<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic More &amp;quot;command authorization failed&amp;quot; issues in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832142#M198924</link>
    <description>&lt;P&gt;I have read the other posts from users with this issue, but their solutions have not helped in my case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fully patched 5.3 ACS virtual server.&amp;nbsp; Sample switch config AAA setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;aaa new-model&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;aaa authentication login default group tacacs+ local-case&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;aaa authentication enable default group tacacs+ enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;aaa authorization commands 15 default group tacacs+ if-authenticated&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I can authenticate against the ACS server with no problem, and I even show the user as being at priv level 15 but attemting to run a "sh run" causes the command authorization failed issue.&amp;nbsp; See below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;username: jack&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;password: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR&amp;gt;sh priv&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;Current privilege level is 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR&amp;gt;en&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;password: &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR#sh priv&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;Current privilege level is 15&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR#sh run&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;Command authorization failed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Now I am not super strong with cisco so I am not totally clear on all the AAA settings.&amp;nbsp; What is even stranger is that when I tested this in a lab environment against a 3400 it worked fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;In my ACS I simply have a shell profile called Level 15 that should give any authenticated user that level of access.&amp;nbsp; Under the Common Tasks for the shell profile the only setting I have set is Maximum Pirvilege as "Static" and Value is "15".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Appreciate any help.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 01:44:55 GMT</pubDate>
    <dc:creator>ghuey</dc:creator>
    <dc:date>2019-03-11T01:44:55Z</dc:date>
    <item>
      <title>More "command authorization failed" issues</title>
      <link>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832142#M198924</link>
      <description>&lt;P&gt;I have read the other posts from users with this issue, but their solutions have not helped in my case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fully patched 5.3 ACS virtual server.&amp;nbsp; Sample switch config AAA setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;aaa new-model&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;aaa authentication login default group tacacs+ local-case&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;aaa authentication enable default group tacacs+ enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;aaa authorization commands 15 default group tacacs+ if-authenticated&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I can authenticate against the ACS server with no problem, and I even show the user as being at priv level 15 but attemting to run a "sh run" causes the command authorization failed issue.&amp;nbsp; See below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;username: jack&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;password: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR&amp;gt;sh priv&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;Current privilege level is 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR&amp;gt;en&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;password: &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR#sh priv&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;Current privilege level is 15&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR#sh run&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;Command authorization failed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="color: #0000ff;"&gt;OPS-3524PWR#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Now I am not super strong with cisco so I am not totally clear on all the AAA settings.&amp;nbsp; What is even stranger is that when I tested this in a lab environment against a 3400 it worked fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;In my ACS I simply have a shell profile called Level 15 that should give any authenticated user that level of access.&amp;nbsp; Under the Common Tasks for the shell profile the only setting I have set is Maximum Pirvilege as "Static" and Value is "15".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Appreciate any help.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832142#M198924</guid>
