<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS 5.1 Shell Profiles in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-1-shell-profiles/m-p/1537348#M302110</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your time and sharing this valuable stuff. But i still not able to differentiate this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can spend some more time, would you please explain this with example. Like when a user login to device when the "&lt;STRONG&gt;shell profile" &lt;/STRONG&gt;is used and when the &lt;STRONG&gt;"command sets" &lt;/STRONG&gt;is used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, in which scenario "&lt;STRONG&gt;shell profile" &lt;/STRONG&gt;is used and in which case "&lt;STRONG&gt;"command sets" &lt;/STRONG&gt;are used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I googled enough and tired&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAIRAM &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 27 Sep 2010 06:30:14 GMT</pubDate>
    <dc:creator>snarayanaraju</dc:creator>
    <dc:date>2010-09-27T06:30:14Z</dc:date>
    <item>
      <title>ACS 5.1 Shell Profiles</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-shell-profiles/m-p/1537346#M302108</link>
      <description>&lt;P&gt;Dear Friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need your help in clarifying the conceptual doubt. I am not able to understand the difference between the following in ACS 5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shell Profiles&lt;/P&gt;&lt;P&gt;Command Sets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found this under POLICY ELEMENTS &amp;gt; AUTHORIZATION &amp;amp; PERMISSION &amp;gt; DEVICE ADMINISTRATION &amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please clarify the difference between these 2 elements and how it is used&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAIRAM&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-shell-profiles/m-p/1537346#M302108</guid>
      <dc:creator>snarayanaraju</dc:creator>
      <dc:date>2019-03-11T00:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1 Shell Profiles</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-shell-profiles/m-p/1537347#M302109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Using TACACS+ there are permissions that are defined when the se&lt;/P&gt;&lt;P&gt;ssion is authorized and can also be per command level authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the session is authorized (user logs in to a device) the permissions defined in the shell profile are applied; this includes items such as the privelege level&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the user enter commands at the device and performs per-command authorization, the command sets are applied&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Sep 2010 05:10:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-shell-profiles/m-p/1537347#M302109</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-09-27T05:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1 Shell Profiles</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-shell-profiles/m-p/1537348#M302110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your time and sharing this valuable stuff. But i still not able to differentiate this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can spend some more time, would you please explain this with example. Like when a user login to device when the "&lt;STRONG&gt;shell profile" &lt;/STRONG&gt;is used and when the &lt;STRONG&gt;"command sets" &lt;/STRONG&gt;is used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, in which scenario "&lt;STRONG&gt;shell profile" &lt;/STRONG&gt;is used and in which case "&lt;STRONG&gt;"command sets" &lt;/STRONG&gt;are used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I googled enough and tired&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAIRAM &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Sep 2010 06:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-shell-profiles/m-p/1537348#M302110</guid>
      <dc:creator>snarayanaraju</dc:creator>
      <dc:date>2010-09-27T06:30:14Z</dc:date>
    </item>
  </channel>
</rss>

