<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Shell Command Authorization Sets ACS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669050#M294566</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ACS 4 or 5 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ACS, do you see authorization logs where the switch tries to ask for authorization for each command typed ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Apr 2011 12:16:48 GMT</pubDate>
    <dc:creator>Nicolas Darchis</dc:creator>
    <dc:date>2011-04-29T12:16:48Z</dc:date>
    <item>
      <title>Shell Command Authorization Sets ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669049#M294564</link>
      <description>&lt;P&gt;&lt;SPAN&gt;hi i followed this guide step by step &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;but still all my user&amp;nbsp; can use all the commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;STRONG&gt;!&lt;BR /&gt; version 12.4&lt;BR /&gt; service timestamps debug datetime msec&lt;BR /&gt; service timestamps log datetime msec&lt;BR /&gt; no service password-encryption&lt;BR /&gt; !&lt;BR /&gt; hostname R3&lt;BR /&gt; !&lt;BR /&gt; boot-start-marker&lt;BR /&gt; boot-end-marker&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; aaa new-model&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; aaa authentication login milista group tacacs+ local&lt;BR /&gt; aaa authorization config-commands&lt;BR /&gt; aaa authorization exec default group tacacs+ local&lt;BR /&gt; aaa authorization commands 0 default group tacacs+ local&lt;BR /&gt; aaa authorization commands 1 default group tacacs+ local&lt;BR /&gt; aaa authorization commands 15 default group tacacs+ local&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; aaa session-id common&lt;BR /&gt; memory-size iomem 5&lt;BR /&gt; ip cef&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; no ip domain lookup&lt;BR /&gt; ip auth-proxy max-nodata-conns 3&lt;BR /&gt; ip admission max-nodata-conns 3&lt;BR /&gt; !&lt;BR /&gt; multilink bundle-name authenticated&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; username admin privilege 15 secret 5 $1$CS17$3oeNpzTvJAyZTvOUP2qyB1&lt;BR /&gt; archive&lt;BR /&gt; log config&lt;BR /&gt; hidekeys&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; interface FastEthernet0/0&lt;BR /&gt; ip address 192.168.20.1 255.255.255.0&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; !&lt;BR /&gt; interface Serial0/0&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; clock rate 2000000&lt;BR /&gt; !&lt;BR /&gt; interface FastEthernet0/1&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; !&lt;BR /&gt; interface Serial0/1&lt;BR /&gt; ip address 20.20.20.2 255.255.255.252&lt;BR /&gt; clock rate 2000000&lt;BR /&gt; !&lt;BR /&gt; interface Serial0/2&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; clock rate 2000000&lt;BR /&gt; !&lt;BR /&gt; interface Serial0/3&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; clock rate 2000000&lt;BR /&gt; !&lt;BR /&gt; router eigrp 1&lt;BR /&gt; network 20.0.0.0&lt;BR /&gt; network 192.168.20.0&lt;BR /&gt; no auto-summary&lt;BR /&gt; !&lt;BR /&gt; ip forward-protocol nd&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; no ip http server&lt;BR /&gt; no ip http secure-server&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; tacacs-server host 192.168.20.2 key cisco&lt;BR /&gt; !&lt;BR /&gt; control-plane&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; line con 0&lt;BR /&gt; exec-timeout 0 0&lt;BR /&gt; logging synchronous&lt;BR /&gt; login authentication milista&lt;BR /&gt; line aux 0&lt;BR /&gt; line vty 0 4&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; end&lt;BR /&gt; &lt;BR /&gt; &lt;/STRONG&gt;i copy the authorization commands from the cisco forum and follow&amp;nbsp; the steps but no thing all my users have full access to all commands&lt;STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; heres my share profile&lt;BR /&gt; &lt;BR /&gt; name-------------admin jr&lt;BR /&gt; &lt;BR /&gt; Description---------for jr admin&lt;BR /&gt; &lt;BR /&gt; unmatched commands------- &lt;SPAN style="color: red;"&gt;()permit&amp;nbsp; (x)deny&lt;BR /&gt; &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG style="color: red; "&gt;permint unmatched args()&lt;/STRONG&gt;&lt;BR /&gt; &lt;STRONG&gt; &lt;BR /&gt; enable &lt;BR /&gt; show -------------------------- permit version&amp;lt;cr&amp;gt;&lt;BR /&gt; permit runnig-config&amp;lt;cr&amp;gt;&lt;BR /&gt; &lt;BR /&gt; &lt;/STRONG&gt;&lt;BR /&gt; then i add this profifle to group 2 and then i add my user to the group 2&lt;BR /&gt; &lt;BR /&gt; then i log in to the router enter with the user and i still can use ALL the commands i dont know what i am doign bad any idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you&amp;nbsp; give me&amp;nbsp; if you can a guide to setup authorization with ACS i cant find any good guide&amp;nbsp; jeremy from CBT gives a example but just for authentication i am lost&amp;nbsp; i am battling with this&amp;nbsp; prblem since wednesday without luck&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:02:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669049#M294564</guid>
