<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Command confusion - aaa authorization config-commands in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/command-confusion-aaa-authorization-config-commands/m-p/1874201#M300187</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are right.&amp;nbsp; For shell to authorise configuration commands, "aaa authorization config-commands" is a must.&amp;nbsp; It provides you more granular control for configuration commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards/bsn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Feb 2012 06:57:14 GMT</pubDate>
    <dc:creator>Bharat Negi</dc:creator>
    <dc:date>2012-02-06T06:57:14Z</dc:date>
    <item>
      <title>Command confusion - aaa authorization config-commands</title>
      <link>https://community.cisco.com/t5/network-access-control/command-confusion-aaa-authorization-config-commands/m-p/1874200#M300136</link>
      <description>&lt;P&gt;I created a new Shell Command Authorization Set within ACS to only allow a port to be configured for a voice VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;gt;&amp;gt; Shell Command Authorization Sets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name: Restricted_Voice&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Description: Configure port voice vlan only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unmatched Commands: Deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Add: enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Add: configure / permit terminal &amp;lt;cr&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Add: interface / permit Gi*&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Add: interface / permit Fa*&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Add: switchport / permit voice vlan *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My switch configuration has the following aaa authorization related lines:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 1 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization commands 15 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I tested the Shell Set, I noticed that all (config) mode commands were allowed (ie description, hostname). It was only after I added "aaa authorization config-commands" to the switch configuration did my Shell Set began working as I expected it to be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went and read up the command reference for "aaa authorization config-commands" in &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/ios/11_3/security/command/reference/sr_auth.html#wp3587" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/11_3/security/command/reference/sr_auth.html#wp3587&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My comprehension of the command is that by just issuing ' aaa authorization commands 15 ....' this command encompasses the checking of config mode commands and that I did not need to add the stand-alone "aaa authorization config-commands" statement. But clearly, from my testing, I needed the extra statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like I resolved my issue and need to add the new statement to all my switches, I'm wondering if someone can help clarify the usage guidelines for me.&amp;nbsp; I'm I one of the few or only one that misinterpreted these "aaa authorization" commands?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/command-confusion-aaa-authorization-config-commands/m-p/1874200#M300136</guid>
      <dc:creator>axa-wongjeff</dc:creator>
      <dc:date>2019-03-11T01:47:45Z</dc:date>
    </item>
    <item>
      <title>Command confusion - aaa authorization config-commands</title>
      <link>https://community.cisco.com/t5/network-access-control/command-confusion-aaa-authorization-config-commands/m-p/1874201#M300187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are right.&amp;nbsp; For shell to authorise configuration commands, "aaa authorization config-commands" is a must.&amp;nbsp; It provides you more granular control for configuration commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards/bsn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Feb 2012 06:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/command-confusion-aaa-authorization-config-commands/m-p/1874201#M300187</guid>
      <dc:creator>Bharat Negi</dc:creator>
      <dc:date>2012-02-06T06:57:14Z</dc:date>
    </item>
    <item>
      <title>Command confusion - aaa authorization config-commands</title>
      <link>https://community.cisco.com/t5/network-access-control/command-confusion-aaa-authorization-config-commands/m-p/1874202#M300236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Command authorization on level 15 does not affect the global configuration mode and&lt;/P&gt;&lt;P&gt;its submodes unless "aaa authorization config-commands" is configured &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 15:45:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/command-confusion-aaa-authorization-config-commands/m-p/1874202#M300236</guid>
