<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.3 - TACACS+ command authorization in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944954#M300117</link>
    <description>&lt;P&gt;I'm doing an eval of ACS 5.3 for a client and i'm trying to integrate one of the routers into it using TACACS+.&amp;nbsp; I had the authentication working with an internal user.&amp;nbsp; when i went back in and added the authorization parts though, now i'm locked down to the enable prompt and can't do anything...trying to make sense of the documentation on how to assign the command sets, etc. to my test user, but it doesn't make any sense (this is some of the lousier documentation i've seen for a while...).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any thoughts on what to do to get the command sets to work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SJ&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 02:01:37 GMT</pubDate>
    <dc:creator>sjones@techsgi.com</dc:creator>
    <dc:date>2019-03-11T02:01:37Z</dc:date>
    <item>
      <title>ACS 5.3 - TACACS+ command authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944954#M300117</link>
      <description>&lt;P&gt;I'm doing an eval of ACS 5.3 for a client and i'm trying to integrate one of the routers into it using TACACS+.&amp;nbsp; I had the authentication working with an internal user.&amp;nbsp; when i went back in and added the authorization parts though, now i'm locked down to the enable prompt and can't do anything...trying to make sense of the documentation on how to assign the command sets, etc. to my test user, but it doesn't make any sense (this is some of the lousier documentation i've seen for a while...).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any thoughts on what to do to get the command sets to work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SJ&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944954#M300117</guid>
      <dc:creator>sjones@techsgi.com</dc:creator>
      <dc:date>2019-03-11T02:01:37Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 - TACACS+ command authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944955#M300118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; could you please post your acs config and your router config ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2012 02:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944955#M300118</guid>
      <dc:creator>Eduardo Aliaga</dc:creator>
      <dc:date>2012-04-24T02:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 - TACACS+ command authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944956#M300119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Don’t mean to be ignorant about this, but is there a way to export the config from ACS?  Router config section is below…I’ve used this successfully with 4.2 several times…&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip tacacs source-interface gi 0/0&lt;/P&gt;&lt;P&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;tacacs-server key &lt;/P&gt;&lt;P&gt;tacacs-server host x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentic login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentic login no-tacacs none&lt;/P&gt;&lt;P&gt;aaa authentic enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa author config-commands&lt;/P&gt;&lt;P&gt;aaa author exec default if-authenticated&lt;/P&gt;&lt;P&gt;aaa author commands 1 default if-authenticated&lt;/P&gt;&lt;P&gt;aaa author commands 15 default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa author console&lt;/P&gt;&lt;P&gt;aaa account exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa account commands 0 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa account commands 1 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa account commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa account connection default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa account system default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2012 13:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944956#M300119</guid>
      <dc:creator>sjones@techsgi.com</dc:creator>
      <dc:date>2012-04-24T13:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.3 - TACACS+ command authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944957#M300120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; as a follow up...i'm looking at ACS now.&amp;nbsp; The way i have it setup is using the default 'permit all' for the device authorizations, shell profile, command&amp;nbsp; sets, etc.&amp;nbsp; It should let whatever commands i run through.&amp;nbsp; But, all i see on the router is 'command authorization failed'.&amp;nbsp; I can't even reload the thing now...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a document somewhere that goes through step-by-step?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2012 14:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944957#M300120</guid>
      <dc:creator>sjones@techsgi.com</dc:creator>
      <dc:date>2012-04-26T14:08:21Z</dc:date>
    </item>
    <item>
      <title>ACS 5.3 - TACACS+ command authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944958#M300121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To get in you can change the shared secret in ACS so that the router will go into local mode, or you can just change the ip address of the router so ACS doesnt respond. That will let you in the router using your local credentials.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The shell profile that you are using, did you configure any other attributes like RBAC for other devices like nexus or WLC, if so you may want to switch the operand of mandatory to optional and then try you test again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to export your configuration you can go from the cli and issue the "acs backup...." to get the backup of your config, you will need to setup a repository to export this to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;tarik admani&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2012 21:35:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-tacacs-command-authorization/m-p/1944958#M300121</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-04-26T21:35:59Z</dc:date>
    </item>
  </channel>
</rss>

