<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS 5.2 commands Authorization in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656698#M248500</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My bad. I totally missed your original question. I thought you wanted to give views to ACS CLI users.&lt;/P&gt;&lt;P&gt;The confusion came from the fact that you didn't mention what was the aaa client ...&lt;/P&gt;&lt;P&gt;Apologies for what I said so far then, I was understanding sth else&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 May 2011 13:37:55 GMT</pubDate>
    <dc:creator>Nicolas Darchis</dc:creator>
    <dc:date>2011-05-17T13:37:55Z</dc:date>
    <item>
      <title>ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656674#M248476</link>
      <description>&lt;P&gt;Greetings!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a conceptual question bout CLI command authorization. We have ASC 5.2 up and running, providing AAA services for network devices. Now I need to make&amp;nbsp; profiles for users in certain group to restrict dem CLI "rights" to &lt;STRONG&gt;show&lt;/STRONG&gt;,&lt;STRONG&gt; clear counters &lt;/STRONG&gt;and &lt;STRONG&gt;show running-config &lt;/STRONG&gt;commands. Could you please provide me link to some workflow I need to accomplish dis task. For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should clrete separate privillege levele profile (let it be 2), specify commands at this level, assign Group this Authorization Prifile and make some additional changes in my devices (I meen "aaa authorization...." commands). Appreciate any link to documentation or live examples. Give Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jah Rastafari bless &amp;amp; protect you I&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656674#M248476</guid>
      <dc:creator>Dmitry Samko</dc:creator>
      <dc:date>2019-03-11T01:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656675#M248477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can simply do the following :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-On acs, define a shell profile and a command set for each of the different scenarios you have, allowing different commands.&lt;/P&gt;&lt;P&gt;-On acs still, in the authorization menu of your access policy (by default, it will go to "default device admin" normally), hit "customize" and chose that you want to assign both a command set and shell profile in the result.&lt;/P&gt;&lt;P&gt;-Create an authorization rule (if user group =x or y, then I assign this command set and shell profile)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're good to go !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For any details on the above, I simply suggest the ACS user guide&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 May 2011 04:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656675#M248477</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-11T04:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656676#M248478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Nicolas&lt;/STRONG&gt;, what AAA config commands should I use in advanced in network devices?&lt;/P&gt;&lt;P&gt;Thank you man.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 May 2011 07:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656676#M248478</guid>
      <dc:creator>Dmitry Samko</dc:creator>
      <dc:date>2011-05-11T07:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656677#M248479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well it depends on what device it is and what ios version it's running and if you do tacacs or radius ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;usually aaa authorization commands 1 ... aaa authorization commands 15 and aaa authorization enable ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 May 2011 09:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656677#M248479</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-11T09:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656678#M248480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Allright, look now. There are 6 screenShots. Let's see my steps below.&lt;/P&gt;&lt;P&gt;Shot1 - I create "Shell Profile", named &lt;STRONG&gt;Enable 2&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;Shot2 - create "Commands Sets" named &lt;STRONG&gt;Allow Show RunnConfig.&lt;/STRONG&gt; For simplicity there is only "Allow show *"&lt;/P&gt;&lt;P&gt;Shot3 - create "Default Device Admin -&amp;gt; Authorization" policy named &lt;STRONG&gt;Network-3&lt;/STRONG&gt;. I assign Shell profile there.&lt;SPAN style="text-decoration: underline;"&gt; Seems, this step is unnecessary, &lt;/SPAN&gt;but just fi sure.&lt;/P&gt;&lt;P&gt;Shot4 - create "Device Administration -&amp;gt; Authorization" policy named &lt;STRONG&gt;IT Noc&lt;/STRONG&gt;. I assign Shell and Command profiles there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the user from target AD grop try to vty login to the network device authentication successed. But Authorization is failed, none of typed command is authorized. Here is the log from "Monitoring and Report" TACACS+ Authorization. Target username is "&lt;STRONG&gt;rk&lt;/STRONG&gt;########"&lt;/P&gt;&lt;P&gt;Shot5 - General log&lt;/P&gt;&lt;P&gt;Shot6 - Detailed log record. As you can see, "Matched Command Set" is empty (!!!) fi dis user, but "Selected Command Set" is &lt;STRONG&gt;Allow Show RunnConfig&lt;/STRONG&gt; (OK); "Autherization Policy Matched Rule" is &lt;STRONG&gt;IT Noc&lt;/STRONG&gt; (OK).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition, here is aaa commands from Cisco L3 Switch.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group ACS local &lt;BR /&gt;aaa authorization commands 0 default group ACS local &lt;BR /&gt;aaa authorization commands 1 default group ACS local &lt;BR /&gt;aaa authorization commands 2 default group ACS &lt;BR /&gt;aaa authorization commands 15 default group ACS local &lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please, have a look!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2011 08:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656678#M248480</guid>
