<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prevent access to config command in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581751#M257877</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry i forgot to mention that. I am using the following versions on my hub and branch routers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c180x-adventerprisek9-mz.124-20.T&lt;/P&gt;&lt;P&gt;c1841-advsecurityk9-mz.124-20.T&lt;/P&gt;&lt;P&gt;c3845-advsecurityk9-mz.124-22.T2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly guide me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 31 Jan 2011 08:39:22 GMT</pubDate>
    <dc:creator>Jonn cos</dc:creator>
    <dc:date>2011-01-31T08:39:22Z</dc:date>
    <item>
      <title>Prevent access to config command</title>
      <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581749#M257875</link>
      <description>&lt;P&gt;Hi all experts .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know its a very common question but pls guide me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have created a username "Support" and want to allow him full view of running configuration and any show command he runs. But he should'nt be able to enter config mode to prevent him from doing any configuration. I dont want to use role based views, is there any simple aaa command for that ? if not then surely i have to use role based views&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581749#M257875</guid>
      <dc:creator>Jonn cos</dc:creator>
      <dc:date>2019-03-11T00:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent access to config command</title>
      <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581750#M257876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version of what operating system are you running (e.g., IOS, NX-OS...)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jan 2011 18:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581750#M257876</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2011-01-30T18:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent access to config command</title>
      <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581751#M257877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry i forgot to mention that. I am using the following versions on my hub and branch routers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c180x-adventerprisek9-mz.124-20.T&lt;/P&gt;&lt;P&gt;c1841-advsecurityk9-mz.124-20.T&lt;/P&gt;&lt;P&gt;c3845-advsecurityk9-mz.124-22.T2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly guide me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 08:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581751#M257877</guid>
      <dc:creator>Jonn cos</dc:creator>
      <dc:date>2011-01-31T08:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent access to config command</title>
      <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581752#M257878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are you using as authentication server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can configure read only access via ACS. the following link describes the same:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#scenario2"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml#scenario2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: please mark this thread as resolved if you feel your query is answered.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 08:50:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581752#M257878</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-01-31T08:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent access to config command</title>
      <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581753#M257879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured restrictions through ACS. But i am considering the scenario in which link to ACS fails and user needs to login via local account. In that case i want to prevent him from enter config mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly guide me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 04:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581753#M257879</guid>
      <dc:creator>Jonn cos</dc:creator>
      <dc:date>2011-02-01T04:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent access to config command</title>
      <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581754#M257880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;These commands are required on an IOS router or switch in order to implement command authorization through an ACS server:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa new-model&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization config-commands&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 0 default&amp;nbsp; group tacacs+ local&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 1 default&amp;nbsp; group tacacs+ local&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 15 default group tacacs+ local&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tacacs-server host 1.1.1.1&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tacacs-server key cisco123&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Now if tacacs goes down and you want user to deny access to config mode. Please try this;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;username john privilege 7 password doe&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;privilege exec level 8 configure terminal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Please make sure that the user privilege should always less then the command privilege in order to restrict it via local database.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Rgds, Jatin&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Do rate helpful posts~&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 05:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581754#M257880</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2011-02-01T05:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent access to config command</title>
      <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581755#M257881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls let me clear my requirement again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to assign user rights to view complete running configuration, but he should'nt be able enter config mode. I want to configure this on cli. I am using ACS but please forget it for a moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i do this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username support priv 14 secret cisco123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now when i login using above username, i enter directly priv 14. When i type sh run, it gives me authorization failed. Please i want to do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to restrict access to config term command but should be able to view complete running config&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 05:03:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581755#M257881</guid>
      <dc:creator>Jonn cos</dc:creator>
      <dc:date>2011-02-02T05:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent access to config command</title>
      <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581756#M257882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Well, you're talking about LOCAL authorization now in this case you have two options&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;1.]&amp;nbsp; Either increase the privelege level of the local user to 15&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;username support priv 15 secret cisco123&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;2.] Or decrease the privelege level of SH RUN command to 14 like this;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;privilege exec level 14 show running &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;NOTE: SH RUN is a level 15 command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;Rgds,&amp;nbsp; Jation&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Do rate helpful posts~&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 09:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581756#M257882</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2011-02-02T09:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent access to config command</title>
      <link>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581757#M257883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jonn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you are doing good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IOS is designed in a manner that there are priv for both the commands and the user.&lt;/P&gt;&lt;P&gt;A command can be executed by a user if the priv level of the command is same or lower than the users priviliedge level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show running-config is a command of priv level 15. The user created by you has priv level 14.&lt;/P&gt;&lt;P&gt;As the priv level of the user is less than that of the command, the command cannot be executed by that user.Hence the IOS will throw an error of "authorization failed".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we wish to accomplish your requirement, then there are two options:&lt;/P&gt;&lt;P&gt;1. lower the priv of the command&lt;/P&gt;&lt;P&gt;2. increase the priv of the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this makes a few things clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- do rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 15:19:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/prevent-access-to-config-command/m-p/1581757#M257883</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-02-02T15:19:32Z</dc:date>
    </item>
  </channel>
</rss>