      <dc:creator>ghuey</dc:creator>
      <dc:date>2019-03-11T01:44:55Z</dc:date>
    </item>
    <item>
      <title>More "command authorization failed" issues</title>
      <link>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832143#M198925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to add more info, the ACS log appears to show that everything is fine:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="AUTOGENBOOKMARK_4" style="margin-top: 5pt; width: 10in; empty-cells: show; margin-left: 5pt;"&gt;&lt;TBODY&gt;&lt;TR valign="top"&gt;&lt;TD style="padding-left: 1pt; padding-right: 5pt; padding-top: 1pt;"&gt;&lt;TABLE id="__TOC_0" style="border-bottom-color: #808080; border-bottom-style: solid; border-left-color: #808080; border-left-style: solid; width: 100%; font-family: sans-serif; empty-cells: show; height: 0.729in; font-size: small; border-top-color: #e3e3e3; border-right-color: #808080; border-right-style: solid; border-width: 1px; margin: 0pt;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="font-family: arial; color: #000000; font-size: 10pt; font-weight: bold;"&gt;&lt;TH style="border-bottom-color: #8499a2; border-left-color: #8499a2; background-color: #d9e3e9; padding-left: 2pt; padding-right: 2pt; font-size: 10pt; border-top-color: #8499a2; border-right-color: #ffffff; padding-top: 1pt; border-width: 1px; border-style: solid;"&gt;&lt;P id="AUTOGENBOOKMARK_5"&gt;Authentication Details&lt;/P&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding: 1pt;"&gt;&lt;TABLE id="AUTOGENBOOKMARK_6" style="background-color: #ffffff; margin-top: 0pt; width: 100%; empty-cells: show;"&gt;&lt;TBODY&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_7"&gt;Status:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P style="margin-top: 0pt; color: #008000; font-size: 9pt;"&gt;Passed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_8"&gt;Failure Reason:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_9"&gt;Logged At:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Jan 20, 2012 4:04 PM&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_10"&gt;ACS Time:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Jan 20, 2012 4:04 PM&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_11"&gt;ACS Instance:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;A href="https://172.30.1.90/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Fadmin%2FACS_Instance%2FACS_Instance_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=Default+Device+Admin&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptIdentityGroup=All+Groups%3AEngineers&amp;amp;rptAcsInstance=sls-acs.slfiber.com&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptUser=jack&amp;amp;rptNetworkDeviceGroup=Device+Type%3AAll+Device+Types%2C+Location%3AAll+Locations&amp;amp;rptNetworkDevice=SL-OPS-3524PWR&amp;amp;__locale=en_US&amp;amp;iportalID=QHLVSY&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="margin-top: 0pt; display: block;" target="_self"&gt;sls-acs.testdomain.com&lt;/A&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_12"&gt;Authentication Method:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;PAP_ASCII&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_13"&gt;Authentication Type:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;ASCII&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_14"&gt;Privilege Level:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;15&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD align="left" colspan="2" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_15" style="border-bottom: #43758d thin dotted; padding-bottom: 1pt; margin-top: 0pt; color: #43758d; padding-top: 3pt;"&gt;User&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_16"&gt;Username:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;A href="https://172.30.1.90/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Fadmin%2FUser%2FUser_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=Default+Device+Admin&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptIdentityGroup=All+Groups%3AEngineers&amp;amp;rptAcsInstance=sls-acs.slfiber.com&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptUser=jack&amp;amp;rptNetworkDeviceGroup=Device+Type%3AAll+Device+Types%2C+Location%3AAll+Locations&amp;amp;rptNetworkDevice=SL-OPS-3524PWR&amp;amp;__locale=en_US&amp;amp;iportalID=QHLVSY&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="display: block;" target="_self"&gt;jack&lt;/A&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_17"&gt;Remote Address:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;172.30.1.152&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD align="left" colspan="2" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_18" style="border-bottom: #43758d thin dotted; color: #43758d; padding-top: 3pt;"&gt;Network Device&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_19"&gt;Network Device:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;A