc:date>2013-07-20T10:26:50Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x Auth for VPN and SSH/managment users</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242700#M183182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if you have any more questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~BR &lt;BR /&gt;Jatin Katyal &lt;BR /&gt; &lt;BR /&gt;**Do rate helpful posts**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 10:31:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242700#M183182</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-07-20T10:31:20Z</dc:date>
    </item>
    <item>
      <title>ACS 5.x Auth for VPN and SSH/managment users</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242701#M183201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Again I came, I made two rules, the first Management access-Admin group, and Network Access VPN, the first match TACACS, Radius second, first I made Shell Profiles (static level 15) and Command Sets, (I managed to adjust to helpdesk group only are allowed commands specified below, users helpdesk group can again all the commands that are used (conf t etc ....), they have the privilege level 10)&lt;/P&gt;&lt;P&gt;To get back to the first question, Admin group has all rights, it can use all the commands, they are not the problem, how configure VPN group, which only authenticate the ASA over the radius, which value to put the privileges of Shell Profiles for VPN, Default Privilege and Privilege Maximum static 0 or NULL in field Shell Profile:, and what to do with Command Sets for VPN group, the same NULL or DenyAllCommands?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me for Command Sets &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show ip int&lt;/P&gt;&lt;P&gt;show int&lt;/P&gt;&lt;P&gt;show ver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/2/6/146624-acs.png" class="jive-image" /&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCNA R&amp;amp;S, CCNA Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Jul 2013 23:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242701#M183201</guid>
      <dc:creator>Nedeljko Scepanovic</dc:creator>
      <dc:date>2013-07-21T23:30:55Z</dc:date>
    </item>
    <item>
      <title>Re:ACS 5.x Auth for VPN and SSH/managment users</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242702#M183224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, any new comment?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Jul 2013 16:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-x-auth-for-vpn-and-ssh-managment-users/m-p/2242702#M183224</guid>
      <dc:creator>Nedeljko Scepanovic</dc:creator>
      <dc:date>2013-07-27T16:36:34Z</dc:date>
    </item>
  </channel>
</rss>