      <dc:creator>Dmitry Samko</dc:creator>
      <dc:date>2011-05-12T08:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656679#M248481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your 5th screenshot shows that "Show running-config" was authorized by ACS. That's expected.&lt;/P&gt;&lt;P&gt;The 6th screenshot shows the command "exit" that was not authorized. Which is normal since your command set only allows "show *".&lt;/P&gt;&lt;P&gt;So I don't see what the problem is &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2011 09:06:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656679#M248481</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-12T09:06:45Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656680#M248482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Problem is that ACS doesn't authorize (I meen allow) any command. No &lt;STRONG&gt;show run&lt;/STRONG&gt;, nor &lt;STRONG&gt;show interfaces&lt;/STRONG&gt; neither &lt;STRONG&gt;show priv&lt;/STRONG&gt; etc. Do you get me?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2011 11:30:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656680#M248482</guid>
      <dc:creator>Dmitry Samko</dc:creator>
      <dc:date>2011-05-12T11:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656681#M248483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see a "show running-config" in green, so it looked authorized.&lt;/P&gt;&lt;P&gt;If so, please provide a screenshot of a "show' command that was supposed to be authorized and wasn't.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2011 11:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656681#M248483</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-12T11:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656682#M248484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No man, this is for another user in another group, foget about it. As I mention befor, interesting user is &lt;STRONG&gt;rk&lt;/STRONG&gt;#####. So, please concentrate around the Shot6 - it's detailded problem description. The screeen is about &lt;STRONG&gt;exit&lt;/STRONG&gt; command, but be sure that there is the same error about &lt;STRONG&gt;show priv&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you understand my goal? I just wanna creatre profiles for NOC team with only &lt;STRONG&gt;show&lt;/STRONG&gt; * commands (&lt;STRONG&gt;show config&lt;/STRONG&gt; also). Of cource there should be allowed such commands as &lt;STRONG&gt;exit&lt;/STRONG&gt;. Do you heve hands-on experience with dis kind of situation?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2011 11:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656682#M248484</guid>
      <dc:creator>Dmitry Samko</dc:creator>
      <dc:date>2011-05-12T11:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656683#M248485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I perfeclty understand what you are trying to achieve. But you don't seem to understand my point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say that ACS denies "show" commands when it should authorize them. Fine, I believe. But show us a screenshot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 6th screenshot you sent is for the command "Exit" where ACS was correct in denying it !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So how can people help if you show them screenshots of something that is expected, while the unexpected behavior is not seen on screenshots.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like to see the reason why ACS rejects your show commands, but if you don't show that, I'm not sure how can people help you ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My experience with "this kind of solution" is 4 years supporting ACS in TAC, so I think I have it covered.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2011 12:02:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656683#M248485</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-12T12:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656684#M248486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, excuse if I seems you rude. 4 years in cisco TAC you should be cool, no doubt.&lt;/P&gt;&lt;P&gt;There are my troubleShots.&lt;/P&gt;&lt;P&gt;Thank you for help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2011 14:33:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656684#M248486</guid>
      <dc:creator>Dmitry Samko</dc:creator>
      <dc:date>2011-05-12T14:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656685#M248487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just tested it in my lab.&lt;/P&gt;&lt;P&gt;The trick is that to allow all show commands, your command set should permit "Show" and no argument mentionned.&lt;/P&gt;&lt;P&gt;What you permitted is "show *" which doesn't exist. the * is not a wildcard in the command set. "any argument" is achieved by leaving the argument field blank.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Nicolas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 May 2011 17:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656685#M248487</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-14T17:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656686#M248488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very nice, Thank you man.