href="https://172.30.1.90/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Fadmin%2FNetwork_Device%2FNetwork_Device_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=Default+Device+Admin&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptIdentityGroup=All+Groups%3AEngineers&amp;amp;rptAcsInstance=sls-acs.slfiber.com&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptUser=jack&amp;amp;rptNetworkDeviceGroup=Device+Type%3AAll+Device+Types%2C+Location%3AAll+Locations&amp;amp;rptNetworkDevice=SL-OPS-3524PWR&amp;amp;__locale=en_US&amp;amp;iportalID=QHLVSY&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="display: block;" target="_self"&gt;SL-OPS-3524PWR&lt;/A&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_20"&gt;Network Device IP Address:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;172.30.1.57&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_21"&gt;Network Device Groups:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Device Type:All Device Types, Location:All Locations&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD align="left" colspan="2" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_22" style="border-bottom: #43758d thin dotted; padding-bottom: 1pt; color: #43758d; padding-top: 3pt;"&gt;Access Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_23"&gt;Access Service:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;A href="https://172.30.1.90/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Fadmin%2FAccess_Service%2FAccess_Service_Authentication_Summary.rptdesign&amp;amp;rptMacAddress=All&amp;amp;rptAccessService=Default+Device+Admin&amp;amp;rptProtocol=TACACS&amp;amp;rptStartDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptIdentityGroup=All+Groups%3AEngineers&amp;amp;rptAcsInstance=sls-acs.slfiber.com&amp;amp;rptTimeRange=custom&amp;amp;rptIdentityStore=Internal+Users&amp;amp;rptEndDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptUser=jack&amp;amp;rptNetworkDeviceGroup=Device+Type%3AAll+Device+Types%2C+Location%3AAll+Locations&amp;amp;rptNetworkDevice=SL-OPS-3524PWR&amp;amp;__locale=en_US&amp;amp;iportalID=QHLVSY&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="display: block;" target="_self"&gt;Default Device Admin&lt;/A&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_24"&gt;Identity Store:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Internal Users&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_25"&gt;Selected Shell Profile:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Level 15&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_26"&gt;Active Directory Domain:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_27"&gt;Identity Group:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;All Groups:Engineers&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_28"&gt;Access Service Selection Matched Rule :&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Rule-2&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_29"&gt;Identity Policy Matched Rule:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Default&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_30"&gt;Selected Identity Stores:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Internal Users, Internal Users&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_31"&gt;Query Identity Stores:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_32"&gt;Selected Query Identity Stores:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_33"&gt;Group Mapping Policy Matched Rule:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_34"&gt;Authorization Policy Matched Rule:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Rule-1&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;DIV id="AUTOGENBOOKMARK_35"&gt;Authorization Exception Policy Matched&amp;nbsp; Rule:&lt;/DIV&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD align="left" colspan="2" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_36" style="border-bottom: #43758d thin dotted; padding-bottom: 1pt; color: #43758d; padding-top: 3pt;"&gt;Other&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_37"&gt;ACS Session ID:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;sls-acs.slfiber.com/116213333/139&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_38"&gt;Service:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;Enable&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_39"&gt;AV Pairs:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #ebeff3;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_40"&gt;Response Time:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;P&gt;10&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="background-color: #f5f9fd;" valign="top"&gt;&lt;TD align="left" style="font-family: arial; white-space: nowrap; font-size: 10pt;"&gt;&lt;P id="AUTOGENBOOKMARK_41"&gt;Other Attributes:&lt;/P&gt;&lt;/TD&gt;&lt;TD align="left" style="font-family: arial; font-size: 10pt;"&gt;&lt;DIV&gt;ACSVersion=acs-5.3.0.40-B.839 &lt;BR /&gt;ConfigVersionId=66 &lt;BR /&gt;Protocol=Tacacs &lt;BR /&gt;Type=Authentication &lt;BR /&gt;Action=Login &lt;BR /&gt;Port=tty1 &lt;BR /&gt;Action=Login &lt;BR /&gt;Port=tty1 &lt;BR /&gt;UserIdentityGroup=IdentityGroup:All&amp;nbsp; Groups:Engineers&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD style="padding-left: 5pt; padding-top: 1pt;"&gt;&lt;TABLE id="__TOC_1" style="border-bottom-color: #808080; border-bottom-style: solid; border-left-color: #808080; border-left-style: solid; width: 100%; font-family: sans-serif; empty-cells: show; font-size: small; border-top-color: #e3e3e3; border-right-color: #808080; border-right-style: solid; border-width: 1px; margin: 0pt;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="font-family: arial; color: #000000; font-size: 10pt; font-weight: bold;"&gt;&lt;TH style="border-bottom-color: #8499a2; border-left-color: #8499a2; background-color: #d9e3e9; padding-left: 2pt; padding-right: 2pt; font-size: 10pt; border-top-color: #8499a2; border-right-color: #ffffff; padding-top: 1pt; border-width: 1px; border-style: solid;"&gt;&lt;P id="AUTOGENBOOKMARK_42"&gt;Authentication Result&lt;/P&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Type=Authentication&lt;BR /&gt; Authen-Reply-Status=Pass&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE id="__TOC_2" style="border-bottom-color: #808080; border-bottom-style: solid; border-left-color: #808080; border-left-style: solid; margin-top: 10pt; margin-right: 0pt; margin-bottom: 0pt; margin-left: 0pt; width: 100%; font-family: sans-serif; empty-cells: show; font-size: small; border-top-color: #e3e3e3; border-right-color: #808080; border-right-style: solid; border-width: 1px;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="font-family: arial; color: #000000; font-size: 10pt; font-weight: bold;"&gt;&lt;TH style="border-bottom-color: #8499a2; border-left-color: #8499a2; background-color: #d9e3e9; padding-left: 2pt; padding-right: 2pt; font-size: 10pt; border-top-color: #8499a2; border-right-color: #ffffff; padding-top: 1pt; border-width: 1px; border-style: solid;"&gt;&lt;P id="AUTOGENBOOKMARK_43" style="text-align: left;"&gt;Steps&lt;/P&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Received TACACS+ Authentication START&amp;nbsp; Request&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #ebebeb; padding-left: 2pt; padding-right: 2pt; color: #000000; text-decoration: underline; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Service Selection Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Matched rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Selected Access Service - Default Device&amp;nbsp; Admin&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #ebebeb; padding-left: 2pt; padding-right: 2pt; color: #000000; text-decoration: underline; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Identity Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Matched Default Rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Selected Identity Store - Internal&amp;nbsp; Users&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Looking up User in Internal Users IDStore -&amp;nbsp; jack&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Found User in Internal Users&amp;nbsp; IDStore&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;TACACS+ will use the password prompt from global&amp;nbsp; TACACS+ configuration.&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Returned TACACS+ Authentication&amp;nbsp; Reply&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Received TACACS+ Authentication CONTINUE&amp;nbsp; Request&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Using previously selected Access&amp;nbsp; Service&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #ebebeb; padding-left: 2pt; padding-right: 2pt; color: #000000; text-decoration: underline; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Identity Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Matched Default Rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Selected Identity Store - Internal&amp;nbsp; Users&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Looking up User in Internal Users IDStore -&amp;nbsp; jack&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Found User in Internal Users&amp;nbsp; IDStore&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Authentication Passed&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #ebebeb; padding-left: 2pt; padding-right: 2pt; color: #000000; text-decoration: underline; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Group Mapping Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #ebebeb; padding-left: 2pt; padding-right: 2pt; color: #000000; text-decoration: underline; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Evaluating Exception Authorization&amp;nbsp; Policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;No rule was matched&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #ebebeb; padding-left: 2pt; padding-right: 2pt; color: #000000; text-decoration: underline; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Evaluating Authorization Policy&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;P style="margin-top: 0pt;"&gt;Matched rule&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="margin-top: 0pt;"&gt;Returned TACACS+ Authentication&amp;nbsp; Reply&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE id="__TOC_3" style="border-bottom-color: #808080; border-bottom-style: solid; border-left-color: #808080; border-left-style: solid; margin-top: 10pt; margin-right: 0pt; margin-bottom: 