<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using AD credential for device management. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827597#M212938</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mejia, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You reply is the right answer, i create another rule and lookup usisng AD external group for authentication. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your advice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 13 Jan 2012 04:32:31 GMT</pubDate>
    <dc:creator>yong khang NG</dc:creator>
    <dc:date>2012-01-13T04:32:31Z</dc:date>
    <item>
      <title>Using AD credential for device management.</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827594#M212932</link>
      <description>&lt;P&gt;Hi , &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I trying to set the identity source to use Active Directory's reside credential as the method for authentication. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connection between AD and ACS was establish and connected. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem statement:-&lt;/P&gt;&lt;P&gt;The moment i trying to telnet from remote site, i able to proceed on first state username-password authentication, but once come to enable password, it prompt me authentication failure even with the right password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The error log for this case is "13029 Requested privilege level too high"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i switch the identity source to local it won't have such problem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Platform for these case is&lt;/P&gt;&lt;P&gt;- C6500 with IOS 12.2(33) SXJ1&lt;/P&gt;&lt;P&gt;- ACS 5.2.0.26&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, at ACS, i set the identity store at access policies &amp;gt; access_name &amp;gt; identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Device administration &amp;gt; shell profile in use setting the default privilege and maximum privelege to value 15. The name of sthe shell profiles is "full_privilege"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is my switch config snipet:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TAC_PLUS&lt;/P&gt;&lt;P&gt; server name AUTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs server AUTH&lt;/P&gt;&lt;P&gt; address ipv4 10.10.21.251&lt;/P&gt;&lt;P&gt; key xxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login TAC_PLUS group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group TAC_PLUS none&lt;/P&gt;&lt;P&gt;aaa authorization exec TAC_PLUS group tacacs+ if-authenticated &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 TAC_PLUS group tacacs+ local &lt;/P&gt;&lt;P&gt;aaa authorization network TAC_PLUS group tacacs+ local &lt;/P&gt;&lt;P&gt;aaa accounting update periodic 1&lt;/P&gt;&lt;P&gt;aaa accounting exec TAC_PLUS start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting network TAC_PLUS start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting connection TAC_PLUS start-stop group tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please advice, thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827594#M212932</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2019-03-11T01:42:33Z</dc:date>
    </item>
    <item>
      <title>Using AD credential for device management.</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827595#M212934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you mentioned that it works fine for Internal ACS Users, can you check the Authorization Condition you have in order to return Privilege Level 15 for the users?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, if Internal Users ID Store works fine then the Authorization Condition might be pointing to an Internal ACS Attribute Condition like Identity Groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When changing to AD then the Identity Group rule might not be matched, therefore, getting to the Default Deny Access rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check the Authorization rules for the appropriate Access Service and confirm that a valid rule is created for AD users as well in order to return the appropriate privilege lever.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 17:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827595#M212934</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-01-11T17:39:11Z</dc:date>
    </item>
    <item>
      <title>Using AD credential for device management.</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827596#M212936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Sorry for late reply. I am staying at GMT+8 timezone, i guess there's a gap of time matter. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you request, i attact the snapshot for you to refer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/2/3/72320-04.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/1/3/72319-03.png" class="jive-image" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/1/3/72318-02.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/1/3/72317-01.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the switch the aaa config can found from above thread. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Million thanks&amp;nbsp; !!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 11:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827596#M212936</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2012-01-12T11:43:26Z</dc:date>
    </item>
    <item>
      <title>Using AD credential for device management.</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827597#M212938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mejia, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You reply is the right answer, i create another rule and lookup usisng AD external group for authentication. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your advice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jan 2012 04:32:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827597#M212938</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2012-01-13T04:32:31Z</dc:date>
    </item>
    <item>
      <title>Using AD credential for device management.</title>
      <link>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827598#M212940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Noel, I have a similar problem as yours, I'm trying to fix with your comments but I have a doubt, could you please paste a print screen of your Access Policies profile named "Device Admin", I appreciate a lot your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 23:10:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-ad-credential-for-device-management/m-p/1827598#M212940</guid>
      <dc:creator>Juan Carlos Arias Perez</dc:creator>
      <dc:date>2012-01-16T23:10:53Z</dc:date>
    </item>
  </channel>
</rss>

