<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tacacs+ in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs/m-p/3800235#M24943</link>
    <description>I have no experience with Clearbox, and this would probably be a better question for their support team/forums.  &lt;BR /&gt;&lt;BR /&gt;As an example, to do this with Cisco ACS or ISE you create an authorization rule that provides a limited command set and shell profile. You typically identify and match on the users AD group or local account group membership in combination with the device types/locations.&lt;BR /&gt;&lt;BR /&gt;You then create a second authorization rule for the same devices providing rear/write access with it's own associated command set and shell profile.  &lt;BR /&gt;&lt;BR /&gt;You need to figure out how Clearbox implements authorization rules, command sets, and shell profiles.</description>
    <pubDate>Tue, 12 Feb 2019 16:15:47 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2019-02-12T16:15:47Z</dc:date>
    <item>
      <title>Tacacs+</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs/m-p/3800065#M24941</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;I need some help please,&lt;/P&gt;&lt;P&gt;I configured tacacs+ in a clearbox and I configured one cisco switch testing. I have created some users and all of them can login to the switch.The problem is that all of them can access to configuration terminal which is privilege 15 but I need some of them to do show commands only !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;my regads&lt;/P&gt;&lt;P&gt;Salim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 13:33:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs/m-p/3800065#M24941</guid>
      <dc:creator>abuhwra</dc:creator>
      <dc:date>2019-02-12T13:33:54Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs+</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs/m-p/3800235#M24943</link>
      <description>I have no experience with Clearbox, and this would probably be a better question for their support team/forums.  &lt;BR /&gt;&lt;BR /&gt;As an example, to do this with Cisco ACS or ISE you create an authorization rule that provides a limited command set and shell profile. You typically identify and match on the users AD group or local account group membership in combination with the device types/locations.&lt;BR /&gt;&lt;BR /&gt;You then create a second authorization rule for the same devices providing rear/write access with it's own associated command set and shell profile.  &lt;BR /&gt;&lt;BR /&gt;You need to figure out how Clearbox implements authorization rules, command sets, and shell profiles.</description>
      <pubDate>Tue, 12 Feb 2019 16:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs/m-p/3800235#M24943</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-02-12T16:15:47Z</dc:date>
    </item>
  </channel>
</rss>