      <dc:creator>Gerson Acevedo</dc:creator>
      <dc:date>2019-03-11T01:02:26Z</dc:date>
    </item>
    <item>
      <title>Re: Shell Command Authorization Sets ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669050#M294566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ACS 4 or 5 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ACS, do you see authorization logs where the switch tries to ask for authorization for each command typed ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Apr 2011 12:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669050#M294566</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-04-29T12:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: Shell Command Authorization Sets ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669051#M294569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is 4.2 for server 2003&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and is a router my device and abouit the logs i am not using accounting&amp;nbsp; in my router yet that was the next step in my configuration but i am stuck here with authorization&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Apr 2011 12:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669051#M294569</guid>
      <dc:creator>Gerson Acevedo</dc:creator>
      <dc:date>2011-04-29T12:52:55Z</dc:date>
    </item>
    <item>
      <title>Re: Shell Command Authorization Sets ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669052#M294571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I didn't say accounting. What do you see in "Tacacs authorization" logs on acs ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Apr 2011 13:19:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669052#M294571</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-04-29T13:19:36Z</dc:date>
    </item>
    <item>
      <title>Re: Shell Command Authorization Sets ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669053#M294572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;excuse i cant find that option in the acs where is it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Apr 2011 13:31:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669053#M294572</guid>
      <dc:creator>Gerson Acevedo</dc:creator>
      <dc:date>2011-04-29T13:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Shell Command Authorization Sets ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669054#M294574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;reports and activity -&amp;gt; Tacacs+ administration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Apr 2011 13:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669054#M294574</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-04-29T13:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: Shell Command Authorization Sets ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669055#M294576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;its in blank nothin appears&amp;nbsp; neither in the passed authentification log weird but ican log in using the tacacs+ all&amp;nbsp; my users there works&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Apr 2011 13:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669055#M294576</guid>
      <dc:creator>Gerson Acevedo</dc:creator>
      <dc:date>2011-04-29T13:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Shell Command Authorization Sets ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669056#M294578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"you are testing with privilege level 15 or below 15. Because when you are using below 15 level user, first it will check local command authorization set. For example if you want to execute sh runn command with level 5 user, first it will check local command set. If the sh runn command exits in local command set then it will send request to ACS. If it is not in the command set, it won't send request to ACS. That's why you don't see debug. For 15 level users it will directly send request to ACS. Configure command set locally and try it should work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        Correct me if I am wrong."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Vamsi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Apr 2011 16:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669056#M294578</guid>
      <dc:creator>Vamsi Pinnaka</dc:creator>
      <dc:date>2011-04-30T16:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: Shell Command Authorization Sets ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669057#M294580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;solve it it didnt work the first time because i try it with the console after i try this config via telnet (log in) my users cant use all commands just the commands i added to the shell list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this config works&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 May 2011 04:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/shell-command-authorization-sets-acs/m-p/1669057#M294580</guid>
      <dc:creator>Gerson Acevedo</dc:creator>
      <dc:date>2011-05-02T04:18:39Z</dc:date>
    </item>
  </channel>
</rss>