&lt;/P&gt;&lt;P&gt;The next question is what should I write in "Command Sets" section to authorize such commands as:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show running-config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;clear counters&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;clear access-list counters&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;P&gt;I have tried both cases: &lt;STRONG&gt;clear&lt;/STRONG&gt; as a command and &lt;STRONG&gt;counters&lt;/STRONG&gt; as an argument and &lt;STRONG&gt;clear counters&lt;/STRONG&gt; as a single command. None of it works. And what about &lt;STRONG&gt;show running-config&lt;/STRONG&gt;, I can't make it work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advanced.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 May 2011 08:31:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656686#M248488</guid>
      <dc:creator>Dmitry Samko</dc:creator>
      <dc:date>2011-05-16T08:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656687#M248489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;???&lt;/P&gt;&lt;P&gt;If you permit "show" with no arguments, that means that "Show running-config" is already allowed implicitly. So not sure why you're adding that one too ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a test command set where I just allowed command "show" with arguments "running-config" and I could do a show run on the switch but a show start was forbidden for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So all working as explained above&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 May 2011 12:35:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656687#M248489</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-16T12:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656688#M248490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To be clear, I use command sets just like in shot10, but it doesn't works for show running. Moreover, when I type&lt;/P&gt;&lt;P&gt;# &lt;STRONG&gt;show running-config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;on switch CLI it says - Invalid command and there are no attempts to authorize it on ACS - I don't see this commands in AAA Tacacs Authorization logs. But I can see successfull authorized commands such as &lt;STRONG&gt;show priv&lt;/STRONG&gt; or &lt;STRONG&gt;telnet&lt;/STRONG&gt; in logs. What it could be?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I remind you that I use Prive Level = &lt;STRONG&gt;2&lt;/STRONG&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 May 2011 12:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656688#M248490</guid>
      <dc:creator>Dmitry Samko</dc:creator>
      <dc:date>2011-05-16T12:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656689#M248491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;then show run is not available at privilege level 2 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This goes too detailed on the switch for me to give assured advices. But if the request is not coming to ACS, don't bother wondering about yoru command set, check the switch itself&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 May 2011 13:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656689#M248491</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-16T13:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656690#M248492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Allright, so could you please tell me what minimal Priv Level allow &lt;STRONG&gt;show running-config&lt;/STRONG&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 May 2011 13:10:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656690#M248492</guid>
      <dc:creator>Dmitry Samko</dc:creator>
      <dc:date>2011-05-16T13:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656691#M248493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My sentence "This goes too detailed on the switch for me to give assured advices" was a kind way of saying "I don't know, don't ask me"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 May 2011 13:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656691#M248493</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-16T13:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656692#M248494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry everyone for interrupting this thread in this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created the thread "&lt;A href="https://community.cisco.com/message/3350884#3350884"&gt;Cisco ACS 5.2 and Role-base CLI views&lt;/A&gt;", but no one has replied in regards to the problem that am having.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the thread on this topic seems similar to the topic on my thread,I believe that someone may have the knowledge to give me some directions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance, and I apologize again for this interruption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alejandro.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 02:40:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656692#M248494</guid>
      <dc:creator>Alejandro Ruiz</dc:creator>
      <dc:date>2011-05-17T02:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.2 commands Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656693#M248495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alejandro, I don't think there is any role or privilege or command authorization for ACS cli user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 05:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-2-commands-authorization/m-p/1656693#M248495</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-05-17T05:43:35Z</dc:date>
    </item>
  </channel>
</rss>