      <dc:creator>hkhrais</dc:creator>
      <dc:date>2012-07-22T15:45:34Z</dc:date>
    </item>
    <item>
      <title>Command confusion - aaa authorization config-commands</title>
      <link>https://community.cisco.com/t5/network-access-control/command-confusion-aaa-authorization-config-commands/m-p/1874203#M300256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Axa,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a similar setup and have full Exec Level permissions using only &lt;STRONG&gt;aaa authorization commands&lt;/STRONG&gt;&lt;EM&gt; level method&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;The below is taken from cisco.com and explains that you should not require the&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1017533"&gt;&lt;/A&gt;&lt;STRONG&gt;aaa authorization config-commands &lt;/STRONG&gt;unless you have at some point used the &lt;STRONG&gt;no aaa authorization config-commands&lt;/STRONG&gt; command to prevent configuration commands from the Exec User&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This in essense is a hidden configured default i.e.you switch on auth for config-commands automatically when you use the &lt;STRONG&gt;aaa authorization commands&lt;/STRONG&gt;&lt;EM&gt; level method &lt;/EM&gt;command!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Cisco.com (I have underlined the key points)&lt;/P&gt;&lt;H2&gt;aaa authorization config-commands &lt;/H2&gt;&lt;P&gt;&lt;A name="wpmkr1017531"&gt;&lt;/A&gt;&lt;A name="wp1017532"&gt;&lt;/A&gt;To disable AAA configuration command authorization in the EXEC mode, use the &lt;STRONG&gt;no&lt;/STRONG&gt; form of the &lt;STRONG&gt;aaa authorization config-commands &lt;/STRONG&gt;global configuration command. &lt;SPAN style="text-decoration: underline;"&gt;Use the standard form of this command to reestablish the default created when the aaa authorization commands&lt;EM&gt; level method1 &lt;/EM&gt;command was issued&lt;/SPAN&gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1017533"&gt;&lt;/A&gt;&lt;STRONG&gt;aaa authorization config-commands &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1017534"&gt;&lt;/A&gt;&lt;STRONG&gt;no aaa authorization config-commands &lt;/STRONG&gt;&lt;/P&gt;&lt;H3&gt;&lt;A name="wp1017535"&gt;&lt;/A&gt;Syntax Description &lt;/H3&gt;&lt;P&gt;&lt;A name="wp1017536"&gt;&lt;/A&gt;This command has no arguments or keywords. &lt;/P&gt;&lt;H3&gt;&lt;A name="wp1017537"&gt;&lt;/A&gt;Defaults &lt;/H3&gt;&lt;P&gt;&lt;A name="wp1017538"&gt;&lt;/A&gt;After the &lt;STRONG&gt;aaa authorization commands&lt;/STRONG&gt;&lt;EM&gt; level method&lt;/EM&gt; has been issued, this command is enabled by default—meaning that &lt;SPAN style="text-decoration: underline;"&gt;all configuration commands in the EXEC mode will be authorized. &lt;/SPAN&gt;&lt;/P&gt;&lt;H3&gt;Usage Guidelines &lt;/H3&gt;&lt;P&gt;&lt;A name="wp1017552"&gt;&lt;/A&gt;&lt;SPAN style="text-decoration: underline;"&gt;If &lt;STRONG&gt;aaa authorization commands &lt;/STRONG&gt;&lt;EM&gt;level method &lt;/EM&gt;is enabled, all commands, including configuration commands, are authorized by AAA using the method specified&lt;/SPAN&gt;. Because there are configuration commands that are identical to some EXEC-level commands, there can be some confusion in the authorization process. Using &lt;STRONG&gt;no aaa authorization config-commands&lt;/STRONG&gt; stops the network access server from attempting configuration command authorization. &lt;/P&gt;&lt;P&gt;&lt;A name="wp1017553"&gt;&lt;/A&gt;After the &lt;STRONG&gt;no&lt;/STRONG&gt; form of this command has been entered, AAA authorization of configuration commands is completely disabled. Care should be taken before entering the &lt;STRONG&gt;no&lt;/STRONG&gt; form of this command because it potentially reduces the amount of administrative control on configuration commands. &lt;/P&gt;&lt;P&gt;&lt;A name="wp1017554"&gt;&lt;/A&gt;&lt;SPAN style="text-decoration: underline;"&gt;Use the &lt;STRONG&gt;aaa authorization config-commands command&lt;/STRONG&gt; if, after using the no form of this command, you need to reestablish the default set by the &lt;STRONG&gt;aaa authorization commands &lt;/STRONG&gt;&lt;EM&gt;level method&lt;/EM&gt; command. &lt;/SPAN&gt;&lt;/P&gt;&lt;H3&gt;&lt;A name="wp1017555"&gt;&lt;/A&gt;Examples &lt;/H3&gt;&lt;P&gt;&lt;A name="wp1017556"&gt;&lt;/A&gt;The following example specifies that TACACS+ authorization is run for level 15 commands and that AAA authorization of configuration commands is disabled: &lt;/P&gt;&lt;PRE&gt;&lt;A name="wp1017557"&gt;&lt;/A&gt;aaa new-model&lt;/PRE&gt;&lt;PRE&gt;&lt;A name="wp1017558"&gt;&lt;/A&gt;aaa authorization command 15 tacacs+ none&lt;/PRE&gt;&lt;PRE&gt;&lt;A name="wp1017559"&gt;&lt;/A&gt;no aaa authorization config-commands&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 09:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/command-confusion-aaa-authorization-config-commands/m-p/1874203#M300256</guid>
      <dc:creator>david.mitchell</dc:creator>
      <dc:date>2012-10-02T09:26:05Z</dc:date>
    </item>
  </channel>
</rss>