0pt; margin-left: 0pt; width: 100%; font-family: sans-serif; empty-cells: show; font-size: small; border-top-color: #e3e3e3; border-right-color: #808080; border-right-style: solid; border-width: 1px;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="font-family: arial; color: #000000; font-size: 10pt; font-weight: bold;"&gt;&lt;TH style="border-bottom-color: #8499a2; border-left-color: #8499a2; background-color: #d9e3e9; padding-left: 2pt; padding-right: 2pt; font-size: 10pt; border-top-color: #8499a2; border-right-color: #ffffff; padding-top: 1pt; border-width: 1px; border-style: solid;"&gt;&lt;P id="AUTOGENBOOKMARK_44"&gt;Additional Details&lt;/P&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;A href="https://172.30.1.90/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Fadmin%2FAAA_Protocol%2FAAA_Diagnostics.rptdesign&amp;amp;rptAcsSessionId=sls-acs.slfiber.com%2F116213333%2F139&amp;amp;rptDay=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptSeverity=DEBUG&amp;amp;rptDiagnosticTimeRange=custom&amp;amp;__locale=en_US&amp;amp;iportalID=QHLVSY&amp;amp;__masterpage=false&amp;amp;__newWindow=false" id="AUTOGENBOOKMARK_45" name="AUTOGENBOOKMARK_45" style="display: block;" target="_self"&gt;Diagnostics&lt;/A&gt; &lt;A href="https://172.30.1.90/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Fadmin%2FACS_Instance%2FACS_Configuration_Audit.rptdesign&amp;amp;rptTimeRange=custom&amp;amp;rptEndDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;rptStartDate=01%2F20%2F2012+04%3A04%3A05.713+PM&amp;amp;__locale=en_US&amp;amp;iportalID=QHLVSY&amp;amp;__masterpage=false&amp;amp;__newWindow=false" id="AUTOGENBOOKMARK_46" name="AUTOGENBOOKMARK_46" style="display: block; padding-top: 1pt;" target="_self"&gt;ACS Configuration Changes&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 16:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832143#M198925</guid>
      <dc:creator>ghuey</dc:creator>
      <dc:date>2012-01-20T16:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: More "command authorization failed" issues</title>
      <link>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832144#M198930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you have "aaa authorization commands 15 default group tacacs+ if-authenticated" configured have you created the appropriate Command Set allowing ALL commands on the ACS and are you matching the appropriate authorization rule?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attaching an example of command authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this was helpful please rate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 17:56:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832144#M198930</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-20T17:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: More "command authorization failed" issues</title>
      <link>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832145#M198938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Carlos for the information, but I am still running into issues.&amp;nbsp; I have mainly been focusing on Profile Shells, but did attempt using Command Sets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the screenshots in your example it appears that you are using Command Sets only and no Profile Shells as part of your Policy rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I only use Command Sets my two test users from each of the test groups can log in, but now my superadmin user cannot go into "enable" mode using this example.&amp;nbsp; Here is the error, but I am confused as I removed the Shell Profile as a condition all together.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE id="AUTOGENBOOKMARK_1" style="margin-top: 0pt; width: 100%; empty-cells: show; margin-left: 5pt;"&gt;&lt;TBODY&gt;&lt;TR valign="top"&gt;&lt;TD&gt;&lt;DIV id="AUTOGENBOOKMARK_2" style="margin-top: 0pt; font-family: arial; margin-bottom: 2pt; font-size: 11pt; font-weight: bold;"&gt;Failure Reason &amp;gt; Authentication Failure Code&amp;nbsp; Lookup&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="white-space: nowrap;" valign="top"&gt;&lt;TD&gt; &lt;TABLE id="AUTOGENBOOKMARK_3" style="width: 100%; empty-cells: show;"&gt;&lt;TBODY&gt;&lt;TR valign="top"&gt;&lt;TD&gt;&lt;P id="AUTOGENBOOKMARK_4" style="padding-left: 1pt; font-family: arial; font-size: 10pt; padding-top: 1pt;"&gt;Failure Reason : &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV style="font-family: arial; font-size: 10pt;"&gt;13029&amp;nbsp; Requested privilege level too high&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD style="padding-bottom: 5pt; padding-top: 3pt;"&gt;&lt;DIV style="padding-bottom: 1pt; margin-top: 0pt; font-family: arial; color: gray; font-size: 10pt; border-top-color: #808080; border-top-width: 1px; border-top-style: dotted; padding-top: 3pt;"&gt;Generated&amp;nbsp; on:January 20, 2012 10:20:52 PM UTC&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD&gt; &lt;TABLE id="__TOC_0" style="border-bottom-color: #808080; border-bottom-style: solid; border-left-color: #808080; border-left-style: solid; width: 98%; font-family: sans-serif; empty-cells: show; font-size: small; border-top-color: #e3e3e3; border-right-color: #808080; border-right-style: solid; border-width: 1px; margin: 0pt;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="font-family: arial; color: #000000; font-size: 10pt; font-weight: bold;"&gt;&lt;TH style="border-bottom-color: #8499a2; border-bottom-width: 1px; border-left-color: #8499a2; border-left-width: thin; background-color: #d9e3e9; padding-left: 2pt; padding-right: 2pt; font-size: 10pt; border-top-color: #8499a2; border-top-width: 1px; border-right-color: #ffffff; border-right-width: 1px; padding-top: 1pt; border-style: solid;"&gt;&lt;P id="AUTOGENBOOKMARK_5" style="text-align: left; padding-left: 5pt; padding-top: 1pt;"&gt;Description&lt;/P&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="padding-left: 5pt; padding-top: 1pt;"&gt;The TACACS+&amp;nbsp; user requested a higher privilege level than the Maximum Privilege Level&amp;nbsp; configured in the Shell Profile&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD style="padding-top: 0pt;"&gt;&lt;TABLE id="__TOC_1" style="border-bottom-color: #808080; border-bottom-style: solid; border-left-color: #808080; border-left-style: solid; margin-top: 3pt; margin-right: 0pt; margin-bottom: 0pt; margin-left: 0pt; width: 98%; font-family: sans-serif; empty-cells: show; font-size: small; border-top-color: #e3e3e3; border-right-color: #808080; border-right-style: solid; border-width: 1px;"&gt;&lt;TBODY&gt;&lt;TR align="left" style="font-family: arial; color: #000000; font-size: 10pt; font-weight: bold;"&gt;&lt;TH style="border-bottom-color: #8499a2; border-left-color: #8499a2; background-color: #d9e3e9; padding-left: 2pt; padding-right: 2pt; font-size: 10pt; border-top-color: #8499a2; border-right-color: #ffffff; padding-top: 1pt; border-width: 1px; border-style: solid;"&gt;&lt;P id="AUTOGENBOOKMARK_6" style="text-align: left; padding-left: 5pt; padding-top: 1pt;"&gt;Resolution Steps&lt;/P&gt;&lt;/TH&gt; &lt;/TR&gt;&lt;TR align="left" style="padding-bottom: 1pt; background-color: #f5f9fd; padding-left: 2pt; padding-right: 2pt; color: #000000; padding-top: 1pt; border-width: thin; border-color: #8499a2;"&gt;&lt;TD style="padding-bottom: 2pt; padding-left: 4pt; padding-right: 4pt; padding-top: 2pt;"&gt;&lt;DIV style="padding-left: 5pt; padding-top: 1pt;"&gt;Check the&amp;nbsp; SelectedShellProfile attribute to verify that the expected Shell Profile was&amp;nbsp; selected by the Authorization policy&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 22:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832145#M198938</guid>
      <dc:creator>ghuey</dc:creator>
      <dc:date>2012-01-20T22:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: More "command authorization failed" issues</title>
      <link>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832146#M198944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to use Shell Profiles (Assigning Privilege level 15) and Command Sets allowing the appropriate commands for the restricted user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 00:03:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832146#M198944</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-24T00:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: More "command authorization failed" issues</title>
      <link>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832147#M198947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update...appears that I have the basics working although I am not real comfortable with the process.&amp;nbsp; First I removed all "aaa authorization" commands hoping that I could just deal with authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Changed this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication enable default group tacacs+ enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication enable default group tacacs+&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So aaa was only configured with the following lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa new-model&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication login default group tacacs+ local-case&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication enable default group tacacs+&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this change everything worked as expected.&amp;nbsp; My non-admin level users were stuck at priv 1 and could not change to enable mode.&amp;nbsp; My admin level user could switch to enable mode and run all privileged commands.&amp;nbsp; Not really understanding why that worked I set the changed line back by adding "enable" on the end again and everything continued to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I am really at a loss as to what happened, and I am concerned that there is something else going on to give me these inconsistent results.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 15:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/more-quot-command-authorization-failed-quot-issues/m-p/1832147#M198947</guid>
      <dc:creator>ghuey</dc:creator>
      <dc:date>2012-01-24T15:55:23Z</dc:date>
    </item>
  </channel>
</rss>

