<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Has Anyon Ever Managed to Get Command Sets Working on ACS 5. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434448#M302904</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see your problem but actually even if you give the user priv-lvl 15 as a shell-profile result, they still will be restricted to command-set (which works fine).&lt;/P&gt;&lt;P&gt;Maybe it sounds like security violation but that user will not be able to do much according to command-set.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Aug 2010 10:26:26 GMT</pubDate>
    <dc:creator>Przemyslaw Konitz</dc:creator>
    <dc:date>2010-08-10T10:26:26Z</dc:date>
    <item>
      <title>Restricted Command List on Switches using ACS 5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434444#M302810</link>
      <description>&lt;P&gt;All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working on setting up a restricted command set on ACS 5.1 so that users can access swicthes only at designated privilege levels and hence only get access to certain commands as defined on the ACS servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far I have set up a Shell Profile with Default privilege of 0, and a maximum privilege of 2. The user is authenticated using our AD servers and everything is fine and they can login to the switch and get privilege 0 access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However I cannot work out how to restrict the commands that are available to them. I have set up a Command Set on the ACS with one command in it ("show run interface" with a wildcard argument), but the commands are not restricted on the switch and it can run some commands that they should not be able to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess what I am looking for is a step-by-step guide as to what configuration needs to be on the switch and how the ACS needs to be set up. There is a lot of information on the Cisco Site, but none of it is really what I need - it tells you everything and explains nothing. I have question that need to be answered like, will the command set accept short form command (i.e. sh run int) or do they have to be word for word as the CLI, if they are defined as per the CLI, what happensif a user tries to use a short code, how do I remove or hide commands from the list when a user types ? at a prompt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So many questions, so little time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW we are using TACACS.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434444#M302810</guid>
      <dc:creator>Paul Williams</dc:creator>
      <dc:date>2019-03-11T00:15:21Z</dc:date>
    </item>
    <item>
      <title>Has Anyon Ever Managed to Get Command Sets Working on ACS 5.1</title>
      <link>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434445#M302846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As per previous...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have now got some commands working on the switch using a command set on ACS. But its not where I want it to be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All I want is for a user to be able to log in to a switch and get a restricted set of commands available to them, for example I want them to be able to type "show running-config interface fa0/1" and see what the speed and duplex settings are....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a shell profile set up that give access at level 0, with a maximum of level 2 (accessed by using the "enable 2" command, and a central password checked against our AD via ACS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment I am permitting "show priv" and "show interfaces", but I have tried every combination of everything else I can think of and it fails to let me do a show run type command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to know what I am missing on the switch (if anything) and what I need to allow on the command set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The switch aaa looks like this....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;BR /&gt;aaa group server radius accounting-group&lt;BR /&gt;aaa group server radius authentication-group&lt;BR /&gt;aaa authentication banner ^C&lt;BR /&gt;aaa authentication login default group authentication-group local&lt;BR /&gt;aaa authentication login MGMTAUTH group tacacs+ local&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;BR /&gt;aaa authentication dot1x default group authentication-group&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization commands 1 default group tacacs+ none&lt;BR /&gt;aaa authorization commands 2 default group tacacs+ none&lt;BR /&gt;aaa authorization auth-proxy default group authentication-group&lt;BR /&gt;aaa accounting commands 15 default stop-only group tacacs+&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;Help would be gratefully accepted as I am beginning to think that this does not work as advertised.....!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Jul 2010 11:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434445#M302846</guid>
      <dc:creator>Paul Williams</dc:creator>
      <dc:date>2010-07-16T11:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: Has Anyon Ever Managed to Get Command Sets Working on ACS 5.</title>
      <link>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434446#M302870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im testing ACS 5.1 by my own right now and I think your problem is that "show run" has priv level 8. This command is not seen when you got level 2.&lt;/P&gt;&lt;P&gt;you can try to change privilege for this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;privilege exec level 2 show running-config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and after that you should be able to run it (with the exception that show runn will show only commands allowd from command set or rather privilege level I think&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 09:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434446#M302870</guid>
