<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enable Password Issues with ACS 5.1 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/enable-password-issues-with-acs-5-1/m-p/1536929#M254369</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jesse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That makes perfect sense.&amp;nbsp; And as I thought, I'm kicking myself for not realising it earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks alot for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Duncan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Nov 2010 00:24:27 GMT</pubDate>
    <dc:creator>Duncan Watson</dc:creator>
    <dc:date>2010-11-09T00:24:27Z</dc:date>
    <item>
      <title>Enable Password Issues with ACS 5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-password-issues-with-acs-5-1/m-p/1536927#M254352</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing this one will be quite straightforward, but so far I just can't make this work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two Tacacs+ accounts- admin (lvl 15) and troubleshoot (lvl 2), with authentication and authorization being performed on the ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ACS I have configured account-specific login and enable mode passwords.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Cisco device configs are as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login CONSOLE none&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization commands 2 default group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+&lt;/P&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;tacacs-server host x.x.x.x key TACACS&lt;/DIV&gt;&lt;DIV&gt;tacacs-server directed-request&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;enable secret 5 xxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I login as the admin account it works beautifully.&amp;nbsp; I am placed directly into privileged exec mode and have full level 15 access.&amp;nbsp; I confirmed the ACS server is being referenced correctly with both 'debug tacacs' on the switch and Tacacs Authorization reports on the ACS itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, when I login as 'troubleshoot', even though I am immediately shown the '#' enable prompt I only have standard user-mode commands.&amp;nbsp; Output from 'debug tacacs' shows that the correct shell profile (lvl 2) has been assigned by the ACS and I'm seeing the relevant command set being referenced in the authorization reports (as per attached screenshot).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I type 'enable' to move into privileged exec mode, the account has access to all commands permitted by the command set (in other words, it works fine).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in summary, I guess my request is:&lt;/P&gt;&lt;P&gt;How to get the ACS to place me into 'privileged exec' mode as soon as I login with a level 2 shell profile (rather than having to manually enter this mode)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Duncan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:33:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-password-issues-with-acs-5-1/m-p/1536927#M254352</guid>
      <dc:creator>Duncan Watson</dc:creator>
      <dc:date>2019-03-11T00:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: Enable Password Issues with ACS 5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-password-issues-with-acs-5-1/m-p/1536928#M254356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Duncan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If you are going to do command authorization against ACS then you don't need to assign level 2, you will assign level 15 and then all commands are authorized against the ACS to determine if that user is allowed to run that command or not.&amp;nbsp; If you pass level 2 then only commands that are at level 2 or below will be shown to the user.&lt;/P&gt;&lt;P&gt;--Jesse&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Nov 2010 20:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-password-issues-with-acs-5-1/m-p/1536928#M254356</guid>
      <dc:creator>jedubois</dc:creator>
      <dc:date>2010-11-08T20:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: Enable Password Issues with ACS 5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-password-issues-with-acs-5-1/m-p/1536929#M254369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jesse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That makes perfect sense.&amp;nbsp; And as I thought, I'm kicking myself for not realising it earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks alot for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Duncan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Nov 2010 00:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-password-issues-with-acs-5-1/m-p/1536929#M254369</guid>
      <dc:creator>Duncan Watson</dc:creator>
      <dc:date>2010-11-09T00:24:27Z</dc:date>
    </item>
  </channel>
</rss>