      <dc:creator>Przemyslaw Konitz</dc:creator>
      <dc:date>2010-08-10T09:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: Has Anyon Ever Managed to Get Command Sets Working on ACS 5.</title>
      <link>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434447#M302890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunatelty thats what I am trying to avoid. I have about 2500 switches which I would then need to roll out this change to&lt;/P&gt;&lt;P&gt;- and I want to expand the commads available - hence I would need to set up a priv command for each command I want the level 2 users to have access to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;perhaps it is me not understanding what ACS is capable of - but my understanding is that the command sets feature should over-ride the local priv commands, or at least yoy should be able to tell it to do that....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 10:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434447#M302890</guid>
      <dc:creator>Paul Williams</dc:creator>
      <dc:date>2010-08-10T10:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Has Anyon Ever Managed to Get Command Sets Working on ACS 5.</title>
      <link>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434448#M302904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see your problem but actually even if you give the user priv-lvl 15 as a shell-profile result, they still will be restricted to command-set (which works fine).&lt;/P&gt;&lt;P&gt;Maybe it sounds like security violation but that user will not be able to do much according to command-set.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 10:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434448#M302904</guid>
      <dc:creator>Przemyslaw Konitz</dc:creator>
      <dc:date>2010-08-10T10:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: Has Anyon Ever Managed to Get Command Sets Working on ACS 5.</title>
      <link>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434449#M302914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah I get it - give the user level 15 access, but then restrict what commands they can use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hence I can have a number of command sets with varying commands available, and then apply the command set based on the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks I will try this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 11:14:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434449#M302914</guid>
      <dc:creator>Paul Williams</dc:creator>
      <dc:date>2010-08-10T11:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Has Anyon Ever Managed to Get Command Sets Working on ACS 5.</title>
      <link>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434450#M302923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;Hi... I have created a shell profile in &lt;STRONG&gt;Policy Elements -&amp;gt; Authorization and Permissions -&amp;gt; Device Administration -&amp;gt; Shell Profiles&lt;/STRONG&gt; which has a assigned privilege level of 15 and a max privilege level of 15.&amp;nbsp; Further to this I have added a new commands set via &lt;STRONG&gt;Policy Elements -&amp;gt; Authorization and Permissions -&amp;gt; Device Administration -&amp;gt; commands sets&lt;/STRONG&gt;.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;I have referenced the shell profile via &lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;;"&gt;&lt;STRONG&gt;Access Policies -&amp;gt; Access Services -&amp;gt; Default Device Admin -&amp;gt; Authorization.&lt;/STRONG&gt; And this part of it seems to &lt;/SPAN&gt;work fine, but the command set I am using to restrict the commands allowed is not being used...do I need to reference the command set somewhere else within the ACS platform as well?&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;The configuration I have added on to the Network Device is as follows: -&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;aaa new-model&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;aaa authentication login default group tacacs+&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;aaa authentication enable default group tacacs+&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;aaa authorization config-commands&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;aaa authorization exec default group tacacs+ local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;aaa authorization commands 15 default group tacacs+ none&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial;"&gt;Can you advise what it is I am missing?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Oct 2010 20:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434450#M302923</guid>
      <dc:creator>alecchris</dc:creator>
      <dc:date>2010-10-30T20:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Has Anyon Ever Managed to Get Command Sets Working on ACS 5.</title>
      <link>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434451#M302936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you need to include command sets as a result in authorization policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Goto: &lt;SPAN style="font-family: &amp;quot;;"&gt;&lt;STRONG&gt;Access Policies -&amp;gt; Access Services -&amp;gt; Default Device Admin -&amp;gt; Authorization&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;;"&gt;Press "Customize" and select Command Sets as an avalable result&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;;"&gt;You should now be able to select the command set you desire as a result in the authorization policy&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Oct 2010 22:48:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/restricted-command-list-on-switches-using-acs-5-1/m-p/1434451#M302936</guid>
      <dc:creator>jrabinow</dc:creator>
      <dc:date>2010-10-30T22:48:09Z</dc:date>
    </item>
  </channel>
</rss>

